Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14155 (GCVE-0-2020-14155)
Vulnerability from cvelistv5 – Published: 2020-06-15 00:00 – Updated: 2024-08-04 12:39- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:39:36.025Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugs.gentoo.org/717920"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT211931"
},
{
"name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT212147"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-28T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://bugs.gentoo.org/717920"
},
{
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"url": "https://support.apple.com/kb/HT211931"
},
{
"name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"tags": [
"mailing-list"
],
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"url": "https://support.apple.com/kb/HT212147"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-14155",
"datePublished": "2020-06-15T00:00:00",
"dateReserved": "2020-06-15T00:00:00",
"dateUpdated": "2024-08-04T12:39:36.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-14155\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-15T17:15:10.777\",\"lastModified\":\"2024-11-21T05:02:45.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.\"},{\"lang\":\"es\",\"value\":\"libpcre en PCRE versiones anteriores a 8.44, permite un desbordamiento de enteros por medio de un n\u00famero grande despu\u00e9s de una subcadena (?C\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.44\",\"matchCriteriaId\":\"DE44B5A4-6CB9-4E93-A4A6-1A9152547258\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.0.1\",\"matchCriteriaId\":\"F2EE75CC-3796-416A-9E58-64788BB89240\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionEndExcluding\":\"12.10.13\",\"matchCriteriaId\":\"69A326C9-D3ED-4AA3-9832-CB7C0BC8D66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionEndExcluding\":\"12.10.13\",\"matchCriteriaId\":\"0C533B72-56E8-40ED-8FC2-D4963DB0C397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndExcluding\":\"13.0.8\",\"matchCriteriaId\":\"6C2D99CC-CB24-43D8-A231-C76A2DAE1CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndExcluding\":\"13.0.8\",\"matchCriteriaId\":\"21BF96AA-827E-4CB3-943B-478C141917D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndExcluding\":\"13.1.2\",\"matchCriteriaId\":\"51809B8F-141D-43B9-BAC5-328E9F4DD7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndExcluding\":\"13.1.2\",\"matchCriteriaId\":\"54A7E410-0F0C-414A-98AA-C3DA9B5191A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4367D9B-BF81-47AD-A840-AC46317C774D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndExcluding\":\"8.2.12\",\"matchCriteriaId\":\"5722E753-75DE-4944-A11B-556CB299B57D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.0.6\",\"matchCriteriaId\":\"DC0F9351-81A4-4FEA-B6B5-6E960A933D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Feb/14\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.gentoo.org/717920\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221028-0010/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT211931\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212147\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.pcre.org/original/changelog.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Feb/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.gentoo.org/717920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221028-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT211931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.pcre.org/original/changelog.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}"
}
}
GHSA-G6G8-99M5-JJ82
Vulnerability from github – Published: 2022-05-24 17:20 – Updated: 2024-03-27 18:32libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
{
"affected": [],
"aliases": [
"CVE-2020-14155"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-06-15T17:15:00Z",
"severity": "HIGH"
},
"details": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"id": "GHSA-g6g8-99m5-jj82",
"modified": "2024-03-27T18:32:37Z",
"published": "2022-05-24T17:20:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
},
{
"type": "WEB",
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release"
},
{
"type": "WEB",
"url": "https://bugs.gentoo.org/717920"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20221028-0010"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT211931"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT212147"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"type": "WEB",
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
VAR-202006-0222
Vulnerability from variot - Updated: 2025-12-22 20:26libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. PCRE is an open source regular expression library written in C language by Philip Hazel software developer. An input validation error vulnerability exists in libpcre in versions prior to PCRE 8.44. An attacker could exploit this vulnerability to execute arbitrary code or cause an application to crash on the system with a large number of requests. Bugs fixed (https://bugzilla.redhat.com/):
1944888 - CVE-2021-21409 netty: Request smuggling via content-length header 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1775 - [release-5.2] Syslog output is serializing json incorrectly LOG-1824 - [release-5.2] Rejected by Elasticsearch and unexpected json-parsing LOG-1963 - [release-5.2] CLO panic: runtime error: slice bounds out of range [:-1] LOG-1970 - Applying cluster state is causing elasticsearch to hit an issue and become unusable
- Summary:
An update for pcre is now available for Red Hat Enterprise Linux 8. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64
- Description:
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
-
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
-
pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1848436 - CVE-2020-14155 pcre: Integer overflow when parsing callout numeric arguments 1848444 - CVE-2019-20838 pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
- Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source: pcre-8.42-6.el8.src.rpm
aarch64: pcre-8.42-6.el8.aarch64.rpm pcre-cpp-8.42-6.el8.aarch64.rpm pcre-cpp-debuginfo-8.42-6.el8.aarch64.rpm pcre-debuginfo-8.42-6.el8.aarch64.rpm pcre-debugsource-8.42-6.el8.aarch64.rpm pcre-devel-8.42-6.el8.aarch64.rpm pcre-tools-debuginfo-8.42-6.el8.aarch64.rpm pcre-utf16-8.42-6.el8.aarch64.rpm pcre-utf16-debuginfo-8.42-6.el8.aarch64.rpm pcre-utf32-8.42-6.el8.aarch64.rpm pcre-utf32-debuginfo-8.42-6.el8.aarch64.rpm
ppc64le: pcre-8.42-6.el8.ppc64le.rpm pcre-cpp-8.42-6.el8.ppc64le.rpm pcre-cpp-debuginfo-8.42-6.el8.ppc64le.rpm pcre-debuginfo-8.42-6.el8.ppc64le.rpm pcre-debugsource-8.42-6.el8.ppc64le.rpm pcre-devel-8.42-6.el8.ppc64le.rpm pcre-tools-debuginfo-8.42-6.el8.ppc64le.rpm pcre-utf16-8.42-6.el8.ppc64le.rpm pcre-utf16-debuginfo-8.42-6.el8.ppc64le.rpm pcre-utf32-8.42-6.el8.ppc64le.rpm pcre-utf32-debuginfo-8.42-6.el8.ppc64le.rpm
s390x: pcre-8.42-6.el8.s390x.rpm pcre-cpp-8.42-6.el8.s390x.rpm pcre-cpp-debuginfo-8.42-6.el8.s390x.rpm pcre-debuginfo-8.42-6.el8.s390x.rpm pcre-debugsource-8.42-6.el8.s390x.rpm pcre-devel-8.42-6.el8.s390x.rpm pcre-tools-debuginfo-8.42-6.el8.s390x.rpm pcre-utf16-8.42-6.el8.s390x.rpm pcre-utf16-debuginfo-8.42-6.el8.s390x.rpm pcre-utf32-8.42-6.el8.s390x.rpm pcre-utf32-debuginfo-8.42-6.el8.s390x.rpm
x86_64: pcre-8.42-6.el8.i686.rpm pcre-8.42-6.el8.x86_64.rpm pcre-cpp-8.42-6.el8.i686.rpm pcre-cpp-8.42-6.el8.x86_64.rpm pcre-cpp-debuginfo-8.42-6.el8.i686.rpm pcre-cpp-debuginfo-8.42-6.el8.x86_64.rpm pcre-debuginfo-8.42-6.el8.i686.rpm pcre-debuginfo-8.42-6.el8.x86_64.rpm pcre-debugsource-8.42-6.el8.i686.rpm pcre-debugsource-8.42-6.el8.x86_64.rpm pcre-devel-8.42-6.el8.i686.rpm pcre-devel-8.42-6.el8.x86_64.rpm pcre-tools-debuginfo-8.42-6.el8.i686.rpm pcre-tools-debuginfo-8.42-6.el8.x86_64.rpm pcre-utf16-8.42-6.el8.i686.rpm pcre-utf16-8.42-6.el8.x86_64.rpm pcre-utf16-debuginfo-8.42-6.el8.i686.rpm pcre-utf16-debuginfo-8.42-6.el8.x86_64.rpm pcre-utf32-8.42-6.el8.i686.rpm pcre-utf32-8.42-6.el8.x86_64.rpm pcre-utf32-debuginfo-8.42-6.el8.i686.rpm pcre-utf32-debuginfo-8.42-6.el8.x86_64.rpm
Red Hat Enterprise Linux CRB (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Summary:
The Migration Toolkit for Containers (MTC) 1.6.3 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):
2019088 - "MigrationController" CR displays syntax error when unquiescing applications 2021666 - Route name longer than 63 characters causes direct volume migration to fail 2021668 - "MigrationController" CR ignores the "cluster_subdomain" value for direct volume migration routes 2022017 - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC) 2024966 - Manifests not used by Operator Lifecycle Manager must be removed from the MTC 1.6 Operator image 2027196 - "migration-controller" pod goes into "CrashLoopBackoff" state if an invalid registry route is entered on the "Clusters" page of the web console 2027382 - "Copy oc describe/oc logs" window does not close automatically after timeout 2028841 - "rsync-client" container fails during direct volume migration with "Address family not supported by protocol" error 2031793 - "migration-controller" pod goes into "CrashLoopBackOff" state if "MigPlan" CR contains an invalid "includedResources" resource 2039852 - "migration-controller" pod goes into "CrashLoopBackOff" state if "MigPlan" CR contains an invalid "destMigClusterRef" or "srcMigClusterRef"
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Gatekeeper Operator v0.2 security updates and bug fixes Advisory ID: RHSA-2022:1081-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2022:1081 Issue date: 2022-03-28 CVE Names: CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-12762 CVE-2020-13435 CVE-2020-14155 CVE-2020-16135 CVE-2020-24370 CVE-2021-3200 CVE-2021-3445 CVE-2021-3521 CVE-2021-3580 CVE-2021-3712 CVE-2021-3800 CVE-2021-3999 CVE-2021-20231 CVE-2021-20232 CVE-2021-22876 CVE-2021-22898 CVE-2021-22925 CVE-2021-23177 CVE-2021-28153 CVE-2021-31566 CVE-2021-33560 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 CVE-2021-43565 CVE-2022-23218 CVE-2022-23219 CVE-2022-23308 CVE-2022-23806 CVE-2022-24407 ==================================================================== 1. Summary:
Gatekeeper Operator v0.2
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Gatekeeper Operator v0.2
Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters.
This advisory contains the container images for Gatekeeper that include security updates, and container upgrades.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Note: Gatekeeper support from the Red Hat support team is limited cases where it is integrated and used with Red Hat Advanced Cluster Management for Kubernetes. For support options for any other use, see the Gatekeeper open source project website at: https://open-policy-agent.github.io/gatekeeper/website/docs/howto/.
Security updates:
-
golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
-
golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
The requirements to apply the upgraded images are different whether or not you used the operator. Complete the following steps, depending on your installation:
-
- Upgrade gatekeeper operator:
The gatekeeper operator that is installed by the gatekeeper operator policy
has
installPlanApprovalset toAutomatic. This setting means the operator will be upgraded automatically when there is a new version of the operator. No further action is required for upgrade. If you changed the setting forinstallPlanApprovaltomanual, then you must view each cluster to manually approve the upgrade to the operator.
- Upgrade gatekeeper operator:
The gatekeeper operator that is installed by the gatekeeper operator policy
has
-
- Upgrade gatekeeper without the operator: The gatekeeper version is specified as part of the Gatekeeper CR in the gatekeeper operator policy. To upgrade the gatekeeper version: a) Determine the latest version of gatekeeper by visiting: https://catalog.redhat.com/software/containers/rhacm2/gatekeeper-rhel8/5fadb4a18d9a79d2f438a5d9. b) Click the tag dropdown, and find the latest static tag. An example tag is 'v3.3.0-1'. c) Edit the gatekeeper operator policy and update the image tag to use the latest static tag. For example, you might change this line to image: 'registry.redhat.io/rhacm2/gatekeeper-rhel8:v3.3.0-1'.
Refer to https://open-policy-agent.github.io/gatekeeper/website/docs/howto/ for additional information.
- Bugs fixed (https://bugzilla.redhat.com/):
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements
- References:
https://access.redhat.com/security/cve/CVE-2019-5827 https://access.redhat.com/security/cve/CVE-2019-13750 https://access.redhat.com/security/cve/CVE-2019-13751 https://access.redhat.com/security/cve/CVE-2019-17594 https://access.redhat.com/security/cve/CVE-2019-17595 https://access.redhat.com/security/cve/CVE-2019-18218 https://access.redhat.com/security/cve/CVE-2019-19603 https://access.redhat.com/security/cve/CVE-2019-20838 https://access.redhat.com/security/cve/CVE-2020-12762 https://access.redhat.com/security/cve/CVE-2020-13435 https://access.redhat.com/security/cve/CVE-2020-14155 https://access.redhat.com/security/cve/CVE-2020-16135 https://access.redhat.com/security/cve/CVE-2020-24370 https://access.redhat.com/security/cve/CVE-2021-3200 https://access.redhat.com/security/cve/CVE-2021-3445 https://access.redhat.com/security/cve/CVE-2021-3521 https://access.redhat.com/security/cve/CVE-2021-3580 https://access.redhat.com/security/cve/CVE-2021-3712 https://access.redhat.com/security/cve/CVE-2021-3800 https://access.redhat.com/security/cve/CVE-2021-3999 https://access.redhat.com/security/cve/CVE-2021-20231 https://access.redhat.com/security/cve/CVE-2021-20232 https://access.redhat.com/security/cve/CVE-2021-22876 https://access.redhat.com/security/cve/CVE-2021-22898 https://access.redhat.com/security/cve/CVE-2021-22925 https://access.redhat.com/security/cve/CVE-2021-23177 https://access.redhat.com/security/cve/CVE-2021-28153 https://access.redhat.com/security/cve/CVE-2021-31566 https://access.redhat.com/security/cve/CVE-2021-33560 https://access.redhat.com/security/cve/CVE-2021-36084 https://access.redhat.com/security/cve/CVE-2021-36085 https://access.redhat.com/security/cve/CVE-2021-36086 https://access.redhat.com/security/cve/CVE-2021-36087 https://access.redhat.com/security/cve/CVE-2021-42574 https://access.redhat.com/security/cve/CVE-2021-43565 https://access.redhat.com/security/cve/CVE-2022-23218 https://access.redhat.com/security/cve/CVE-2022-23219 https://access.redhat.com/security/cve/CVE-2022-23308 https://access.redhat.com/security/cve/CVE-2022-23806 https://access.redhat.com/security/cve/CVE-2022-24407 https://access.redhat.com/security/updates/classification/#moderate https://open-policy-agent.github.io/gatekeeper/website/docs/howto/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYkHUf9zjgjWX9erEAQiizw//XXMOXR1Xe/Fp6uV2DCknXEAWJbYuGV43 9a87QSq5ob3vbqGGXQXLU6ENjFtAx37/+5+UqAVbzcj+LQ0lV6Ny9rVzolDT4ltG k7J/BUd/kyr9G5gbiih3D/tm8dLh/rLft8FKgB+hEw+NcXnFlEvW5iEymqAsyH/D mrcgCrASFoWG4S4/JC+g8r1TRHAJj4ERAy4ZpDqn/eoOWY3jD+rPv1VD5Z+XaE07 +jw+mvZukP2l0374Yn3W+g7uVOZ5RSqSpEzBZoSy3ffYAqpK+oQ7eN19DOW7l3tr Ko/4h4OmLcOtIRedyt86xJe+zY7Ovo1cRP1TUgRapZGpTCPjaQ/okOhAIh03uxrx ceCawNnagBB1iglJl29GNRUUUU0JWhbEPDLepSjfsyOwkJxvtUulC/W+RJVfpE7Q LimNdHDJbFWN1x4IujdJNOCjPnBj6sG84PxLIjx5hM07ARRCBfrHutmlBm6Aq8Ej mcNPudtyufYuAqcNx8Pe04kwRmzeukNm/qVvr+ywG1+Rp4yo3mkxplZY+5z7S2sH vsciDeEGg6CAh7Sm/zfN3fpvNei1WhzcSxKsHMLB40ASJU2sMe1tt9b2pPhaHfXK lYnIN38GSqlQUjvb1jy8ymzOT3+73uCjYQrVbsGXoevb1639pasWv5i9dyx27kPb 1PnhEG7/jO4=XPu4 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .
Clusters and applications are all visible and managed from a single console — with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/
Security fixes:
-
CVE-2021-3795 semver-regex: inefficient regular expression complexity
-
CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747
Related bugs:
-
RHACM 2.2.10 images (Bugzilla #2013652)
-
Bugs fixed (https://bugzilla.redhat.com/):
2004944 - CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747 2006009 - CVE-2021-3795 semver-regex: inefficient regular expression complexity 2013652 - RHACM 2.2.10 images
- Description:
Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):
2050826 - CVE-2022-24348 gitops: Path traversal and dereference of symlinks when passing Helm value files
- Description:
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Bugs fixed (https://bugzilla.redhat.com/):
1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet 1997017 - unprivileged client fails to get guest agent data 1998855 - Node drain: Sometimes source virt-launcher pod status is Failed and not Completed 2000251 - RoleBinding and ClusterRoleBinding brought in by kubevirt does not get reconciled when kind is ServiceAccount 2001270 - [VMIO] [Warm from Vmware] Snapshot files are not deleted after Successful Import 2001281 - [VMIO] [Warm from VMware] Source VM should not be turned ON if vmio import is removed 2001901 - [4.8.3] NNCP creation failures after nmstate-handler pod deletion 2007336 - 4.8.3 containers 2007776 - Failed to Migrate Windows VM with CDROM (readonly) 2008511 - [CNV-4.8.3] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13 2012890 - With descheduler during multiple VMIs migrations, some VMs are restarted 2025475 - [4.8.3] Upgrade from 2.6 to 4.x versions failed due to vlan-filtering issues 2026881 - [4.8.3] vlan-filtering is getting applied on veth ports
5
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202006-0222",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "steelstore cloud integrated storage",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "universal forwarder",
"scope": "gte",
"trust": 1.0,
"vendor": "splunk",
"version": "8.2.0"
},
{
"model": "gitlab",
"scope": "gte",
"trust": 1.0,
"vendor": "gitlab",
"version": "13.1.0"
},
{
"model": "gitlab",
"scope": "lt",
"trust": 1.0,
"vendor": "gitlab",
"version": "12.10.13"
},
{
"model": "clustered data ontap",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "universal forwarder",
"scope": "lt",
"trust": 1.0,
"vendor": "splunk",
"version": "8.2.12"
},
{
"model": "h300s",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "pcre",
"scope": "lt",
"trust": 1.0,
"vendor": "pcre",
"version": "8.44"
},
{
"model": "h500s",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "ontap select deploy administration utility",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "h410c",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "communications cloud native core policy",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "1.15.0"
},
{
"model": "gitlab",
"scope": "lt",
"trust": 1.0,
"vendor": "gitlab",
"version": "13.1.2"
},
{
"model": "active iq unified manager",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "cloud backup",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "universal forwarder",
"scope": "eq",
"trust": 1.0,
"vendor": "splunk",
"version": "9.1.0"
},
{
"model": "gitlab",
"scope": "lt",
"trust": 1.0,
"vendor": "gitlab",
"version": "13.0.8"
},
{
"model": "gitlab",
"scope": "gte",
"trust": 1.0,
"vendor": "gitlab",
"version": "13.0.0"
},
{
"model": "universal forwarder",
"scope": "lt",
"trust": 1.0,
"vendor": "splunk",
"version": "9.0.6"
},
{
"model": "universal forwarder",
"scope": "gte",
"trust": 1.0,
"vendor": "splunk",
"version": "9.0.0"
},
{
"model": "h700s",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "h410s",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "macos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "11.0.1"
},
{
"model": "pcre",
"scope": "eq",
"trust": 0.8,
"vendor": "pcre",
"version": "8.44"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:pcre:pcre",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
},
{
"db": "PACKETSTORM",
"id": "164825"
},
{
"db": "PACKETSTORM",
"id": "165631"
},
{
"db": "PACKETSTORM",
"id": "166489"
},
{
"db": "PACKETSTORM",
"id": "165209"
},
{
"db": "PACKETSTORM",
"id": "166051"
},
{
"db": "PACKETSTORM",
"id": "165135"
}
],
"trust": 0.8
},
"cve": "CVE-2020-14155",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2020-14155",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2020-006704",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-167005",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-14155",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2020-006704",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-14155",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "JVNDB-2020-006704",
"trust": 0.8,
"value": "Medium"
},
{
"author": "VULHUB",
"id": "VHN-167005",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. PCRE is an open source regular expression library written in C language by Philip Hazel software developer. An input validation error vulnerability exists in libpcre in versions prior to PCRE 8.44. An attacker could exploit this vulnerability to execute arbitrary code or cause an application to crash on the system with a large number of requests. Bugs fixed (https://bugzilla.redhat.com/):\n\n1944888 - CVE-2021-21409 netty: Request smuggling via content-length header\n2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data\n2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way\n2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1775 - [release-5.2] Syslog output is serializing json incorrectly\nLOG-1824 - [release-5.2] Rejected by Elasticsearch and unexpected json-parsing\nLOG-1963 - [release-5.2] CLO panic: runtime error: slice bounds out of range [:-1]\nLOG-1970 - Applying cluster state is causing elasticsearch to hit an issue and become unusable\n\n6. Summary:\n\nAn update for pcre is now available for Red Hat Enterprise Linux 8. Relevant releases/architectures:\n\nRed Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nPCRE is a Perl-compatible regular expression library. \n\nSecurity Fix(es):\n\n* pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed\nquantifier greater than 1 (CVE-2019-20838)\n\n* pcre: Integer overflow when parsing callout numeric arguments\n(CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.5 Release Notes linked from the References section. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1848436 - CVE-2020-14155 pcre: Integer overflow when parsing callout numeric arguments\n1848444 - CVE-2019-20838 pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1\n\n6. Package List:\n\nRed Hat Enterprise Linux BaseOS (v. 8):\n\nSource:\npcre-8.42-6.el8.src.rpm\n\naarch64:\npcre-8.42-6.el8.aarch64.rpm\npcre-cpp-8.42-6.el8.aarch64.rpm\npcre-cpp-debuginfo-8.42-6.el8.aarch64.rpm\npcre-debuginfo-8.42-6.el8.aarch64.rpm\npcre-debugsource-8.42-6.el8.aarch64.rpm\npcre-devel-8.42-6.el8.aarch64.rpm\npcre-tools-debuginfo-8.42-6.el8.aarch64.rpm\npcre-utf16-8.42-6.el8.aarch64.rpm\npcre-utf16-debuginfo-8.42-6.el8.aarch64.rpm\npcre-utf32-8.42-6.el8.aarch64.rpm\npcre-utf32-debuginfo-8.42-6.el8.aarch64.rpm\n\nppc64le:\npcre-8.42-6.el8.ppc64le.rpm\npcre-cpp-8.42-6.el8.ppc64le.rpm\npcre-cpp-debuginfo-8.42-6.el8.ppc64le.rpm\npcre-debuginfo-8.42-6.el8.ppc64le.rpm\npcre-debugsource-8.42-6.el8.ppc64le.rpm\npcre-devel-8.42-6.el8.ppc64le.rpm\npcre-tools-debuginfo-8.42-6.el8.ppc64le.rpm\npcre-utf16-8.42-6.el8.ppc64le.rpm\npcre-utf16-debuginfo-8.42-6.el8.ppc64le.rpm\npcre-utf32-8.42-6.el8.ppc64le.rpm\npcre-utf32-debuginfo-8.42-6.el8.ppc64le.rpm\n\ns390x:\npcre-8.42-6.el8.s390x.rpm\npcre-cpp-8.42-6.el8.s390x.rpm\npcre-cpp-debuginfo-8.42-6.el8.s390x.rpm\npcre-debuginfo-8.42-6.el8.s390x.rpm\npcre-debugsource-8.42-6.el8.s390x.rpm\npcre-devel-8.42-6.el8.s390x.rpm\npcre-tools-debuginfo-8.42-6.el8.s390x.rpm\npcre-utf16-8.42-6.el8.s390x.rpm\npcre-utf16-debuginfo-8.42-6.el8.s390x.rpm\npcre-utf32-8.42-6.el8.s390x.rpm\npcre-utf32-debuginfo-8.42-6.el8.s390x.rpm\n\nx86_64:\npcre-8.42-6.el8.i686.rpm\npcre-8.42-6.el8.x86_64.rpm\npcre-cpp-8.42-6.el8.i686.rpm\npcre-cpp-8.42-6.el8.x86_64.rpm\npcre-cpp-debuginfo-8.42-6.el8.i686.rpm\npcre-cpp-debuginfo-8.42-6.el8.x86_64.rpm\npcre-debuginfo-8.42-6.el8.i686.rpm\npcre-debuginfo-8.42-6.el8.x86_64.rpm\npcre-debugsource-8.42-6.el8.i686.rpm\npcre-debugsource-8.42-6.el8.x86_64.rpm\npcre-devel-8.42-6.el8.i686.rpm\npcre-devel-8.42-6.el8.x86_64.rpm\npcre-tools-debuginfo-8.42-6.el8.i686.rpm\npcre-tools-debuginfo-8.42-6.el8.x86_64.rpm\npcre-utf16-8.42-6.el8.i686.rpm\npcre-utf16-8.42-6.el8.x86_64.rpm\npcre-utf16-debuginfo-8.42-6.el8.i686.rpm\npcre-utf16-debuginfo-8.42-6.el8.x86_64.rpm\npcre-utf32-8.42-6.el8.i686.rpm\npcre-utf32-8.42-6.el8.x86_64.rpm\npcre-utf32-debuginfo-8.42-6.el8.i686.rpm\npcre-utf32-debuginfo-8.42-6.el8.x86_64.rpm\n\nRed Hat Enterprise Linux CRB (v. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Summary:\n\nThe Migration Toolkit for Containers (MTC) 1.6.3 is now available. Description:\n\nThe Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or\nthe Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):\n\n2019088 - \"MigrationController\" CR displays syntax error when unquiescing applications\n2021666 - Route name longer than 63 characters causes direct volume migration to fail\n2021668 - \"MigrationController\" CR ignores the \"cluster_subdomain\" value for direct volume migration routes\n2022017 - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)\n2024966 - Manifests not used by Operator Lifecycle Manager must be removed from the MTC 1.6 Operator image\n2027196 - \"migration-controller\" pod goes into \"CrashLoopBackoff\" state if an invalid registry route is entered on the \"Clusters\" page of the web console\n2027382 - \"Copy oc describe/oc logs\" window does not close automatically after timeout\n2028841 - \"rsync-client\" container fails during direct volume migration with \"Address family not supported by protocol\" error\n2031793 - \"migration-controller\" pod goes into \"CrashLoopBackOff\" state if \"MigPlan\" CR contains an invalid \"includedResources\" resource\n2039852 - \"migration-controller\" pod goes into \"CrashLoopBackOff\" state if \"MigPlan\" CR contains an invalid \"destMigClusterRef\" or \"srcMigClusterRef\"\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: Gatekeeper Operator v0.2 security updates and bug fixes\nAdvisory ID: RHSA-2022:1081-01\nProduct: Red Hat ACM\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:1081\nIssue date: 2022-03-28\nCVE Names: CVE-2019-5827 CVE-2019-13750 CVE-2019-13751\n CVE-2019-17594 CVE-2019-17595 CVE-2019-18218\n CVE-2019-19603 CVE-2019-20838 CVE-2020-12762\n CVE-2020-13435 CVE-2020-14155 CVE-2020-16135\n CVE-2020-24370 CVE-2021-3200 CVE-2021-3445\n CVE-2021-3521 CVE-2021-3580 CVE-2021-3712\n CVE-2021-3800 CVE-2021-3999 CVE-2021-20231\n CVE-2021-20232 CVE-2021-22876 CVE-2021-22898\n CVE-2021-22925 CVE-2021-23177 CVE-2021-28153\n CVE-2021-31566 CVE-2021-33560 CVE-2021-36084\n CVE-2021-36085 CVE-2021-36086 CVE-2021-36087\n CVE-2021-42574 CVE-2021-43565 CVE-2022-23218\n CVE-2022-23219 CVE-2022-23308 CVE-2022-23806\n CVE-2022-24407\n====================================================================\n1. Summary:\n\nGatekeeper Operator v0.2\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nGatekeeper Operator v0.2\n\nGatekeeper is an open source project that applies the OPA Constraint\nFramework to enforce policies on your Kubernetes clusters. \n\nThis advisory contains the container images for Gatekeeper that include\nsecurity updates, and container upgrades. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\nNote: Gatekeeper support from the Red Hat support team is limited cases\nwhere it is integrated and used with Red Hat Advanced Cluster Management\nfor Kubernetes. For support options for any other use, see the Gatekeeper\nopen source project website at:\nhttps://open-policy-agent.github.io/gatekeeper/website/docs/howto/. \n\nSecurity updates:\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements\n(CVE-2022-23806)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe requirements to apply the upgraded images are different whether or not\nyou\nused the operator. Complete the following steps, depending on your\ninstallation:\n\n- - Upgrade gatekeeper operator:\nThe gatekeeper operator that is installed by the gatekeeper operator policy\nhas\n`installPlanApproval` set to `Automatic`. This setting means the operator\nwill\nbe upgraded automatically when there is a new version of the operator. No\nfurther action is required for upgrade. If you changed the setting for\n`installPlanApproval` to `manual`, then you must view each cluster to\nmanually\napprove the upgrade to the operator. \n\n- - Upgrade gatekeeper without the operator:\nThe gatekeeper version is specified as part of the Gatekeeper CR in the\ngatekeeper operator policy. To upgrade the gatekeeper version:\na) Determine the latest version of gatekeeper by visiting:\nhttps://catalog.redhat.com/software/containers/rhacm2/gatekeeper-rhel8/5fadb4a18d9a79d2f438a5d9. \nb) Click the tag dropdown, and find the latest static tag. An example tag\nis\n\u0027v3.3.0-1\u0027. \nc) Edit the gatekeeper operator policy and update the image tag to use the\nlatest static tag. For example, you might change this line to image:\n\u0027registry.redhat.io/rhacm2/gatekeeper-rhel8:v3.3.0-1\u0027. \n\nRefer to https://open-policy-agent.github.io/gatekeeper/website/docs/howto/\nfor additional information. \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic\n2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-5827\nhttps://access.redhat.com/security/cve/CVE-2019-13750\nhttps://access.redhat.com/security/cve/CVE-2019-13751\nhttps://access.redhat.com/security/cve/CVE-2019-17594\nhttps://access.redhat.com/security/cve/CVE-2019-17595\nhttps://access.redhat.com/security/cve/CVE-2019-18218\nhttps://access.redhat.com/security/cve/CVE-2019-19603\nhttps://access.redhat.com/security/cve/CVE-2019-20838\nhttps://access.redhat.com/security/cve/CVE-2020-12762\nhttps://access.redhat.com/security/cve/CVE-2020-13435\nhttps://access.redhat.com/security/cve/CVE-2020-14155\nhttps://access.redhat.com/security/cve/CVE-2020-16135\nhttps://access.redhat.com/security/cve/CVE-2020-24370\nhttps://access.redhat.com/security/cve/CVE-2021-3200\nhttps://access.redhat.com/security/cve/CVE-2021-3445\nhttps://access.redhat.com/security/cve/CVE-2021-3521\nhttps://access.redhat.com/security/cve/CVE-2021-3580\nhttps://access.redhat.com/security/cve/CVE-2021-3712\nhttps://access.redhat.com/security/cve/CVE-2021-3800\nhttps://access.redhat.com/security/cve/CVE-2021-3999\nhttps://access.redhat.com/security/cve/CVE-2021-20231\nhttps://access.redhat.com/security/cve/CVE-2021-20232\nhttps://access.redhat.com/security/cve/CVE-2021-22876\nhttps://access.redhat.com/security/cve/CVE-2021-22898\nhttps://access.redhat.com/security/cve/CVE-2021-22925\nhttps://access.redhat.com/security/cve/CVE-2021-23177\nhttps://access.redhat.com/security/cve/CVE-2021-28153\nhttps://access.redhat.com/security/cve/CVE-2021-31566\nhttps://access.redhat.com/security/cve/CVE-2021-33560\nhttps://access.redhat.com/security/cve/CVE-2021-36084\nhttps://access.redhat.com/security/cve/CVE-2021-36085\nhttps://access.redhat.com/security/cve/CVE-2021-36086\nhttps://access.redhat.com/security/cve/CVE-2021-36087\nhttps://access.redhat.com/security/cve/CVE-2021-42574\nhttps://access.redhat.com/security/cve/CVE-2021-43565\nhttps://access.redhat.com/security/cve/CVE-2022-23218\nhttps://access.redhat.com/security/cve/CVE-2022-23219\nhttps://access.redhat.com/security/cve/CVE-2022-23308\nhttps://access.redhat.com/security/cve/CVE-2022-23806\nhttps://access.redhat.com/security/cve/CVE-2022-24407\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://open-policy-agent.github.io/gatekeeper/website/docs/howto/\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n1PnhEG7/jO4=XPu4\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nClusters and applications are all visible and managed from a single console\n\u2014 with security policy built in. See the following Release Notes documentation, which\nwill be updated shortly for this release, for additional details about this\nrelease:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2021-3795 semver-regex: inefficient regular expression complexity\n\n* CVE-2021-23440 nodejs-set-value: type confusion allows bypass of\nCVE-2019-10747\n\nRelated bugs: \n\n* RHACM 2.2.10 images (Bugzilla #2013652)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n2004944 - CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747\n2006009 - CVE-2021-3795 semver-regex: inefficient regular expression complexity\n2013652 - RHACM 2.2.10 images\n\n5. Description:\n\nRed Hat Openshift GitOps is a declarative way to implement continuous\ndeployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):\n\n2050826 - CVE-2022-24348 gitops: Path traversal and dereference of symlinks when passing Helm value files\n\n5. Description:\n\nOpenShift Virtualization is Red Hat\u0027s virtualization solution designed for\nRed Hat OpenShift Container Platform. Bugs fixed (https://bugzilla.redhat.com/):\n\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet\n1997017 - unprivileged client fails to get guest agent data\n1998855 - Node drain: Sometimes source virt-launcher pod status is Failed and not Completed\n2000251 - RoleBinding and ClusterRoleBinding brought in by kubevirt does not get reconciled when kind is ServiceAccount\n2001270 - [VMIO] [Warm from Vmware] Snapshot files are not deleted after Successful Import\n2001281 - [VMIO] [Warm from VMware] Source VM should not be turned ON if vmio import is removed\n2001901 - [4.8.3] NNCP creation failures after nmstate-handler pod deletion\n2007336 - 4.8.3 containers\n2007776 - Failed to Migrate Windows VM with CDROM (readonly)\n2008511 - [CNV-4.8.3] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13\n2012890 - With descheduler during multiple VMIs migrations, some VMs are restarted\n2025475 - [4.8.3] Upgrade from 2.6 to 4.x versions failed due to vlan-filtering issues\n2026881 - [4.8.3] vlan-filtering is getting applied on veth ports\n\n5",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-14155"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
},
{
"db": "PACKETSTORM",
"id": "164825"
},
{
"db": "PACKETSTORM",
"id": "165631"
},
{
"db": "PACKETSTORM",
"id": "166489"
},
{
"db": "PACKETSTORM",
"id": "165209"
},
{
"db": "PACKETSTORM",
"id": "166051"
},
{
"db": "PACKETSTORM",
"id": "165135"
}
],
"trust": 2.43
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-167005",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-14155",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "165135",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "165296",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "166051",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "166489",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "165287",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "165631",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "164825",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "165209",
"trust": 0.2
},
{
"db": "CNVD",
"id": "CNVD-2020-53121",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "161245",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165096",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168352",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165862",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165099",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167956",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "166308",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165286",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "160545",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168392",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164928",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164927",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164967",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165002",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165288",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165758",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "165129",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167206",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168036",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "166309",
"trust": 0.1
},
{
"db": "CNNVD",
"id": "CNNVD-202006-1036",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-167005",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
},
{
"db": "PACKETSTORM",
"id": "164825"
},
{
"db": "PACKETSTORM",
"id": "165631"
},
{
"db": "PACKETSTORM",
"id": "166489"
},
{
"db": "PACKETSTORM",
"id": "165209"
},
{
"db": "PACKETSTORM",
"id": "166051"
},
{
"db": "PACKETSTORM",
"id": "165135"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"id": "VAR-202006-0222",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T20:26:58.254000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "ChangeLog for PCRE",
"trust": 0.8,
"url": "https://www.pcre.org/original/changelog.txt"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-190",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155"
},
{
"trust": 1.1,
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
},
{
"trust": 1.1,
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"trust": 1.1,
"url": "https://support.apple.com/kb/ht211931"
},
{
"trust": 1.1,
"url": "https://support.apple.com/kb/ht212147"
},
{
"trust": 1.1,
"url": "http://seclists.org/fulldisclosure/2020/dec/32"
},
{
"trust": 1.1,
"url": "http://seclists.org/fulldisclosure/2021/feb/14"
},
{
"trust": 1.1,
"url": "https://bugs.gentoo.org/717920"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"trust": 1.1,
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/cve-2019-20838"
},
{
"trust": 0.8,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/cve-2020-14155"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838"
},
{
"trust": 0.8,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14155"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-3200"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2020-13435"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-5827"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2020-24370"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-13751"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-19603"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-17594"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2020-12762"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-36086"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-22898"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2020-16135"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-36084"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-3800"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-36087"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-3445"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-22925"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-20232"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-22876"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-20231"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-36085"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-33560"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-17595"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-42574"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-28153"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-13750"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2019-18218"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-3580"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-27645"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-33574"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-35942"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-3572"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-3426"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2021-43527"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2020-14145"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14145"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2021-3712"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2021-20266"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-3778"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-3796"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-37750"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22925"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20231"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20232"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22898"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22876"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-25013"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25012"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-35522"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-35524"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-20673"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25013"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25009"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-25014"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-25012"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-35521"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-17541"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-36331"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-31535"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-23841"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-20673"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-23840"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-36330"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-36332"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25010"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25014"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-3481"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-25009"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2018-25010"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-35523"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-20317"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-43267"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-3733"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-33938"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-33929"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-33928"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-22946"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-33930"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-20271"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-22947"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-009"
},
{
"trust": 0.2,
"url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10001"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-44228"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-17541"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-10001"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-28950"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2016-4658"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-4658"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33560"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3200"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28153"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3521"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-36385"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22946"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20266"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36385"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20271"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20317"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22947"
},
{
"trust": 0.1,
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24504"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27777"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20239"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36158"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35448"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3635"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20284"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36386"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-0427"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24586"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3348"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26140"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3487"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26146"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31440"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3732"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-0129"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3564"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-0427"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23133"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26144"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3679"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36312"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29368"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24588"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-29646"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-29155"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3489"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29660"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26139"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28971"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14615"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26143"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3600"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26145"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33200"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-29650"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33033"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20194"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26147"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31916"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24503"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14615"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:5137"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31829"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3573"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20197"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26141"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24587"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24503"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3659"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-35524"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-35522"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-37136"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-35523"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-37137"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21409"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36331"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html"
},
{
"trust": 0.1,
"url": "https://issues.jboss.org/):"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36330"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:5127"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-35521"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:4373"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27823"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1870"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3575"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30758"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13558"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-15389"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-5727"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5785"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-41617"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30665"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-12973"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30689"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-20847"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30682"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-18032"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1801"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1765"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-20845"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-26927"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-20847"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27918"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30749"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30795"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-5785"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1788"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5727"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30744"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21775"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21806"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27814"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36241"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30797"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13558"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20321"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27842"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1799"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21779"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29623"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3948"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27828"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-12973"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-20845"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1844"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1871"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-29338"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30734"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-26926"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30720"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28650"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27843"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24870"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27845"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-1789"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30663"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30799"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3272"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:0202"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-15389"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27824"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-36084"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-23177"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23219"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:1081"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3445"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-24407"
},
{
"trust": 0.1,
"url": "https://open-policy-agent.github.io/gatekeeper/website/docs/howto/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3999"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31566"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23308"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3521"
},
{
"trust": 0.1,
"url": "https://catalog.redhat.com/software/containers/rhacm2/gatekeeper-rhel8/5fadb4a18d9a79d2f438a5d9."
},
{
"trust": 0.1,
"url": "https://open-policy-agent.github.io/gatekeeper/website/docs/howto/."
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-43565"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-31566"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23177"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23218"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23806"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3580"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:5038"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html-single/install/index#installing"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3795"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/index"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23440"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:0580"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33574"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-40346"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-27645"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-39241"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-24348"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-44790"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25648"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-34558"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-0512"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-29923"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-0512"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:4914"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25648"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-36222"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3656"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
},
{
"db": "PACKETSTORM",
"id": "164825"
},
{
"db": "PACKETSTORM",
"id": "165631"
},
{
"db": "PACKETSTORM",
"id": "166489"
},
{
"db": "PACKETSTORM",
"id": "165209"
},
{
"db": "PACKETSTORM",
"id": "166051"
},
{
"db": "PACKETSTORM",
"id": "165135"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-167005"
},
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
},
{
"db": "PACKETSTORM",
"id": "164825"
},
{
"db": "PACKETSTORM",
"id": "165631"
},
{
"db": "PACKETSTORM",
"id": "166489"
},
{
"db": "PACKETSTORM",
"id": "165209"
},
{
"db": "PACKETSTORM",
"id": "166051"
},
{
"db": "PACKETSTORM",
"id": "165135"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-06-15T00:00:00",
"db": "VULHUB",
"id": "VHN-167005"
},
{
"date": "2021-12-15T15:27:05",
"db": "PACKETSTORM",
"id": "165296"
},
{
"date": "2021-12-15T15:20:43",
"db": "PACKETSTORM",
"id": "165287"
},
{
"date": "2021-11-10T17:02:34",
"db": "PACKETSTORM",
"id": "164825"
},
{
"date": "2022-01-20T17:48:29",
"db": "PACKETSTORM",
"id": "165631"
},
{
"date": "2022-03-28T15:52:16",
"db": "PACKETSTORM",
"id": "166489"
},
{
"date": "2021-12-09T14:50:37",
"db": "PACKETSTORM",
"id": "165209"
},
{
"date": "2022-02-18T16:37:39",
"db": "PACKETSTORM",
"id": "166051"
},
{
"date": "2021-12-03T16:41:45",
"db": "PACKETSTORM",
"id": "165135"
},
{
"date": "2020-07-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"date": "2020-06-15T17:15:10.777000",
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-167005"
},
{
"date": "2020-07-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006704"
},
{
"date": "2024-11-21T05:02:45.440000",
"db": "NVD",
"id": "CVE-2020-14155"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PCRE Integer overflow vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006704"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code execution",
"sources": [
{
"db": "PACKETSTORM",
"id": "165296"
},
{
"db": "PACKETSTORM",
"id": "165287"
}
],
"trust": 0.2
}
}
CERTFR-2023-AVI-0499
Vulnerability from certfr_avis - Published: 2023-06-30 - Updated: 2023-06-30
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.2.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2016-9596",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9596"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2017-1000381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000381"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2017-1000061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000061"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-35525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2013-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1969"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"name": "CVE-2019-13117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13117"
},
{
"name": "CVE-2019-20218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"name": "CVE-2016-2073",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2073"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2015-7941",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7941"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7942"
},
{
"name": "CVE-2015-8710",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8710"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2016-9598",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9598"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2019-13118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13118"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2016-9597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9597"
},
{
"name": "CVE-2015-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8806"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2019-5815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5815"
},
{
"name": "CVE-2019-19959",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-8872",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8872"
},
{
"name": "CVE-2020-35527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2017-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5969"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2016-4483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4483"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
}
],
"initial_release_date": "2023-06-30T00:00:00",
"last_revision_date": "2023-06-30T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0499",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus\nNetwork Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2023-23 du 29 juin 2023",
"url": "https://www.tenable.com/security/tns-2023-23"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2020-AVI-747
Vulnerability from certfr_avis - Published: 2020-11-13 - Updated: 2020-11-13
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS High Sierra versions 10.13.x versions ant\u00e9rieures \u00e0 10.13.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 14.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Mojave versions 10.14.x versions ant\u00e9rieures \u00e0 10.14.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions 11.0.x versions ant\u00e9rieures \u00e0 11.0.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27903"
},
{
"name": "CVE-2020-9977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9977"
},
{
"name": "CVE-2020-9945",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9945"
},
{
"name": "CVE-2020-9991",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9991"
},
{
"name": "CVE-2020-9941",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9941"
},
{
"name": "CVE-2020-9963",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9963"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-27894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27894"
},
{
"name": "CVE-2020-9883",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9883"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2020-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27918"
},
{
"name": "CVE-2020-27912",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27912"
},
{
"name": "CVE-2020-9944",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9944"
},
{
"name": "CVE-2020-10016",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10016"
},
{
"name": "CVE-2020-9974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9974"
},
{
"name": "CVE-2020-10003",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10003"
},
{
"name": "CVE-2020-27906",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27906"
},
{
"name": "CVE-2020-27950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27950"
},
{
"name": "CVE-2020-27911",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27911"
},
{
"name": "CVE-2020-9988",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9988"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10009"
},
{
"name": "CVE-2020-9849",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9849"
},
{
"name": "CVE-2020-27932",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27932"
},
{
"name": "CVE-2020-10002",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10002"
},
{
"name": "CVE-2020-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9996"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2020-27930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27930"
},
{
"name": "CVE-2020-9876",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9876"
},
{
"name": "CVE-2020-9999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9999"
},
{
"name": "CVE-2020-10014",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10014"
},
{
"name": "CVE-2020-9949",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9949"
},
{
"name": "CVE-2020-10006",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10006"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-9942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9942"
},
{
"name": "CVE-2020-10007",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10007"
},
{
"name": "CVE-2020-10663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10663"
},
{
"name": "CVE-2020-10004",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10004"
},
{
"name": "CVE-2020-9966",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9966"
},
{
"name": "CVE-2020-9965",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9965"
},
{
"name": "CVE-2020-13524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13524"
},
{
"name": "CVE-2020-9969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9969"
},
{
"name": "CVE-2020-27900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27900"
},
{
"name": "CVE-2020-10012",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10012"
},
{
"name": "CVE-2020-27917",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27917"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-9989",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9989"
},
{
"name": "CVE-2020-27896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27896"
},
{
"name": "CVE-2020-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27904"
},
{
"name": "CVE-2020-27898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27898"
},
{
"name": "CVE-2020-27916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27916"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2020-10017",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10017"
},
{
"name": "CVE-2020-27910",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27910"
},
{
"name": "CVE-2020-10010",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10010"
},
{
"name": "CVE-2020-9943",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9943"
},
{
"name": "CVE-2020-27927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27927"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
}
],
"initial_release_date": "2020-11-13T00:00:00",
"last_revision_date": "2020-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-747",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT211934 du 12 novembre 2020",
"url": "https://support.apple.com/fr-fr/HT211934"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT211946 du 12 novembre 2020",
"url": "https://support.apple.com/fr-fr/HT211946"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT211931 du 12 novembre 2020",
"url": "https://support.apple.com/fr-fr/HT211931"
}
]
}
CERTFR-2023-AVI-0701
Vulnerability from certfr_avis - Published: 2023-08-31 - Updated: 2023-08-31
De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Universal Forwarder versions 9.0.x antérieures à 9.0.6 | ||
| Splunk | N/A | Splunk ITSI versions 4.15.x antérieures à 4.15.3 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.0.2305.200 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk ITSI versions 4.13.x antérieures à 4.13.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Universal Forwarder versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.15.x ant\u00e9rieures \u00e0 4.15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2305.200",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.13.x ant\u00e9rieures \u00e0 4.13.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2021-27919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27919"
},
{
"name": "CVE-2019-20454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20454"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-4571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4571"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2022-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2023-40592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40592"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-40596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40596"
},
{
"name": "CVE-2023-40594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40594"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2023-40595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40595"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2021-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
},
{
"name": "CVE-2023-40597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40597"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-40023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-40598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40598"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2023-40593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40593"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2021-20066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20066"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"initial_release_date": "2023-08-31T00:00:00",
"last_revision_date": "2023-08-31T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0802 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0804 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0806 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0810 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0810"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0807 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0807"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0808 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0808"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0803 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0801 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0805 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0809 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0809"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0811 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0811"
}
]
}
CERTFR-2024-AVI-0939
Vulnerability from certfr_avis - Published: 2024-10-31 - Updated: 2024-10-31
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 | ||
| IBM | QRadar | QRadar App SDK versions antérieures à 2.2.2 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 | ||
| IBM | Cloud Pak | Cloud Pak versions antérieures à 2.3.5.0 pour Power | ||
| IBM | Cloud Pak | Cloud Pak versions antérieures à 2.3.4.1 pour Intel | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.x antérieures à 6.1.0.2 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar App SDK versions ant\u00e9rieures \u00e0 2.2.2",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak versions ant\u00e9rieures \u00e0 2.3.5.0 pour Power",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak versions ant\u00e9rieures \u00e0 2.3.4.1 pour Intel",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 ",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2023-52296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52296"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2024-25046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25046"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2024-27254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27254"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-22360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22360"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2023-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38729"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2012-2677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
}
],
"initial_release_date": "2024-10-31T00:00:00",
"last_revision_date": "2024-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0939",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174441",
"url": "https://www.ibm.com/support/pages/node/7174441"
},
{
"published_at": "2024-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174420",
"url": "https://www.ibm.com/support/pages/node/7174420"
},
{
"published_at": "2024-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7169788",
"url": "https://www.ibm.com/support/pages/node/7169788"
},
{
"published_at": "2024-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174440",
"url": "https://www.ibm.com/support/pages/node/7174440"
}
]
}
CERTFR-2023-AVI-1007
Vulnerability from certfr_avis - Published: 2023-12-08 - Updated: 2023-12-08
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Informix Dynamic Server versions antérieures à 14.10.FC10W1 | ||
| IBM | QRadar User Behavior Analytics | QRadar User Behavior Analytics versions antérieures à 4.1.14 | ||
| IBM | Db2 | IBM Db2 versions 10.5.0.x, 11.1.4.x et 11.5.x sans les derniers correctifs de sécurité temporaires (les sorties des versions correctives seront annoncées ultérieurement) |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Informix Dynamic Server versions ant\u00e9rieures \u00e0 14.10.FC10W1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 4.1.14",
"product": {
"name": "QRadar User Behavior Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 10.5.0.x, 11.1.4.x et 11.5.x sans les derniers correctifs de s\u00e9curit\u00e9 temporaires (les sorties des versions correctives seront annonc\u00e9es ult\u00e9rieurement)",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-28523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28523"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-28527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28527"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2023-28526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28526"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
}
],
"initial_release_date": "2023-12-08T00:00:00",
"last_revision_date": "2023-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-1007",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7087225 du 01 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7087225"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7070188 du 04 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7070188"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7087162 du 01 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7087162"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7090362 du 05 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7090362"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7087234 du 01 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7087234"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7078681 du 01 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7078681"
}
]
}
CERTFR-2021-AVI-072
Vulnerability from certfr_avis - Published: 2021-02-02 - Updated: 2021-02-02
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Catalina sans le correctif de s\u00e9curit\u00e9 2021-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 14.0.3",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Mojave sans le correctif de s\u00e9curit\u00e9 2021-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1778",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1778"
},
{
"name": "CVE-2021-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1789"
},
{
"name": "CVE-2021-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1762"
},
{
"name": "CVE-2021-1773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1773"
},
{
"name": "CVE-2021-1761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1761"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2021-1775",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1775"
},
{
"name": "CVE-2020-27937",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27937"
},
{
"name": "CVE-2021-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1738"
},
{
"name": "CVE-2021-1777",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1777"
},
{
"name": "CVE-2021-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1787"
},
{
"name": "CVE-2021-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1766"
},
{
"name": "CVE-2021-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1745"
},
{
"name": "CVE-2021-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1736"
},
{
"name": "CVE-2021-1764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1764"
},
{
"name": "CVE-2021-1743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1743"
},
{
"name": "CVE-2021-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1786"
},
{
"name": "CVE-2021-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1788"
},
{
"name": "CVE-2021-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1737"
},
{
"name": "CVE-2021-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1792"
},
{
"name": "CVE-2020-29614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29614"
},
{
"name": "CVE-2021-1785",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1785"
},
{
"name": "CVE-2021-1818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1818"
},
{
"name": "CVE-2021-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1782"
},
{
"name": "CVE-2021-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1793"
},
{
"name": "CVE-2020-29633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29633"
},
{
"name": "CVE-2021-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1751"
},
{
"name": "CVE-2021-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1797"
},
{
"name": "CVE-2020-29608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29608"
},
{
"name": "CVE-2021-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1791"
},
{
"name": "CVE-2021-1871",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1871"
},
{
"name": "CVE-2021-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1801"
},
{
"name": "CVE-2021-1783",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1783"
},
{
"name": "CVE-2021-1870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1870"
},
{
"name": "CVE-2020-27938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27938"
},
{
"name": "CVE-2021-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1767"
},
{
"name": "CVE-2021-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1771"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1802"
},
{
"name": "CVE-2021-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1747"
},
{
"name": "CVE-2021-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1790"
},
{
"name": "CVE-2021-1765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1765"
},
{
"name": "CVE-2021-1799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1799"
},
{
"name": "CVE-2021-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1746"
},
{
"name": "CVE-2021-1754",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1754"
},
{
"name": "CVE-2021-1772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1772"
},
{
"name": "CVE-2021-1776",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1776"
},
{
"name": "CVE-2021-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1753"
},
{
"name": "CVE-2021-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1741"
},
{
"name": "CVE-2021-1750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1750"
},
{
"name": "CVE-2021-1744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1744"
},
{
"name": "CVE-2021-1742",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1742"
},
{
"name": "CVE-2021-1760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1760"
},
{
"name": "CVE-2020-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27904"
},
{
"name": "CVE-2021-1757",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1757"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-1768",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1768"
},
{
"name": "CVE-2021-1774",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1774"
},
{
"name": "CVE-2021-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1769"
},
{
"name": "CVE-2021-1759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1759"
},
{
"name": "CVE-2021-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1763"
},
{
"name": "CVE-2021-1779",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1779"
},
{
"name": "CVE-2021-1758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1758"
},
{
"name": "CVE-2020-27945",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27945"
}
],
"initial_release_date": "2021-02-02T00:00:00",
"last_revision_date": "2021-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-072",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212152 du 01 f\u00e9vrier 2021",
"url": "https://support.apple.com/fr-fr/HT212152"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212147 du 01 f\u00e9vrier 2021",
"url": "https://support.apple.com/fr-fr/HT212147"
}
]
}
CERTFR-2022-AVI-386
Vulnerability from certfr_avis - Published: 2022-04-26 - Updated: 2022-04-26
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.0 antérieure à 7.5.0 UP1 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.3 antérieures à 7.4.3 FP5 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.3 antérieures à 7.3.3 FP11 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM version 7.5.0 ant\u00e9rieure \u00e0 7.5.0 UP1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.4.3 ant\u00e9rieures \u00e0 7.4.3 FP5",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.3 ant\u00e9rieures \u00e0 7.3.3 FP11",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3200"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2020-8022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8022"
},
{
"name": "CVE-2021-38919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38919"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2021-33929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33929"
},
{
"name": "CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"name": "CVE-2021-38939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38939"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2021-38874",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38874"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2021-33928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33928"
},
{
"name": "CVE-2021-36086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2019-17594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
},
{
"name": "CVE-2021-38869",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38869"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9488"
},
{
"name": "CVE-2020-24370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24370"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
},
{
"name": "CVE-2020-16135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16135"
},
{
"name": "CVE-2021-36085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
},
{
"name": "CVE-2021-29776",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29776"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2019-17595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
},
{
"name": "CVE-2021-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23214"
},
{
"name": "CVE-2021-33930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33930"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"name": "CVE-2021-28153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22345"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-38878",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38878"
},
{
"name": "CVE-2021-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22096"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-36084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2021-33938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33938"
}
],
"initial_release_date": "2022-04-26T00:00:00",
"last_revision_date": "2022-04-26T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-386",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar SIEM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar SIEM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574453 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574453"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574787 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574787"
}
]
}
CERTFR-2025-AVI-1137
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Security QRadar Network Threat | Security QRadar Network Threat Analytics versions postérieures ou égales à 1.3.1 et antérieures à 1.4.2 | ||
| IBM | QRadar SIEM | Security QRadar Analyst Workflow versions postérieures à 2.32.0 et antérieures à 3.0.1 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct File Agent pour Solaris SPARC versions 1.4.x antérieures à 1.4.0.5_iFix002 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct File Agent pour AIX, Linux x64, Linux PPC et Windows versions postérieures à 1.4.0.2 et antérieures à 1.4.0.5_iFix001 | ||
| IBM | WebSphere | WebSphere Service Registry and Repository Studio versions 8.5.x antérieures à V8.5.6.3_IJ56659 | ||
| IBM | Db2 | Db2 Big SQL versions postérieures à 7.2.x sur Cloud Pack for Data 4.x versions antérieures à 7.7.3 sur Cloud Pack for Data 5.0.3 | ||
| IBM | WebSphere | WebSphere Service Registry and Repository sans les derniers correctifs de sécurité | ||
| IBM | Security QRadar SIEM | QRadar User Behavior Analytics versions postérieurs à 4.1.15 et antérieures à 5.0.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar Network Threat Analytics versions post\u00e9rieures ou \u00e9gales \u00e0 1.3.1 et ant\u00e9rieures \u00e0 1.4.2",
"product": {
"name": "Security QRadar Network Threat",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar Analyst Workflow versions post\u00e9rieures \u00e0 2.32.0 et ant\u00e9rieures \u00e0 3.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct File Agent pour Solaris SPARC versions 1.4.x ant\u00e9rieures \u00e0 1.4.0.5_iFix002 ",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct File Agent pour AIX, Linux x64, Linux PPC et Windows versions post\u00e9rieures \u00e0 1.4.0.2 et ant\u00e9rieures \u00e0 1.4.0.5_iFix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository Studio versions 8.5.x ant\u00e9rieures \u00e0 V8.5.6.3_IJ56659",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Db2 Big SQL versions post\u00e9rieures \u00e0 7.2.x sur Cloud Pack for Data 4.x versions ant\u00e9rieures \u00e0 7.7.3 sur Cloud Pack for Data 5.0.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar User Behavior Analytics versions post\u00e9rieurs \u00e0 4.1.15 et ant\u00e9rieures \u00e0 5.0.3",
"product": {
"name": "Security QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2025-47279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47279"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2025-54798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54798"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-57822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57822"
},
{
"name": "CVE-2025-67779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67779"
},
{
"name": "CVE-2025-55183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55183"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-55173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55173"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-55182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55182"
},
{
"name": "CVE-2025-57752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57752"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-8384",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8384"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-55184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55184"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1137",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255497",
"url": "https://www.ibm.com/support/pages/node/7255497"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255727",
"url": "https://www.ibm.com/support/pages/node/7255727"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255495",
"url": "https://www.ibm.com/support/pages/node/7255495"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255496",
"url": "https://www.ibm.com/support/pages/node/7255496"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255723",
"url": "https://www.ibm.com/support/pages/node/7255723"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255557",
"url": "https://www.ibm.com/support/pages/node/7255557"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255410",
"url": "https://www.ibm.com/support/pages/node/7255410"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255729",
"url": "https://www.ibm.com/support/pages/node/7255729"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255556",
"url": "https://www.ibm.com/support/pages/node/7255556"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7255731",
"url": "https://www.ibm.com/support/pages/node/7255731"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: 2024-02-16 - Updated: 2024-02-16
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
SUSE-SU-2021:3529-1
Vulnerability from csaf_suse - Published: 2021-10-27 07:23 - Updated: 2021-10-27 07:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for pcre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for pcre fixes the following issues:\n\nUpdate pcre to version 8.45:\n\n- CVE-2020-14155: Fixed integer overflow via a large number after a \u0027(?C\u0027 substring (bsc#1172974).\n- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3529,SUSE-SLE-Module-Basesystem-15-SP2-2021-3529,SUSE-SLE-Module-Basesystem-15-SP3-2021-3529,SUSE-SUSE-MicroOS-5.0-2021-3529,SUSE-SUSE-MicroOS-5.1-2021-3529",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3529-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3529-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213529-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3529-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html"
},
{
"category": "self",
"summary": "SUSE Bug 1172973",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "self",
"summary": "SUSE Bug 1172974",
"url": "https://bugzilla.suse.com/1172974"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20838 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14155 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14155/"
}
],
"title": "Security update for pcre",
"tracking": {
"current_release_date": "2021-10-27T07:23:57Z",
"generator": {
"date": "2021-10-27T07:23:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3529-1",
"initial_release_date": "2021-10-27T07:23:57Z",
"revision_history": [
{
"date": "2021-10-27T07:23:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.aarch64",
"product": {
"name": "libpcre1-8.45-20.10.1.aarch64",
"product_id": "libpcre1-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcre16-0-8.45-20.10.1.aarch64",
"product_id": "libpcre16-0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.aarch64",
"product_id": "libpcrecpp0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcreposix0-8.45-20.10.1.aarch64",
"product_id": "libpcreposix0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-devel-8.45-20.10.1.aarch64",
"product_id": "pcre-devel-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.aarch64",
"product_id": "pcre-devel-static-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-tools-8.45-20.10.1.aarch64",
"product_id": "pcre-tools-8.45-20.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-64bit-8.45-20.10.1.aarch64_ilp32",
"product": {
"name": "libpcre1-64bit-8.45-20.10.1.aarch64_ilp32",
"product_id": "libpcre1-64bit-8.45-20.10.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcre16-0-64bit-8.45-20.10.1.aarch64_ilp32",
"product": {
"name": "libpcre16-0-64bit-8.45-20.10.1.aarch64_ilp32",
"product_id": "libpcre16-0-64bit-8.45-20.10.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-64bit-8.45-20.10.1.aarch64_ilp32",
"product": {
"name": "libpcrecpp0-64bit-8.45-20.10.1.aarch64_ilp32",
"product_id": "libpcrecpp0-64bit-8.45-20.10.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcreposix0-64bit-8.45-20.10.1.aarch64_ilp32",
"product": {
"name": "libpcreposix0-64bit-8.45-20.10.1.aarch64_ilp32",
"product_id": "libpcreposix0-64bit-8.45-20.10.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.i586",
"product": {
"name": "libpcre1-8.45-20.10.1.i586",
"product_id": "libpcre1-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.i586",
"product": {
"name": "libpcre16-0-8.45-20.10.1.i586",
"product_id": "libpcre16-0-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.i586",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.i586",
"product_id": "libpcrecpp0-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.i586",
"product": {
"name": "libpcreposix0-8.45-20.10.1.i586",
"product_id": "libpcreposix0-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.i586",
"product": {
"name": "pcre-devel-8.45-20.10.1.i586",
"product_id": "pcre-devel-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.i586",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.i586",
"product_id": "pcre-devel-static-8.45-20.10.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.i586",
"product": {
"name": "pcre-tools-8.45-20.10.1.i586",
"product_id": "pcre-tools-8.45-20.10.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-doc-8.45-20.10.1.noarch",
"product": {
"name": "pcre-doc-8.45-20.10.1.noarch",
"product_id": "pcre-doc-8.45-20.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcre1-8.45-20.10.1.ppc64le",
"product_id": "libpcre1-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcre16-0-8.45-20.10.1.ppc64le",
"product_id": "libpcre16-0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.ppc64le",
"product_id": "libpcrecpp0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcreposix0-8.45-20.10.1.ppc64le",
"product_id": "libpcreposix0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-devel-8.45-20.10.1.ppc64le",
"product_id": "pcre-devel-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.ppc64le",
"product_id": "pcre-devel-static-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-tools-8.45-20.10.1.ppc64le",
"product_id": "pcre-tools-8.45-20.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.s390x",
"product": {
"name": "libpcre1-8.45-20.10.1.s390x",
"product_id": "libpcre1-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.s390x",
"product": {
"name": "libpcre16-0-8.45-20.10.1.s390x",
"product_id": "libpcre16-0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.s390x",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.s390x",
"product_id": "libpcrecpp0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.s390x",
"product": {
"name": "libpcreposix0-8.45-20.10.1.s390x",
"product_id": "libpcreposix0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.s390x",
"product": {
"name": "pcre-devel-8.45-20.10.1.s390x",
"product_id": "pcre-devel-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.s390x",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.s390x",
"product_id": "pcre-devel-static-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.s390x",
"product": {
"name": "pcre-tools-8.45-20.10.1.s390x",
"product_id": "pcre-tools-8.45-20.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre1-8.45-20.10.1.x86_64",
"product_id": "libpcre1-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre1-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre1-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcre1-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre16-0-8.45-20.10.1.x86_64",
"product_id": "libpcre16-0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre16-0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcre16-0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.x86_64",
"product_id": "libpcrecpp0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcrecpp0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcreposix0-8.45-20.10.1.x86_64",
"product_id": "libpcreposix0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcreposix0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcreposix0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-devel-8.45-20.10.1.x86_64",
"product_id": "pcre-devel-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.x86_64",
"product_id": "pcre-devel-static-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-tools-8.45-20.10.1.x86_64",
"product_id": "pcre-tools-8.45-20.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre1-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre1-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x"
},
"product_reference": "libpcre1-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x"
},
"product_reference": "libpcre16-0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x"
},
"product_reference": "libpcreposix0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-devel-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x"
},
"product_reference": "pcre-devel-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-devel-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-tools-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-tools-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x"
},
"product_reference": "pcre-tools-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-tools-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre1-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre1-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x"
},
"product_reference": "libpcre1-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x"
},
"product_reference": "libpcre16-0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x"
},
"product_reference": "libpcreposix0-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-devel-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x"
},
"product_reference": "pcre-devel-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-devel-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-tools-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-tools-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x"
},
"product_reference": "pcre-tools-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-tools-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre1-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre1-8.45-20.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x"
},
"product_reference": "libpcre1-8.45-20.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-8.45-20.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20838"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20838",
"url": "https://www.suse.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "SUSE Bug 1172973 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "external",
"summary": "SUSE Bug 1189526 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1189526"
},
{
"category": "external",
"summary": "SUSE Bug 1193384 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1193384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-27T07:23:57Z",
"details": "important"
}
],
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14155"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14155",
"url": "https://www.suse.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "SUSE Bug 1172974 for CVE-2020-14155",
"url": "https://bugzilla.suse.com/1172974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:pcre-tools-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre1-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcre16-0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcrecpp0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libpcreposix0-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-devel-8.45-20.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-27T07:23:57Z",
"details": "moderate"
}
],
"title": "CVE-2020-14155"
}
]
}
SUSE-SU-2021:3652-1
Vulnerability from csaf_suse - Published: 2021-11-10 16:40 - Updated: 2021-11-10 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for pcre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for pcre fixes the following issues:\n\nUpdate pcre to version 8.45:\n\n- CVE-2020-14155: Fixed integer overflow via a large number after a \u0027(?C\u0027 substring (bsc#1172974).\n- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).\n- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).\n- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).\n- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).\n- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).\n- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-3652,SUSE-2021-3652,SUSE-OpenStack-Cloud-8-2021-3652,SUSE-OpenStack-Cloud-9-2021-3652,SUSE-OpenStack-Cloud-Crowbar-8-2021-3652,SUSE-OpenStack-Cloud-Crowbar-9-2021-3652,SUSE-SLE-HA-12-SP3-2021-3652,SUSE-SLE-HA-12-SP4-2021-3652,SUSE-SLE-HA-12-SP5-2021-3652,SUSE-SLE-SAP-12-SP3-2021-3652,SUSE-SLE-SAP-12-SP4-2021-3652,SUSE-SLE-SDK-12-SP5-2021-3652,SUSE-SLE-SERVER-12-SP2-BCL-2021-3652,SUSE-SLE-SERVER-12-SP3-2021-3652,SUSE-SLE-SERVER-12-SP3-BCL-2021-3652,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3652,SUSE-SLE-SERVER-12-SP5-2021-3652,SUSE-SLE-WE-12-SP5-2021-3652",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3652-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3652-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213652-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3652-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html"
},
{
"category": "self",
"summary": "SUSE Bug 1025709",
"url": "https://bugzilla.suse.com/1025709"
},
{
"category": "self",
"summary": "SUSE Bug 1030066",
"url": "https://bugzilla.suse.com/1030066"
},
{
"category": "self",
"summary": "SUSE Bug 1030803",
"url": "https://bugzilla.suse.com/1030803"
},
{
"category": "self",
"summary": "SUSE Bug 1030805",
"url": "https://bugzilla.suse.com/1030805"
},
{
"category": "self",
"summary": "SUSE Bug 1030807",
"url": "https://bugzilla.suse.com/1030807"
},
{
"category": "self",
"summary": "SUSE Bug 1172973",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "self",
"summary": "SUSE Bug 1172974",
"url": "https://bugzilla.suse.com/1172974"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6004 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7186 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7244 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7245 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7246 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20838 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14155 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14155/"
}
],
"title": "Security update for pcre",
"tracking": {
"current_release_date": "2021-11-10T16:40:42Z",
"generator": {
"date": "2021-11-10T16:40:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3652-1",
"initial_release_date": "2021-11-10T16:40:42Z",
"revision_history": [
{
"date": "2021-11-10T16:40:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.aarch64",
"product": {
"name": "libpcre1-8.45-8.7.1.aarch64",
"product_id": "libpcre1-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.aarch64",
"product": {
"name": "libpcre16-0-8.45-8.7.1.aarch64",
"product_id": "libpcre16-0-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.aarch64",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64",
"product_id": "libpcrecpp0-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.aarch64",
"product": {
"name": "libpcreposix0-8.45-8.7.1.aarch64",
"product_id": "libpcreposix0-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.aarch64",
"product": {
"name": "pcre-devel-8.45-8.7.1.aarch64",
"product_id": "pcre-devel-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.aarch64",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.aarch64",
"product_id": "pcre-devel-static-8.45-8.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.aarch64",
"product": {
"name": "pcre-tools-8.45-8.7.1.aarch64",
"product_id": "pcre-tools-8.45-8.7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-64bit-8.45-8.7.1.aarch64_ilp32",
"product": {
"name": "libpcre1-64bit-8.45-8.7.1.aarch64_ilp32",
"product_id": "libpcre1-64bit-8.45-8.7.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcre16-0-64bit-8.45-8.7.1.aarch64_ilp32",
"product": {
"name": "libpcre16-0-64bit-8.45-8.7.1.aarch64_ilp32",
"product_id": "libpcre16-0-64bit-8.45-8.7.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-64bit-8.45-8.7.1.aarch64_ilp32",
"product": {
"name": "libpcrecpp0-64bit-8.45-8.7.1.aarch64_ilp32",
"product_id": "libpcrecpp0-64bit-8.45-8.7.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpcreposix0-64bit-8.45-8.7.1.aarch64_ilp32",
"product": {
"name": "libpcreposix0-64bit-8.45-8.7.1.aarch64_ilp32",
"product_id": "libpcreposix0-64bit-8.45-8.7.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.i586",
"product": {
"name": "libpcre1-8.45-8.7.1.i586",
"product_id": "libpcre1-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.i586",
"product": {
"name": "libpcre16-0-8.45-8.7.1.i586",
"product_id": "libpcre16-0-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.i586",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.i586",
"product_id": "libpcrecpp0-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.i586",
"product": {
"name": "libpcreposix0-8.45-8.7.1.i586",
"product_id": "libpcreposix0-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.i586",
"product": {
"name": "pcre-devel-8.45-8.7.1.i586",
"product_id": "pcre-devel-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.i586",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.i586",
"product_id": "pcre-devel-static-8.45-8.7.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.i586",
"product": {
"name": "pcre-tools-8.45-8.7.1.i586",
"product_id": "pcre-tools-8.45-8.7.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "selinux-policy-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-20140730-36.5.2.noarch",
"product_id": "selinux-policy-20140730-36.5.2.noarch"
}
},
{
"category": "product_version",
"name": "selinux-policy-devel-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch",
"product_id": "selinux-policy-devel-20140730-36.5.2.noarch"
}
},
{
"category": "product_version",
"name": "selinux-policy-minimum-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch",
"product_id": "selinux-policy-minimum-20140730-36.5.2.noarch"
}
},
{
"category": "product_version",
"name": "pcre-doc-8.45-8.7.1.noarch",
"product": {
"name": "pcre-doc-8.45-8.7.1.noarch",
"product_id": "pcre-doc-8.45-8.7.1.noarch"
}
},
{
"category": "product_version",
"name": "selinux-policy-doc-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-doc-20140730-36.5.2.noarch",
"product_id": "selinux-policy-doc-20140730-36.5.2.noarch"
}
},
{
"category": "product_version",
"name": "selinux-policy-mls-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-mls-20140730-36.5.2.noarch",
"product_id": "selinux-policy-mls-20140730-36.5.2.noarch"
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-20140730-36.5.2.noarch",
"product": {
"name": "selinux-policy-targeted-20140730-36.5.2.noarch",
"product_id": "selinux-policy-targeted-20140730-36.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.ppc64le",
"product": {
"name": "libpcre1-8.45-8.7.1.ppc64le",
"product_id": "libpcre1-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.ppc64le",
"product": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le",
"product_id": "libpcre16-0-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.ppc64le",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le",
"product_id": "libpcrecpp0-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.ppc64le",
"product": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le",
"product_id": "libpcreposix0-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.ppc64le",
"product": {
"name": "pcre-devel-8.45-8.7.1.ppc64le",
"product_id": "pcre-devel-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.ppc64le",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.ppc64le",
"product_id": "pcre-devel-static-8.45-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.ppc64le",
"product": {
"name": "pcre-tools-8.45-8.7.1.ppc64le",
"product_id": "pcre-tools-8.45-8.7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.s390",
"product": {
"name": "libpcre1-8.45-8.7.1.s390",
"product_id": "libpcre1-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.s390",
"product": {
"name": "libpcre16-0-8.45-8.7.1.s390",
"product_id": "libpcre16-0-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.s390",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.s390",
"product_id": "libpcrecpp0-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.s390",
"product": {
"name": "libpcreposix0-8.45-8.7.1.s390",
"product_id": "libpcreposix0-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.s390",
"product": {
"name": "pcre-devel-8.45-8.7.1.s390",
"product_id": "pcre-devel-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.s390",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.s390",
"product_id": "pcre-devel-static-8.45-8.7.1.s390"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.s390",
"product": {
"name": "pcre-tools-8.45-8.7.1.s390",
"product_id": "pcre-tools-8.45-8.7.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.s390x",
"product": {
"name": "libpcre1-8.45-8.7.1.s390x",
"product_id": "libpcre1-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcre1-32bit-8.45-8.7.1.s390x",
"product": {
"name": "libpcre1-32bit-8.45-8.7.1.s390x",
"product_id": "libpcre1-32bit-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.s390x",
"product": {
"name": "libpcre16-0-8.45-8.7.1.s390x",
"product_id": "libpcre16-0-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcre16-0-32bit-8.45-8.7.1.s390x",
"product": {
"name": "libpcre16-0-32bit-8.45-8.7.1.s390x",
"product_id": "libpcre16-0-32bit-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.s390x",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.s390x",
"product_id": "libpcrecpp0-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-32bit-8.45-8.7.1.s390x",
"product": {
"name": "libpcrecpp0-32bit-8.45-8.7.1.s390x",
"product_id": "libpcrecpp0-32bit-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.s390x",
"product": {
"name": "libpcreposix0-8.45-8.7.1.s390x",
"product_id": "libpcreposix0-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcreposix0-32bit-8.45-8.7.1.s390x",
"product": {
"name": "libpcreposix0-32bit-8.45-8.7.1.s390x",
"product_id": "libpcreposix0-32bit-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.s390x",
"product": {
"name": "pcre-devel-8.45-8.7.1.s390x",
"product_id": "pcre-devel-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.s390x",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.s390x",
"product_id": "pcre-devel-static-8.45-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.s390x",
"product": {
"name": "pcre-tools-8.45-8.7.1.s390x",
"product_id": "pcre-tools-8.45-8.7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-8.7.1.x86_64",
"product": {
"name": "libpcre1-8.45-8.7.1.x86_64",
"product_id": "libpcre1-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre1-32bit-8.45-8.7.1.x86_64",
"product": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64",
"product_id": "libpcre1-32bit-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-8.7.1.x86_64",
"product": {
"name": "libpcre16-0-8.45-8.7.1.x86_64",
"product_id": "libpcre16-0-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-8.7.1.x86_64",
"product": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64",
"product_id": "libpcrecpp0-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-8.7.1.x86_64",
"product": {
"name": "libpcreposix0-8.45-8.7.1.x86_64",
"product_id": "libpcreposix0-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-8.7.1.x86_64",
"product": {
"name": "pcre-devel-8.45-8.7.1.x86_64",
"product_id": "pcre-devel-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-32bit-8.45-8.7.1.x86_64",
"product": {
"name": "libpcre16-0-32bit-8.45-8.7.1.x86_64",
"product_id": "libpcre16-0-32bit-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"product": {
"name": "libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"product_id": "libpcrecpp0-32bit-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-32bit-8.45-8.7.1.x86_64",
"product": {
"name": "libpcreposix0-32bit-8.45-8.7.1.x86_64",
"product_id": "libpcreposix0-32bit-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-8.7.1.x86_64",
"product": {
"name": "pcre-devel-static-8.45-8.7.1.x86_64",
"product_id": "pcre-devel-static-8.45-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-8.7.1.x86_64",
"product": {
"name": "pcre-tools-8.45-8.7.1.x86_64",
"product_id": "pcre-tools-8.45-8.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-static-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-static-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-static-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-static-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-tools-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-tools-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x"
},
"product_reference": "pcre-tools-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-tools-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre1-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x"
},
"product_reference": "libpcre16-0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre1-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x"
},
"product_reference": "libpcre16-0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre1-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x"
},
"product_reference": "libpcre16-0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre1-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre1-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x"
},
"product_reference": "libpcre16-0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x"
},
"product_reference": "libpcreposix0-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64"
},
"product_reference": "pcre-devel-8.45-8.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x"
},
"product_reference": "pcre-devel-8.45-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64"
},
"product_reference": "pcre-devel-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-devel-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-minimum-20140730-36.5.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch"
},
"product_reference": "selinux-policy-minimum-20140730-36.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-32bit-8.45-8.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64"
},
"product_reference": "libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-6004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6004"
}
],
"notes": [
{
"category": "general",
"text": "The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6004",
"url": "https://www.suse.com/security/cve/CVE-2017-6004"
},
{
"category": "external",
"summary": "SUSE Bug 1025709 for CVE-2017-6004",
"url": "https://bugzilla.suse.com/1025709"
},
{
"category": "external",
"summary": "SUSE Bug 1191803 for CVE-2017-6004",
"url": "https://bugzilla.suse.com/1191803"
},
{
"category": "external",
"summary": "SUSE Bug 1193384 for CVE-2017-6004",
"url": "https://bugzilla.suse.com/1193384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "important"
}
],
"title": "CVE-2017-6004"
},
{
"cve": "CVE-2017-7186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7186"
}
],
"notes": [
{
"category": "general",
"text": "libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7186",
"url": "https://www.suse.com/security/cve/CVE-2017-7186"
},
{
"category": "external",
"summary": "SUSE Bug 1030066 for CVE-2017-7186",
"url": "https://bugzilla.suse.com/1030066"
},
{
"category": "external",
"summary": "SUSE Bug 1037164 for CVE-2017-7186",
"url": "https://bugzilla.suse.com/1037164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "moderate"
}
],
"title": "CVE-2017-7186"
},
{
"cve": "CVE-2017-7244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7244"
}
],
"notes": [
{
"category": "general",
"text": "The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7244",
"url": "https://www.suse.com/security/cve/CVE-2017-7244"
},
{
"category": "external",
"summary": "SUSE Bug 1030807 for CVE-2017-7244",
"url": "https://bugzilla.suse.com/1030807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "moderate"
}
],
"title": "CVE-2017-7244"
},
{
"cve": "CVE-2017-7245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7245"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7245",
"url": "https://www.suse.com/security/cve/CVE-2017-7245"
},
{
"category": "external",
"summary": "SUSE Bug 1030805 for CVE-2017-7245",
"url": "https://bugzilla.suse.com/1030805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "low"
}
],
"title": "CVE-2017-7245"
},
{
"cve": "CVE-2017-7246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7246"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7246",
"url": "https://www.suse.com/security/cve/CVE-2017-7246"
},
{
"category": "external",
"summary": "SUSE Bug 1030803 for CVE-2017-7246",
"url": "https://bugzilla.suse.com/1030803"
},
{
"category": "external",
"summary": "SUSE Bug 1030805 for CVE-2017-7246",
"url": "https://bugzilla.suse.com/1030805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "low"
}
],
"title": "CVE-2017-7246"
},
{
"cve": "CVE-2019-20838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20838"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20838",
"url": "https://www.suse.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "SUSE Bug 1172973 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "external",
"summary": "SUSE Bug 1189526 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1189526"
},
{
"category": "external",
"summary": "SUSE Bug 1193384 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1193384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "important"
}
],
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14155"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14155",
"url": "https://www.suse.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "SUSE Bug 1172974 for CVE-2020-14155",
"url": "https://bugzilla.suse.com/1172974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre1-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcre16-0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcrecpp0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:libpcreposix0-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:pcre-devel-8.45-8.7.1.x86_64",
"HPE Helion OpenStack 8:selinux-policy-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-devel-20140730-36.5.2.noarch",
"HPE Helion OpenStack 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre1-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-devel-static-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:pcre-tools-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-32bit-8.45-8.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud 9:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 8:selinux-policy-minimum-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-32bit-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre1-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcre16-0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcrecpp0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libpcreposix0-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:pcre-devel-8.45-8.7.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-devel-20140730-36.5.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:selinux-policy-minimum-20140730-36.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-10T16:40:42Z",
"details": "moderate"
}
],
"title": "CVE-2020-14155"
}
]
}
RHSA-2021:4613
Vulnerability from csaf_redhat - Published: 2021-11-10 17:14 - Updated: 2026-01-08 12:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 10 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)\n* httpd: mod_session NULL pointer dereference in parser (CVE-2021-26690)\n* httpd: Heap overflow in mod_session (CVE-2021-26691)\n* httpd: mod_proxy_wstunnel tunneling of non Upgraded connection (CVE-2019-17567)\n* httpd: MergeSlashes regression (CVE-2021-30641)\n* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)\n* jbcs-httpd24-openssl: openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n* pcre: buffer over-read in JIT when UTF is disabled (CVE-2019-20838)\n* pcre: integer overflow in libpcre (CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4613",
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "external",
"summary": "1930310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310"
},
{
"category": "external",
"summary": "1930324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324"
},
{
"category": "external",
"summary": "1966724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724"
},
{
"category": "external",
"summary": "1966729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729"
},
{
"category": "external",
"summary": "1966732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
},
{
"category": "external",
"summary": "1966738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738"
},
{
"category": "external",
"summary": "1966740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740"
},
{
"category": "external",
"summary": "1966743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743"
},
{
"category": "external",
"summary": "1995634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4613.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update",
"tracking": {
"current_release_date": "2026-01-08T12:27:32+00:00",
"generator": {
"date": "2026-01-08T12:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2021:4613",
"initial_release_date": "2021-11-10T17:14:06+00:00",
"revision_history": [
{
"date": "2021-11-10T17:14:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-10T17:14:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T12:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Text-Only JBCS",
"product": {
"name": "Text-Only JBCS",
"product_id": "Text-Only JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Mikhail Egorov"
]
}
],
"cve": "CVE-2019-17567",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17567"
},
{
"category": "external",
"summary": "RHBZ#1966740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17567",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Only configurations which use mod_proxy_wstunnel are affected by this flaw. It is also safe to comment-out the \"LoadModule proxy_wstunnel_module ... \" line in /etc/httpd/conf.modules.d/00-proxy.conf for configurations which do not rely on a websockets reverse proxy.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection"
},
{
"cve": "CVE-2019-20838",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848444"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "RHBZ#1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Do not use more than one fixed quantifier with \\R or \\X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Marc Stern"
]
}
],
"cve": "CVE-2020-13950",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966738"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13950"
},
{
"category": "external",
"summary": "RHBZ#1966738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy NULL pointer dereference"
},
{
"cve": "CVE-2020-14155",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848436"
}
],
"notes": [
{
"category": "description",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Integer overflow when parsing callout numeric arguments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "RHBZ#1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by not compiling regular expressions with a callout value greater outside of 0-255 or handling the value passed to the callback within the application code.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Integer overflow when parsing callout numeric arguments"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
},
{
"names": [
"Antonio Morales"
],
"organization": "GHSL"
}
],
"cve": "CVE-2020-35452",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Single zero byte stack overflow in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a one byte overflow and as per upstream it should be non-exploitable in most condtions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35452"
},
{
"category": "external",
"summary": "RHBZ#1966724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Only configurations which use mod_auth_digest are affected by this flaw. Also as per upstream this flaw is not exploitable in most conditions, so there should really be no impact of this flaw.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Single zero byte stack overflow in mod_auth_digest"
},
{
"cve": "CVE-2021-3688",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1990252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3688"
},
{
"category": "external",
"summary": "RHBZ#1990252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3688"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Manually add LocationMatch directive to deny any possible problem requests in the JBCS httpd configuration. For example:\n~~~\n\u003cLocationMatch \".*\\.\\.;.*\"\u003e\n Require all denied\n\u003c/LocationMatch\u003e\n~~~",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
],
"organization": "Ingo Schwarze",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995634"
}
],
"notes": [
{
"category": "description",
"text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Read buffer overruns processing ASN.1 strings",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.\n\ncompat-openssl10 is deprecated and has been removed from RHEL 9 and later. No further patches would be available for this component except on a case by case basis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3712"
},
{
"category": "external",
"summary": "RHBZ#1995634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210824.txt",
"url": "https://www.openssl.org/news/secadv/20210824.txt"
}
],
"release_date": "2021-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Customers should make an attempt to run current binaries/architectures and not rely on compatibility layers to run older binaries/architectures. In case older binaries/architectures are needed, sandboxing should be used to address such problems and guard the bug.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Read buffer overruns processing ASN.1 strings"
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930324"
}
],
"notes": [
{
"category": "description",
"text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: integer overflow in CipherUpdate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23840"
},
{
"category": "external",
"summary": "RHBZ#1930324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210216.txt",
"url": "https://www.openssl.org/news/secadv/20210216.txt"
}
],
"release_date": "2021-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: integer overflow in CipherUpdate"
},
{
"cve": "CVE-2021-23841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930310"
}
],
"notes": [
{
"category": "description",
"text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23841"
},
{
"category": "external",
"summary": "RHBZ#1930310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210216.txt",
"url": "https://www.openssl.org/news/secadv/20210216.txt"
}
],
"release_date": "2021-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
},
{
"names": [
"Antonio Morales"
],
"organization": "GHSL"
}
],
"cve": "CVE-2021-26690",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966729"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_session: NULL pointer dereference when parsing Cookie header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a null pointer deference caused when using mod_session. It can result in crash of httpd child process by a remote attacker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26690"
},
{
"category": "external",
"summary": "RHBZ#1966729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_session: NULL pointer dereference when parsing Cookie header"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Christophe Jaillet"
]
}
],
"cve": "CVE-2021-26691",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966732"
}
],
"notes": [
{
"category": "description",
"text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw can result in a crash of the httpd child process when mod_session is used.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26691"
},
{
"category": "external",
"summary": "RHBZ#1966732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Christoph Anton Mitterer"
]
}
],
"cve": "CVE-2021-30641",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966743"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was introduced when fixing https://access.redhat.com/security/cve/cve-2019-0220, therefore versions of httpd package shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Software Collections are affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30641"
},
{
"category": "external",
"summary": "RHBZ#1966743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "This issue can be mitigated by setting the \"MergeSlashes\" directive to OFF",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027"
},
{
"cve": "CVE-2021-34798",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2005128"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer dereference via malformed requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34798"
},
{
"category": "external",
"summary": "RHBZ#2005128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:14:06+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: NULL pointer dereference via malformed requests"
}
]
}
RHSA-2021:4614
Vulnerability from csaf_redhat - Published: 2021-11-10 17:20 - Updated: 2026-01-08 12:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 10 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)\n* httpd: mod_session NULL pointer dereference in parser (CVE-2021-26690)\n* httpd: Heap overflow in mod_session (CVE-2021-26691)\n* httpd: mod_proxy_wstunnel tunneling of non Upgraded connection (CVE-2019-17567)\n* httpd: MergeSlashes regression (CVE-2021-30641)\n* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)\n* jbcs-httpd24-openssl: openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n* pcre: buffer over-read in JIT when UTF is disabled (CVE-2019-20838)\n* pcre: integer overflow in libpcre (CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4614",
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "external",
"summary": "1930310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310"
},
{
"category": "external",
"summary": "1930324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324"
},
{
"category": "external",
"summary": "1966724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724"
},
{
"category": "external",
"summary": "1966729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729"
},
{
"category": "external",
"summary": "1966732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
},
{
"category": "external",
"summary": "1966738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738"
},
{
"category": "external",
"summary": "1966740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740"
},
{
"category": "external",
"summary": "1966743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743"
},
{
"category": "external",
"summary": "1995634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4614.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update",
"tracking": {
"current_release_date": "2026-01-08T12:27:32+00:00",
"generator": {
"date": "2026-01-08T12:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2021:4614",
"initial_release_date": "2021-11-10T17:20:46+00:00",
"revision_history": [
{
"date": "2021-11-10T17:20:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-10T17:20:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T12:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 8",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"product_id": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"product_id": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-20.redhat_1.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"product_id": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"product_id": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.el8jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.el8jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-20.redhat_1.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.el8jbcs?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-107.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-107.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-84.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-39.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-39.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-7.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-22.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-78.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-78.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-78.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-21.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-40.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-9.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-67.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-107.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-107.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-84.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-39.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-39.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-7.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-22.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-78.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-21.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-40.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-20.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-20.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-20.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-9.Final_redhat_2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-67.GA.el8jbcs?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-78.jbcs.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-78.el8jbcs?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Mikhail Egorov"
]
}
],
"cve": "CVE-2019-17567",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17567"
},
{
"category": "external",
"summary": "RHBZ#1966740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17567",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Only configurations which use mod_proxy_wstunnel are affected by this flaw. It is also safe to comment-out the \"LoadModule proxy_wstunnel_module ... \" line in /etc/httpd/conf.modules.d/00-proxy.conf for configurations which do not rely on a websockets reverse proxy.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection"
},
{
"cve": "CVE-2019-20838",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848444"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "RHBZ#1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Do not use more than one fixed quantifier with \\R or \\X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Marc Stern"
]
}
],
"cve": "CVE-2020-13950",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966738"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13950"
},
{
"category": "external",
"summary": "RHBZ#1966738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy NULL pointer dereference"
},
{
"cve": "CVE-2020-14155",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848436"
}
],
"notes": [
{
"category": "description",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Integer overflow when parsing callout numeric arguments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "RHBZ#1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by not compiling regular expressions with a callout value greater outside of 0-255 or handling the value passed to the callback within the application code.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Integer overflow when parsing callout numeric arguments"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
},
{
"names": [
"Antonio Morales"
],
"organization": "GHSL"
}
],
"cve": "CVE-2020-35452",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Single zero byte stack overflow in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a one byte overflow and as per upstream it should be non-exploitable in most condtions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35452"
},
{
"category": "external",
"summary": "RHBZ#1966724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Only configurations which use mod_auth_digest are affected by this flaw. Also as per upstream this flaw is not exploitable in most conditions, so there should really be no impact of this flaw.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Single zero byte stack overflow in mod_auth_digest"
},
{
"cve": "CVE-2021-3688",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1990252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3688"
},
{
"category": "external",
"summary": "RHBZ#1990252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3688"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Manually add LocationMatch directive to deny any possible problem requests in the JBCS httpd configuration. For example:\n~~~\n\u003cLocationMatch \".*\\.\\.;.*\"\u003e\n Require all denied\n\u003c/LocationMatch\u003e\n~~~",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
],
"organization": "Ingo Schwarze",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995634"
}
],
"notes": [
{
"category": "description",
"text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Read buffer overruns processing ASN.1 strings",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.\n\ncompat-openssl10 is deprecated and has been removed from RHEL 9 and later. No further patches would be available for this component except on a case by case basis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3712"
},
{
"category": "external",
"summary": "RHBZ#1995634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210824.txt",
"url": "https://www.openssl.org/news/secadv/20210824.txt"
}
],
"release_date": "2021-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Customers should make an attempt to run current binaries/architectures and not rely on compatibility layers to run older binaries/architectures. In case older binaries/architectures are needed, sandboxing should be used to address such problems and guard the bug.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Read buffer overruns processing ASN.1 strings"
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930324"
}
],
"notes": [
{
"category": "description",
"text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: integer overflow in CipherUpdate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23840"
},
{
"category": "external",
"summary": "RHBZ#1930324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210216.txt",
"url": "https://www.openssl.org/news/secadv/20210216.txt"
}
],
"release_date": "2021-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: integer overflow in CipherUpdate"
},
{
"cve": "CVE-2021-23841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930310"
}
],
"notes": [
{
"category": "description",
"text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23841"
},
{
"category": "external",
"summary": "RHBZ#1930310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210216.txt",
"url": "https://www.openssl.org/news/secadv/20210216.txt"
}
],
"release_date": "2021-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
},
{
"names": [
"Antonio Morales"
],
"organization": "GHSL"
}
],
"cve": "CVE-2021-26690",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966729"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_session: NULL pointer dereference when parsing Cookie header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a null pointer deference caused when using mod_session. It can result in crash of httpd child process by a remote attacker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26690"
},
{
"category": "external",
"summary": "RHBZ#1966729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_session: NULL pointer dereference when parsing Cookie header"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Christophe Jaillet"
]
}
],
"cve": "CVE-2021-26691",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966732"
}
],
"notes": [
{
"category": "description",
"text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw can result in a crash of the httpd child process when mod_session is used.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26691"
},
{
"category": "external",
"summary": "RHBZ#1966732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value"
},
{
"acknowledgments": [
{
"names": [
"the Apache project",
"Christoph Anton Mitterer"
]
}
],
"cve": "CVE-2021-30641",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966743"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was introduced when fixing https://access.redhat.com/security/cve/cve-2019-0220, therefore versions of httpd package shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Software Collections are affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30641"
},
{
"category": "external",
"summary": "RHBZ#1966743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "This issue can be mitigated by setting the \"MergeSlashes\" directive to OFF",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027"
},
{
"cve": "CVE-2021-34798",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2005128"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer dereference via malformed requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34798"
},
{
"category": "external",
"summary": "RHBZ#2005128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2021-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T17:20:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: NULL pointer dereference via malformed requests"
}
]
}
RHSA-2021:4373
Vulnerability from csaf_redhat - Published: 2021-11-09 18:03 - Updated: 2026-01-08 12:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for pcre is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "PCRE is a Perl-compatible regular expression library. \n\nSecurity Fix(es):\n\n* pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1 (CVE-2019-20838)\n\n* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4373",
"url": "https://access.redhat.com/errata/RHSA-2021:4373"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4373.json"
}
],
"title": "Red Hat Security Advisory: pcre security update",
"tracking": {
"current_release_date": "2026-01-08T12:27:31+00:00",
"generator": {
"date": "2026-01-08T12:27:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2021:4373",
"initial_release_date": "2021-11-09T18:03:33+00:00",
"revision_history": [
{
"date": "2021-11-09T18:03:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:03:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T12:27:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.src",
"product": {
"name": "pcre-0:8.42-6.el8.src",
"product_id": "pcre-0:8.42-6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-0:8.42-6.el8.aarch64",
"product_id": "pcre-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-cpp-0:8.42-6.el8.aarch64",
"product_id": "pcre-cpp-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-devel-0:8.42-6.el8.aarch64",
"product_id": "pcre-devel-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-utf16-0:8.42-6.el8.aarch64",
"product_id": "pcre-utf16-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-utf32-0:8.42-6.el8.aarch64",
"product_id": "pcre-utf32-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-debugsource-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-debugsource-0:8.42-6.el8.aarch64",
"product_id": "pcre-debugsource-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debugsource@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"product_id": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp-debuginfo@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-debuginfo-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-debuginfo-0:8.42-6.el8.aarch64",
"product_id": "pcre-debuginfo-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"product_id": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-tools-debuginfo@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"product_id": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16-debuginfo@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"product_id": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32-debuginfo@8.42-6.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "pcre-static-0:8.42-6.el8.aarch64",
"product": {
"name": "pcre-static-0:8.42-6.el8.aarch64",
"product_id": "pcre-static-0:8.42-6.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-static@8.42-6.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-0:8.42-6.el8.ppc64le",
"product_id": "pcre-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-cpp-0:8.42-6.el8.ppc64le",
"product_id": "pcre-cpp-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-devel-0:8.42-6.el8.ppc64le",
"product_id": "pcre-devel-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-utf16-0:8.42-6.el8.ppc64le",
"product_id": "pcre-utf16-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-utf32-0:8.42-6.el8.ppc64le",
"product_id": "pcre-utf32-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-debugsource-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-debugsource-0:8.42-6.el8.ppc64le",
"product_id": "pcre-debugsource-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debugsource@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"product_id": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp-debuginfo@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-debuginfo-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-debuginfo-0:8.42-6.el8.ppc64le",
"product_id": "pcre-debuginfo-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"product_id": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-tools-debuginfo@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"product_id": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16-debuginfo@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"product_id": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32-debuginfo@8.42-6.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pcre-static-0:8.42-6.el8.ppc64le",
"product": {
"name": "pcre-static-0:8.42-6.el8.ppc64le",
"product_id": "pcre-static-0:8.42-6.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-static@8.42-6.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.i686",
"product": {
"name": "pcre-0:8.42-6.el8.i686",
"product_id": "pcre-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-0:8.42-6.el8.i686",
"product": {
"name": "pcre-cpp-0:8.42-6.el8.i686",
"product_id": "pcre-cpp-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:8.42-6.el8.i686",
"product": {
"name": "pcre-devel-0:8.42-6.el8.i686",
"product_id": "pcre-devel-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-0:8.42-6.el8.i686",
"product": {
"name": "pcre-utf16-0:8.42-6.el8.i686",
"product_id": "pcre-utf16-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-0:8.42-6.el8.i686",
"product": {
"name": "pcre-utf32-0:8.42-6.el8.i686",
"product_id": "pcre-utf32-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-debugsource-0:8.42-6.el8.i686",
"product": {
"name": "pcre-debugsource-0:8.42-6.el8.i686",
"product_id": "pcre-debugsource-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debugsource@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"product": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"product_id": "pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp-debuginfo@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-debuginfo-0:8.42-6.el8.i686",
"product": {
"name": "pcre-debuginfo-0:8.42-6.el8.i686",
"product_id": "pcre-debuginfo-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-tools-debuginfo-0:8.42-6.el8.i686",
"product": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.i686",
"product_id": "pcre-tools-debuginfo-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-tools-debuginfo@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"product": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"product_id": "pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16-debuginfo@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"product": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"product_id": "pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32-debuginfo@8.42-6.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pcre-static-0:8.42-6.el8.i686",
"product": {
"name": "pcre-static-0:8.42-6.el8.i686",
"product_id": "pcre-static-0:8.42-6.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-static@8.42-6.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-0:8.42-6.el8.x86_64",
"product_id": "pcre-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-cpp-0:8.42-6.el8.x86_64",
"product_id": "pcre-cpp-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-devel-0:8.42-6.el8.x86_64",
"product_id": "pcre-devel-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-utf16-0:8.42-6.el8.x86_64",
"product_id": "pcre-utf16-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-utf32-0:8.42-6.el8.x86_64",
"product_id": "pcre-utf32-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-debugsource-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-debugsource-0:8.42-6.el8.x86_64",
"product_id": "pcre-debugsource-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debugsource@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"product_id": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp-debuginfo@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-debuginfo-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-debuginfo-0:8.42-6.el8.x86_64",
"product_id": "pcre-debuginfo-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"product_id": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-tools-debuginfo@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"product_id": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16-debuginfo@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"product_id": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32-debuginfo@8.42-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-static-0:8.42-6.el8.x86_64",
"product": {
"name": "pcre-static-0:8.42-6.el8.x86_64",
"product_id": "pcre-static-0:8.42-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-static@8.42-6.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-0:8.42-6.el8.s390x",
"product_id": "pcre-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-cpp-0:8.42-6.el8.s390x",
"product_id": "pcre-cpp-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-devel-0:8.42-6.el8.s390x",
"product_id": "pcre-devel-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-utf16-0:8.42-6.el8.s390x",
"product_id": "pcre-utf16-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-utf32-0:8.42-6.el8.s390x",
"product_id": "pcre-utf32-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-debugsource-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-debugsource-0:8.42-6.el8.s390x",
"product_id": "pcre-debugsource-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debugsource@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"product_id": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-cpp-debuginfo@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-debuginfo-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-debuginfo-0:8.42-6.el8.s390x",
"product_id": "pcre-debuginfo-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"product_id": "pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-tools-debuginfo@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"product_id": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf16-debuginfo@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"product_id": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-utf32-debuginfo@8.42-6.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-static-0:8.42-6.el8.s390x",
"product": {
"name": "pcre-static-0:8.42-6.el8.s390x",
"product_id": "pcre-static-0:8.42-6.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-static@8.42-6.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686"
},
"product_reference": "pcre-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src"
},
"product_reference": "pcre-0:8.42-6.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-devel-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686"
},
"product_reference": "pcre-devel-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-devel-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-devel-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-devel-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-static-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686"
},
"product_reference": "pcre-static-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-static-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-static-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-static-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686"
},
"product_reference": "pcre-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.src"
},
"product_reference": "pcre-0:8.42-6.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-cpp-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debugsource-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-debugsource-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-devel-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686"
},
"product_reference": "pcre-devel-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-devel-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-devel-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-devel-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-static-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686"
},
"product_reference": "pcre-static-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-static-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-static-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-static-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-static-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf16-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf32-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
},
"product_reference": "pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20838",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848444"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "RHBZ#1848444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:03:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4373"
},
{
"category": "workaround",
"details": "Do not use more than one fixed quantifier with \\R or \\X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1"
},
{
"cve": "CVE-2020-14155",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2020-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1848436"
}
],
"notes": [
{
"category": "description",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre: Integer overflow when parsing callout numeric arguments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "RHBZ#1848436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
}
],
"release_date": "2020-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:03:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4373"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by not compiling regular expressions with a callout value greater outside of 0-255 or handling the value passed to the callback within the application code.",
"product_ids": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.src",
"BaseOS-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"BaseOS-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.src",
"CRB-8.5.0.GA:pcre-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-cpp-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-debugsource-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-devel-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-static-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-tools-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf16-debuginfo-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-0:8.42-6.el8.x86_64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.aarch64",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.i686",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.ppc64le",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.s390x",
"CRB-8.5.0.GA:pcre-utf32-debuginfo-0:8.42-6.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "pcre: Integer overflow when parsing callout numeric arguments"
}
]
}
WID-SEC-W-2023-1614
Vulnerability from csaf_certbund - Published: 2023-06-29 22:00 - Updated: 2023-10-25 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Tenable Nessus Network Monitor ist eine L\u00f6sung zur Inventarisierung und \u00dcberwachung von Netzwerkger\u00e4ten und den genutzten Protokollen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Tenable Security Nessus Network Monitor ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1614 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1614.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1614 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1614"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2023-34 vom 2023-10-25",
"url": "https://de.tenable.com/security/tns-2023-34"
},
{
"category": "external",
"summary": "Tenable Security Advisory vom 2023-06-29",
"url": "https://de.tenable.com/security/tns-2023-23"
}
],
"source_lang": "en-US",
"title": "Tenable Security Nessus Network Monitor: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-10-25T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:53:59.941+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1614",
"initial_release_date": "2023-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-07-03T22:00:00.000+00:00",
"number": "2",
"summary": "Produkt berichtigt"
},
{
"date": "2023-10-25T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Tenable aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Tenable Security Nessus Network Monitor \u003c 6.2.2",
"product": {
"name": "Tenable Security Nessus Network Monitor \u003c 6.2.2",
"product_id": "T028403",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus_network_monitor:6.2.2"
}
}
}
],
"category": "vendor",
"name": "Tenable Security"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-31147",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-31147"
},
{
"cve": "CVE-2023-31130",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-31130"
},
{
"cve": "CVE-2023-31124",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-31124"
},
{
"cve": "CVE-2023-29469",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-28484",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23915",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23914",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2022-4904",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-4904"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43551",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-42916",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-42915",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-31160",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-31160"
},
{
"cve": "CVE-2022-29824",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-29824"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27776",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27775",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27774",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-23395",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-23395"
},
{
"cve": "CVE-2022-23308",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-22576",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2021-45346",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-45346"
},
{
"cve": "CVE-2021-3672",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3672"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3541",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3541"
},
{
"cve": "CVE-2021-3537",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3537"
},
{
"cve": "CVE-2021-3518",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3518"
},
{
"cve": "CVE-2021-3517",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-3517"
},
{
"cve": "CVE-2021-31239",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-31239"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-20227",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2021-20227"
},
{
"cve": "CVE-2020-9327",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-9327"
},
{
"cve": "CVE-2020-7595",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-7595"
},
{
"cve": "CVE-2020-35527",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-35527"
},
{
"cve": "CVE-2020-35525",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2020-24977",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-24977"
},
{
"cve": "CVE-2020-15358",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-14155",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-14155"
},
{
"cve": "CVE-2020-13871",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13871"
},
{
"cve": "CVE-2020-13632",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13632"
},
{
"cve": "CVE-2020-13631",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13631"
},
{
"cve": "CVE-2020-13630",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13630"
},
{
"cve": "CVE-2020-13435",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13435"
},
{
"cve": "CVE-2020-13434",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-13434"
},
{
"cve": "CVE-2020-11656",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-11656"
},
{
"cve": "CVE-2020-11655",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2020-11655"
},
{
"cve": "CVE-2019-9937",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-9937"
},
{
"cve": "CVE-2019-9936",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-9936"
},
{
"cve": "CVE-2019-8457",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-8457"
},
{
"cve": "CVE-2019-5815",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-5815"
},
{
"cve": "CVE-2019-20838",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2019-20388",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-20388"
},
{
"cve": "CVE-2019-20218",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-20218"
},
{
"cve": "CVE-2019-19959",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19959"
},
{
"cve": "CVE-2019-19956",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19956"
},
{
"cve": "CVE-2019-19926",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2019-19925",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19924",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19924"
},
{
"cve": "CVE-2019-19923",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19880",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19646",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19646"
},
{
"cve": "CVE-2019-19645",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19645"
},
{
"cve": "CVE-2019-19603",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19603"
},
{
"cve": "CVE-2019-19317",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19317"
},
{
"cve": "CVE-2019-19244",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19244"
},
{
"cve": "CVE-2019-19242",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-19242"
},
{
"cve": "CVE-2019-16168",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-16168"
},
{
"cve": "CVE-2019-13118",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-13118"
},
{
"cve": "CVE-2019-13117",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-13117"
},
{
"cve": "CVE-2019-12900",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-11068",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2019-11068"
},
{
"cve": "CVE-2018-9251",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2018-9251"
},
{
"cve": "CVE-2018-14567",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2018-14567"
},
{
"cve": "CVE-2018-14404",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2018-14404"
},
{
"cve": "CVE-2017-9050",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-9050"
},
{
"cve": "CVE-2017-9049",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-9049"
},
{
"cve": "CVE-2017-9048",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-9048"
},
{
"cve": "CVE-2017-9047",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-9047"
},
{
"cve": "CVE-2017-8872",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-8872"
},
{
"cve": "CVE-2017-7376",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-7376"
},
{
"cve": "CVE-2017-7375",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-7375"
},
{
"cve": "CVE-2017-5969",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-5969"
},
{
"cve": "CVE-2017-5130",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-5130"
},
{
"cve": "CVE-2017-5029",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-5029"
},
{
"cve": "CVE-2017-18258",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-18258"
},
{
"cve": "CVE-2017-16932",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-16932"
},
{
"cve": "CVE-2017-16931",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-16931"
},
{
"cve": "CVE-2017-15412",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-15412"
},
{
"cve": "CVE-2017-1000381",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-1000381"
},
{
"cve": "CVE-2017-1000061",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2017-1000061"
},
{
"cve": "CVE-2016-9598",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-9598"
},
{
"cve": "CVE-2016-9597",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-9597"
},
{
"cve": "CVE-2016-9596",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-9596"
},
{
"cve": "CVE-2016-5180",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-5180"
},
{
"cve": "CVE-2016-5131",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-5131"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2016-4609",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4609"
},
{
"cve": "CVE-2016-4607",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4607"
},
{
"cve": "CVE-2016-4483",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4483"
},
{
"cve": "CVE-2016-4449",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4449"
},
{
"cve": "CVE-2016-4448",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4448"
},
{
"cve": "CVE-2016-4447",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-4447"
},
{
"cve": "CVE-2016-3709",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-3709"
},
{
"cve": "CVE-2016-3705",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-3705"
},
{
"cve": "CVE-2016-3627",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-3627"
},
{
"cve": "CVE-2016-3189",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-3189"
},
{
"cve": "CVE-2016-2073",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-2073"
},
{
"cve": "CVE-2016-1840",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1840"
},
{
"cve": "CVE-2016-1839",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1839"
},
{
"cve": "CVE-2016-1838",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1838"
},
{
"cve": "CVE-2016-1837",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1837"
},
{
"cve": "CVE-2016-1836",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1836"
},
{
"cve": "CVE-2016-1834",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1834"
},
{
"cve": "CVE-2016-1833",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1833"
},
{
"cve": "CVE-2016-1762",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1762"
},
{
"cve": "CVE-2016-1684",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1684"
},
{
"cve": "CVE-2016-1683",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2016-1683"
},
{
"cve": "CVE-2015-9019",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-9019"
},
{
"cve": "CVE-2015-8806",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8806"
},
{
"cve": "CVE-2015-8710",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8710"
},
{
"cve": "CVE-2015-8317",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8317"
},
{
"cve": "CVE-2015-8242",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8242"
},
{
"cve": "CVE-2015-8241",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8241"
},
{
"cve": "CVE-2015-8035",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-8035"
},
{
"cve": "CVE-2015-7995",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7995"
},
{
"cve": "CVE-2015-7942",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7942"
},
{
"cve": "CVE-2015-7941",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7941"
},
{
"cve": "CVE-2015-7500",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7500"
},
{
"cve": "CVE-2015-7499",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7499"
},
{
"cve": "CVE-2015-7498",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7498"
},
{
"cve": "CVE-2015-7497",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-7497"
},
{
"cve": "CVE-2015-5312",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2015-5312"
},
{
"cve": "CVE-2014-3660",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2014-3660"
},
{
"cve": "CVE-2013-4520",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2013-4520"
},
{
"cve": "CVE-2013-2877",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2013-2877"
},
{
"cve": "CVE-2013-1969",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2013-1969"
},
{
"cve": "CVE-2013-0339",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2013-0339"
},
{
"cve": "CVE-2013-0338",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2013-0338"
},
{
"cve": "CVE-2012-6139",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2012-6139"
},
{
"cve": "CVE-2012-5134",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2012-5134"
},
{
"cve": "CVE-2012-2871",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2012-2871"
},
{
"cve": "CVE-2012-2870",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2012-2870"
},
{
"cve": "CVE-2012-0841",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2012-0841"
},
{
"cve": "CVE-2011-3970",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2011-3970"
},
{
"cve": "CVE-2011-1944",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2011-1944"
},
{
"cve": "CVE-2011-1202",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2011-1202"
},
{
"cve": "CVE-2010-4494",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2010-4494"
},
{
"cve": "CVE-2010-4008",
"notes": [
{
"category": "description",
"text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte."
}
],
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2010-4008"
}
]
}
WID-SEC-W-2022-1897
Vulnerability from csaf_certbund - Published: 2020-06-15 22:00 - Updated: 2024-01-24 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Perl Compatible Regular Expressions (PCRE) ist eine Programmbibliothek zur Auswertung und Anwendung von regul\u00e4ren Ausdr\u00fccken.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in PCRE (Perl Compatible Regular Expressions) ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder weitere, nicht definierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1897 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1897.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1897 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1897"
},
{
"category": "external",
"summary": "NIST Database vom 2020-06-15",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
},
{
"category": "external",
"summary": "NIST Database vom 2020-06-15",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3529-1 vom 2021-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009659.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4373 vom 2021-11-09",
"url": "https://access.redhat.com/errata/RHSA-2021:4373"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4613 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4613"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4614 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4614"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3652-1 vom 2021-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2021-160 vom 2021-11-11",
"url": "https://downloads.avaya.com/css/P8/documents/101078545"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4373 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4373.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4848 vom 2021-11-29",
"url": "https://access.redhat.com/errata/RHSA-2021:4848"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4845 vom 2021-11-29",
"url": "https://access.redhat.com/errata/RHSA-2021:4845"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27",
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04",
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5425-1 vom 2022-05-17",
"url": "https://ubuntu.com/security/notices/USN-5425-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221028-0010 vom 2022-10-28",
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7087225 vom 2023-12-01",
"url": "https://www.ibm.com/support/pages/node/7087225"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7111596 vom 2024-01-24",
"url": "https://www.ibm.com/support/pages/node/7111596"
}
],
"source_lang": "en-US",
"title": "PCRE (Perl Compatible Regular Expressions): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-01-24T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:37:15.652+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1897",
"initial_release_date": "2020-06-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-06-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-10-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-10T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2021-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2021-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-11-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-30T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2023-12-03T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-24T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM DB2 v11.5",
"product": {
"name": "IBM DB2 v11.5",
"product_id": "T015242",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:v11.5"
}
}
},
{
"category": "product_name",
"name": "IBM DB2 v11.1",
"product": {
"name": "IBM DB2 v11.1",
"product_id": "T015243",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:v11.1"
}
}
},
{
"category": "product_name",
"name": "IBM DB2 v10.5",
"product": {
"name": "IBM DB2 v10.5",
"product_id": "T015244",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:v10.5"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"category": "product_name",
"name": "IBM Tivoli Business Service Manager 6.2.0",
"product": {
"name": "IBM Tivoli Business Service Manager 6.2.0",
"product_id": "T014092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T016960",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
},
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source PCRE (Perl Compatible Regular Expressions) \u003c 8.44",
"product": {
"name": "Open Source PCRE (Perl Compatible Regular Expressions) \u003c 8.44",
"product_id": "T016734",
"product_identification_helper": {
"cpe": "cpe:/a:pcre:perl_compatible_regular_expression_library:8.44"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20838",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in PCRE (Perl Compatible Regular Expressions). Diese besteht aufgrund eines \"buffer Over-read\" Fehlers in in JIT, wenn UTF deaktiviert ist, und \\X oder \\R mehr als einen festen Quantifikator hat. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015519",
"T002207",
"T014092",
"67646",
"T000126",
"7654",
"T004914",
"T015244",
"T016960",
"T015243",
"T015242"
]
},
"release_date": "2020-06-15T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in PCRE (Perl Compatible Regular Expressions). Hierbei handelt es sich um eine Integer \u00dcberlauf der durch eine gro\u00dfe Zahl nach einem (?C Substring ausgel\u00f6st wird. Ein Angreifer kann diese Schwachstelle mit nicht spezifizierten Auswirkungen ausnutzen."
}
],
"product_status": {
"known_affected": [
"T002207",
"T014092",
"67646",
"T000126",
"7654",
"T004914",
"T015244",
"T016960",
"T015243",
"T015242"
]
},
"release_date": "2020-06-15T22:00:00.000+00:00",
"title": "CVE-2020-14155"
}
]
}
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund - Published: 2023-08-30 22:00 - Updated: 2025-11-18 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2229 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2229 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0802"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0803"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0804"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0805"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0806"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0807"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0808"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03545-1 vom 2025-10-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UB7MGNRMXC5LO5Y66FLOE354VVU5ULQK/"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-18T23:00:00.000+00:00",
"generator": {
"date": "2025-11-19T09:42:41.445+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2023-2229",
"initial_release_date": "2023-08-30T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-30T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.1",
"product": {
"name": "Atlassian Confluence \u003c10.1.1",
"product_id": "T048680"
}
},
{
"category": "product_version",
"name": "10.1.1",
"product": {
"name": "Atlassian Confluence 10.1.1",
"product_id": "T048680-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Confluence \u003c10.0.2",
"product_id": "T048685"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Confluence 10.0.2",
"product_id": "T048685-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.7",
"product": {
"name": "Atlassian Confluence \u003c9.2.7",
"product_id": "T048686"
}
},
{
"category": "product_version",
"name": "9.2.7",
"product": {
"name": "Atlassian Confluence 9.2.7",
"product_id": "T048686-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:9.2.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.5.25",
"product": {
"name": "Atlassian Confluence \u003c8.5.25",
"product_id": "T048687"
}
},
{
"category": "product_version",
"name": "8.5.25",
"product": {
"name": "Atlassian Confluence 8.5.25",
"product_id": "T048687-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.25"
}
}
}
],
"category": "product_name",
"name": "Confluence"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.1",
"product_id": "T029634"
}
},
{
"category": "product_version",
"name": "9.1.1",
"product": {
"name": "Splunk Splunk Enterprise 9.1.1",
"product_id": "T029634-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.6",
"product_id": "T029635"
}
},
{
"category": "product_version",
"name": "9.0.6",
"product": {
"name": "Splunk Splunk Enterprise 9.0.6",
"product_id": "T029635-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.12",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.2.12",
"product_id": "T029636"
}
},
{
"category": "product_version",
"name": "8.2.12",
"product": {
"name": "Splunk Splunk Enterprise 8.2.12",
"product_id": "T029636-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:8.2.12"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Splunk Splunk Enterprise 9.2.1",
"product_id": "T033705-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version",
"name": "9.1.4",
"product": {
"name": "Splunk Splunk Enterprise 9.1.4",
"product_id": "T033718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
},
{
"category": "product_version",
"name": "9.0.9",
"product": {
"name": "Splunk Splunk Enterprise 9.0.9",
"product_id": "T033720-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.9"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7489",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2013-7489"
},
{
"cve": "CVE-2018-10237",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-10237"
},
{
"cve": "CVE-2018-20225",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-20225"
},
{
"cve": "CVE-2019-20454",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20838",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-14155"
},
{
"cve": "CVE-2020-28469",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28851",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28851"
},
{
"cve": "CVE-2020-29652",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-29652"
},
{
"cve": "CVE-2020-8169",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8908",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2021-20066",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-20066"
},
{
"cve": "CVE-2021-22569",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2021-22876",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22890",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22922",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22945",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23343",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23343"
},
{
"cve": "CVE-2021-23382",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23382"
},
{
"cve": "CVE-2021-27918",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-27919",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27919"
},
{
"cve": "CVE-2021-29060",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29060"
},
{
"cve": "CVE-2021-29425",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29923",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-31525",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31525"
},
{
"cve": "CVE-2021-31566",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31566"
},
{
"cve": "CVE-2021-33194",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33198"
},
{
"cve": "CVE-2021-34558",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-3520",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3572",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3572"
},
{
"cve": "CVE-2021-36221",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36976",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36976"
},
{
"cve": "CVE-2021-3803",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-38297",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-38561",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-39293",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-39293"
},
{
"cve": "CVE-2021-41182",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41182"
},
{
"cve": "CVE-2021-41183",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41183"
},
{
"cve": "CVE-2021-41184",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-41771",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-41772",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41772"
},
{
"cve": "CVE-2021-43565",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44716",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44717",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44717"
},
{
"cve": "CVE-2022-1705",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1941",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1941"
},
{
"cve": "CVE-2022-1962",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-22576",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-2309",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2309"
},
{
"cve": "CVE-2022-23491",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23491"
},
{
"cve": "CVE-2022-23772",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-24675",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24921",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24921"
},
{
"cve": "CVE-2022-24999",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24999"
},
{
"cve": "CVE-2022-25881",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-25881"
},
{
"cve": "CVE-2022-27191",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27536",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-27664",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-27774",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-27775",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27776",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27778",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27780",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-28131",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-28327",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2879",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-29526",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29804",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29804"
},
{
"cve": "CVE-2022-30115",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-30580",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30629",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30629"
},
{
"cve": "CVE-2022-30630",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30634",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30634"
},
{
"cve": "CVE-2022-30635",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-31129",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-3171",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-32148",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32205",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-33987",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-33987"
},
{
"cve": "CVE-2022-3509",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3510",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3510"
},
{
"cve": "CVE-2022-3517",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35252",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-35260",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35260"
},
{
"cve": "CVE-2022-35737",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-37599",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-38900",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-40023",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40897",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-40899",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-41715",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41716",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41720",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-41722",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-42003",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42915",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-42916",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-43551",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-46175",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-23914",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24539",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24539"
},
{
"cve": "CVE-2023-24540",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24540"
},
{
"cve": "CVE-2023-27533",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27537",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27537"
},
{
"cve": "CVE-2023-27538",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-29400",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29400"
},
{
"cve": "CVE-2023-29402",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-40592",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40592"
},
{
"cve": "CVE-2023-40593",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40593"
},
{
"cve": "CVE-2023-40594",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40594"
},
{
"cve": "CVE-2023-40595",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40595"
},
{
"cve": "CVE-2023-40596",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40596"
},
{
"cve": "CVE-2023-40597",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40597"
},
{
"cve": "CVE-2023-40598",
"product_status": {
"known_affected": [
"T033720",
"T048680",
"T008911",
"T004914",
"T002207",
"T033718",
"T048685",
"T029636",
"T033705",
"T029635",
"T029634",
"T048687",
"T048686"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40598"
}
]
}
MSRC_CVE-2020-14155
Vulnerability from csaf_microsoft - Published: 2020-06-02 00:00 - Updated: 2020-08-18 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2020-14155 libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-14155.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"tracking": {
"current_release_date": "2020-08-18T00:00:00.000Z",
"generator": {
"date": "2025-12-27T21:19:53.813Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2020-14155",
"initial_release_date": "2020-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-08-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 pcre 8.44-1",
"product": {
"name": "\u003ccm1 pcre 8.44-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 pcre 8.44-1",
"product": {
"name": "cm1 pcre 8.44-1",
"product_id": "17052"
}
}
],
"category": "product_name",
"name": "pcre"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 pcre 8.44-1 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 pcre 8.44-1 as a component of CBL Mariner 1.0",
"product_id": "17052-16820"
},
"product_reference": "17052",
"relates_to_product_reference": "16820"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14155",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17052-16820"
],
"known_affected": [
"16820-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-14155 libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-14155.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-08-18T00:00:00.000Z",
"details": "8.44-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"16820-1"
]
}
],
"title": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring."
}
]
}
CNVD-2020-53121
Vulnerability from cnvd - Published: 2020-09-21目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.pcre.org/original/changelog.txt
| Name | PCRE PCRE <8.44 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-14155"
}
},
"description": "PCRE\u662fPhilip Hazel\u8f6f\u4ef6\u5f00\u53d1\u8005\u7684\u4e00\u6b3e\u4f7f\u7528C\u8bed\u8a00\u7f16\u5199\u7684\u5f00\u6e90\u6b63\u5219\u8868\u8fbe\u5f0f\u51fd\u6570\u5e93\u3002\n\nPCRE 8.44\u4e4b\u524d\u7248\u672c\u4e2d\u7684libpcre\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u5bf9\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u6b63\u786e\u7684\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5927\u91cf\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u5bfc\u81f4\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.pcre.org/original/changelog.txt",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-53121",
"openTime": "2020-09-21",
"patchDescription": "PCRE\u662fPhilip Hazel\u8f6f\u4ef6\u5f00\u53d1\u8005\u7684\u4e00\u6b3e\u4f7f\u7528C\u8bed\u8a00\u7f16\u5199\u7684\u5f00\u6e90\u6b63\u5219\u8868\u8fbe\u5f0f\u51fd\u6570\u5e93\u3002\r\n\r\nPCRE 8.44\u4e4b\u524d\u7248\u672c\u4e2d\u7684libpcre\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u5bf9\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u6b63\u786e\u7684\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5927\u91cf\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u5bfc\u81f4\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "PCRE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "PCRE PCRE \u003c8.44"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
"serverity": "\u4e2d",
"submitTime": "2020-06-16",
"title": "PCRE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}
OPENSUSE-SU-2021:1441-1
Vulnerability from csaf_opensuse - Published: 2021-11-02 13:07 - Updated: 2021-11-02 13:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for pcre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for pcre fixes the following issues:\n\nUpdate pcre to version 8.45:\n\n- CVE-2020-14155: Fixed integer overflow via a large number after a \u0027(?C\u0027 substring (bsc#1172974).\n- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1441",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1441-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1441-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1441-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/"
},
{
"category": "self",
"summary": "SUSE Bug 1172973",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "self",
"summary": "SUSE Bug 1172974",
"url": "https://bugzilla.suse.com/1172974"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20838 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14155 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14155/"
}
],
"title": "Security update for pcre",
"tracking": {
"current_release_date": "2021-11-02T13:07:08Z",
"generator": {
"date": "2021-11-02T13:07:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1441-1",
"initial_release_date": "2021-11-02T13:07:08Z",
"revision_history": [
{
"date": "2021-11-02T13:07:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-lp152.7.6.1.i586",
"product": {
"name": "libpcre1-8.45-lp152.7.6.1.i586",
"product_id": "libpcre1-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-lp152.7.6.1.i586",
"product": {
"name": "libpcre16-0-8.45-lp152.7.6.1.i586",
"product_id": "libpcre16-0-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-lp152.7.6.1.i586",
"product": {
"name": "libpcrecpp0-8.45-lp152.7.6.1.i586",
"product_id": "libpcrecpp0-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-lp152.7.6.1.i586",
"product": {
"name": "libpcreposix0-8.45-lp152.7.6.1.i586",
"product_id": "libpcreposix0-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-lp152.7.6.1.i586",
"product": {
"name": "pcre-devel-8.45-lp152.7.6.1.i586",
"product_id": "pcre-devel-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-lp152.7.6.1.i586",
"product": {
"name": "pcre-devel-static-8.45-lp152.7.6.1.i586",
"product_id": "pcre-devel-static-8.45-lp152.7.6.1.i586"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-lp152.7.6.1.i586",
"product": {
"name": "pcre-tools-8.45-lp152.7.6.1.i586",
"product_id": "pcre-tools-8.45-lp152.7.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-doc-8.45-lp152.7.6.1.noarch",
"product": {
"name": "pcre-doc-8.45-lp152.7.6.1.noarch",
"product_id": "pcre-doc-8.45-lp152.7.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcre1-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcre1-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcre1-32bit-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcre16-0-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcre16-0-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcrecpp0-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcreposix0-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcreposix0-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"product_id": "libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "pcre-devel-8.45-lp152.7.6.1.x86_64",
"product_id": "pcre-devel-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"product_id": "pcre-devel-static-8.45-lp152.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-lp152.7.6.1.x86_64",
"product": {
"name": "pcre-tools-8.45-lp152.7.6.1.x86_64",
"product_id": "pcre-tools-8.45-lp152.7.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586"
},
"product_reference": "libpcre1-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcre1-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586"
},
"product_reference": "libpcre16-0-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586"
},
"product_reference": "libpcrecpp0-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586"
},
"product_reference": "libpcreposix0-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586"
},
"product_reference": "pcre-devel-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "pcre-devel-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586"
},
"product_reference": "pcre-devel-static-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-doc-8.45-lp152.7.6.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch"
},
"product_reference": "pcre-doc-8.45-lp152.7.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-lp152.7.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586"
},
"product_reference": "pcre-tools-8.45-lp152.7.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
},
"product_reference": "pcre-tools-8.45-lp152.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20838"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20838",
"url": "https://www.suse.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "SUSE Bug 1172973 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "external",
"summary": "SUSE Bug 1189526 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1189526"
},
{
"category": "external",
"summary": "SUSE Bug 1193384 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1193384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-02T13:07:08Z",
"details": "important"
}
],
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14155"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14155",
"url": "https://www.suse.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "SUSE Bug 1172974 for CVE-2020-14155",
"url": "https://bugzilla.suse.com/1172974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libpcre1-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre1-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcre16-0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcrecpp0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-32bit-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:libpcreposix0-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-devel-static-8.45-lp152.7.6.1.x86_64",
"openSUSE Leap 15.2:pcre-doc-8.45-lp152.7.6.1.noarch",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.i586",
"openSUSE Leap 15.2:pcre-tools-8.45-lp152.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-02T13:07:08Z",
"details": "moderate"
}
],
"title": "CVE-2020-14155"
}
]
}
OPENSUSE-SU-2021:3529-1
Vulnerability from csaf_opensuse - Published: 2021-10-27 07:23 - Updated: 2021-10-27 07:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for pcre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for pcre fixes the following issues:\n\nUpdate pcre to version 8.45:\n\n- CVE-2020-14155: Fixed integer overflow via a large number after a \u0027(?C\u0027 substring (bsc#1172974).\n- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3529",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3529-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3529-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3529-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/"
},
{
"category": "self",
"summary": "SUSE Bug 1172973",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "self",
"summary": "SUSE Bug 1172974",
"url": "https://bugzilla.suse.com/1172974"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20838 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14155 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14155/"
}
],
"title": "Security update for pcre",
"tracking": {
"current_release_date": "2021-10-27T07:23:54Z",
"generator": {
"date": "2021-10-27T07:23:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3529-1",
"initial_release_date": "2021-10-27T07:23:54Z",
"revision_history": [
{
"date": "2021-10-27T07:23:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.aarch64",
"product": {
"name": "libpcre1-8.45-20.10.1.aarch64",
"product_id": "libpcre1-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcre16-0-8.45-20.10.1.aarch64",
"product_id": "libpcre16-0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.aarch64",
"product_id": "libpcrecpp0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.aarch64",
"product": {
"name": "libpcreposix0-8.45-20.10.1.aarch64",
"product_id": "libpcreposix0-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-devel-8.45-20.10.1.aarch64",
"product_id": "pcre-devel-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.aarch64",
"product_id": "pcre-devel-static-8.45-20.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.aarch64",
"product": {
"name": "pcre-tools-8.45-20.10.1.aarch64",
"product_id": "pcre-tools-8.45-20.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-doc-8.45-20.10.1.noarch",
"product": {
"name": "pcre-doc-8.45-20.10.1.noarch",
"product_id": "pcre-doc-8.45-20.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcre1-8.45-20.10.1.ppc64le",
"product_id": "libpcre1-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcre16-0-8.45-20.10.1.ppc64le",
"product_id": "libpcre16-0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.ppc64le",
"product_id": "libpcrecpp0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.ppc64le",
"product": {
"name": "libpcreposix0-8.45-20.10.1.ppc64le",
"product_id": "libpcreposix0-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-devel-8.45-20.10.1.ppc64le",
"product_id": "pcre-devel-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.ppc64le",
"product_id": "pcre-devel-static-8.45-20.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.ppc64le",
"product": {
"name": "pcre-tools-8.45-20.10.1.ppc64le",
"product_id": "pcre-tools-8.45-20.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.s390x",
"product": {
"name": "libpcre1-8.45-20.10.1.s390x",
"product_id": "libpcre1-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.s390x",
"product": {
"name": "libpcre16-0-8.45-20.10.1.s390x",
"product_id": "libpcre16-0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.s390x",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.s390x",
"product_id": "libpcrecpp0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.s390x",
"product": {
"name": "libpcreposix0-8.45-20.10.1.s390x",
"product_id": "libpcreposix0-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.s390x",
"product": {
"name": "pcre-devel-8.45-20.10.1.s390x",
"product_id": "pcre-devel-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.s390x",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.s390x",
"product_id": "pcre-devel-static-8.45-20.10.1.s390x"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.s390x",
"product": {
"name": "pcre-tools-8.45-20.10.1.s390x",
"product_id": "pcre-tools-8.45-20.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcre1-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre1-8.45-20.10.1.x86_64",
"product_id": "libpcre1-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre1-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre1-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcre1-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre16-0-8.45-20.10.1.x86_64",
"product_id": "libpcre16-0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcre16-0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcre16-0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcre16-0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcrecpp0-8.45-20.10.1.x86_64",
"product_id": "libpcrecpp0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcrecpp0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-8.45-20.10.1.x86_64",
"product": {
"name": "libpcreposix0-8.45-20.10.1.x86_64",
"product_id": "libpcreposix0-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpcreposix0-32bit-8.45-20.10.1.x86_64",
"product": {
"name": "libpcreposix0-32bit-8.45-20.10.1.x86_64",
"product_id": "libpcreposix0-32bit-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-devel-8.45-20.10.1.x86_64",
"product_id": "pcre-devel-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-devel-static-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-devel-static-8.45-20.10.1.x86_64",
"product_id": "pcre-devel-static-8.45-20.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "pcre-tools-8.45-20.10.1.x86_64",
"product": {
"name": "pcre-tools-8.45-20.10.1.x86_64",
"product_id": "pcre-tools-8.45-20.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre1-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre1-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x"
},
"product_reference": "libpcre1-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre1-32bit-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre1-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcre16-0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x"
},
"product_reference": "libpcre16-0-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre16-0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcre16-0-32bit-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcre16-0-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcrecpp0-32bit-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le"
},
"product_reference": "libpcreposix0-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x"
},
"product_reference": "libpcreposix0-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64"
},
"product_reference": "libpcreposix0-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcreposix0-32bit-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64"
},
"product_reference": "libpcreposix0-32bit-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-devel-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-devel-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x"
},
"product_reference": "pcre-devel-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-devel-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-devel-static-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-devel-static-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x"
},
"product_reference": "pcre-devel-static-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-static-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-devel-static-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-doc-8.45-20.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch"
},
"product_reference": "pcre-doc-8.45-20.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64"
},
"product_reference": "pcre-tools-8.45-20.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le"
},
"product_reference": "pcre-tools-8.45-20.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x"
},
"product_reference": "pcre-tools-8.45-20.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-tools-8.45-20.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
},
"product_reference": "pcre-tools-8.45-20.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20838"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20838",
"url": "https://www.suse.com/security/cve/CVE-2019-20838"
},
{
"category": "external",
"summary": "SUSE Bug 1172973 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1172973"
},
{
"category": "external",
"summary": "SUSE Bug 1189526 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1189526"
},
{
"category": "external",
"summary": "SUSE Bug 1193384 for CVE-2019-20838",
"url": "https://bugzilla.suse.com/1193384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-27T07:23:54Z",
"details": "important"
}
],
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14155"
}
],
"notes": [
{
"category": "general",
"text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14155",
"url": "https://www.suse.com/security/cve/CVE-2020-14155"
},
{
"category": "external",
"summary": "SUSE Bug 1172974 for CVE-2020-14155",
"url": "https://bugzilla.suse.com/1172974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libpcre1-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre1-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcre16-0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcrecpp0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-32bit-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:libpcreposix0-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-devel-static-8.45-20.10.1.x86_64",
"openSUSE Leap 15.3:pcre-doc-8.45-20.10.1.noarch",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.aarch64",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.ppc64le",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.s390x",
"openSUSE Leap 15.3:pcre-tools-8.45-20.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-27T07:23:54Z",
"details": "moderate"
}
],
"title": "CVE-2020-14155"
}
]
}
GSD-2020-14155
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2020-14155",
"description": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"id": "GSD-2020-14155",
"references": [
"https://www.suse.com/security/cve/CVE-2020-14155.html",
"https://access.redhat.com/errata/RHSA-2021:4614",
"https://access.redhat.com/errata/RHSA-2021:4613",
"https://access.redhat.com/errata/RHSA-2021:4373",
"https://linux.oracle.com/cve/CVE-2020-14155.html",
"https://ubuntu.com/security/CVE-2020-14155"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-14155"
],
"details": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.",
"id": "GSD-2020-14155",
"modified": "2023-12-13T01:22:00.306156Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-14155",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.gentoo.org/717920",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/717920"
},
{
"name": "https://www.pcre.org/original/changelog.txt",
"refsource": "MISC",
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"name": "https://support.apple.com/kb/HT211931",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT211931"
},
{
"name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"name": "https://support.apple.com/kb/HT212147",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT212147"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"name": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/",
"refsource": "CONFIRM",
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221028-0010/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c8.44",
"affected_versions": "All versions before 8.44",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-190",
"CWE-937"
],
"date": "2021-09-22",
"description": "libpcre in PCRE allows an integer overflow via a large number.",
"fixed_versions": [
"8.45"
],
"identifier": "CVE-2020-14155",
"identifiers": [
"CVE-2020-14155"
],
"not_impacted": "All versions starting from 8.44",
"package_slug": "conan/pcre",
"pubdate": "2020-06-15",
"solution": "Upgrade to version 8.45 or above.",
"title": "Integer Overflow or Wraparound",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
"https://bugs.gentoo.org/717920",
"https://www.pcre.org/original/changelog.txt"
],
"uuid": "c6b40cc5-2ca7-462d-a227-ab8f078030d3"
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE44B5A4-6CB9-4E93-A4A6-1A9152547258",
"versionEndExcluding": "8.44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EE75CC-3796-416A-9E58-64788BB89240",
"versionEndExcluding": "11.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "69A326C9-D3ED-4AA3-9832-CB7C0BC8D66F",
"versionEndExcluding": "12.10.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "0C533B72-56E8-40ED-8FC2-D4963DB0C397",
"versionEndExcluding": "12.10.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "6C2D99CC-CB24-43D8-A231-C76A2DAE1CFA",
"versionEndExcluding": "13.0.8",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "21BF96AA-827E-4CB3-943B-478C141917D2",
"versionEndExcluding": "13.0.8",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "51809B8F-141D-43B9-BAC5-328E9F4DD7BF",
"versionEndExcluding": "13.1.2",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "54A7E410-0F0C-414A-98AA-C3DA9B5191A5",
"versionEndExcluding": "13.1.2",
"versionStartIncluding": "13.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4367D9B-BF81-47AD-A840-AC46317C774D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D",
"versionEndExcluding": "8.2.12",
"versionStartIncluding": "8.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32",
"versionEndExcluding": "9.0.6",
"versionStartIncluding": "9.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring."
},
{
"lang": "es",
"value": "libpcre en PCRE versiones anteriores a 8.44, permite un desbordamiento de enteros por medio de un n\u00famero grande despu\u00e9s de una subcadena (?C"
}
],
"id": "CVE-2020-14155",
"lastModified": "2024-03-27T16:04:48.863",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-15T17:15:10.777",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/717920"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT211931"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT212147"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.pcre.org/original/changelog.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
FKIE_CVE-2020-14155
Vulnerability from fkie_nvd - Published: 2020-06-15 17:15 - Updated: 2024-11-21 05:02| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://seclists.org/fulldisclosure/2020/Dec/32 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2021/Feb/14 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ | Third Party Advisory | |
| cve@mitre.org | https://bugs.gentoo.org/717920 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20221028-0010/ | Third Party Advisory | |
| cve@mitre.org | https://support.apple.com/kb/HT211931 | Third Party Advisory | |
| cve@mitre.org | https://support.apple.com/kb/HT212147 | Third Party Advisory | |
| cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| cve@mitre.org | https://www.pcre.org/original/changelog.txt | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Dec/32 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Feb/14 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.gentoo.org/717920 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221028-0010/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT211931 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212147 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.pcre.org/original/changelog.txt | Release Notes, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| pcre | pcre | * | |
| apple | macos | * | |
| gitlab | gitlab | * | |
| gitlab | gitlab | * | |
| gitlab | gitlab | * | |
| gitlab | gitlab | * | |
| gitlab | gitlab | * | |
| gitlab | gitlab | * | |
| oracle | communications_cloud_native_core_policy | 1.15.0 | |
| netapp | active_iq_unified_manager | - | |
| netapp | cloud_backup | - | |
| netapp | clustered_data_ontap | - | |
| netapp | ontap_select_deploy_administration_utility | - | |
| netapp | steelstore_cloud_integrated_storage | - | |
| netapp | h410c_firmware | - | |
| netapp | h410c | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - | |
| splunk | universal_forwarder | * | |
| splunk | universal_forwarder | * | |
| splunk | universal_forwarder | 9.1.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE44B5A4-6CB9-4E93-A4A6-1A9152547258",
"versionEndExcluding": "8.44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EE75CC-3796-416A-9E58-64788BB89240",
"versionEndExcluding": "11.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "69A326C9-D3ED-4AA3-9832-CB7C0BC8D66F",
"versionEndExcluding": "12.10.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "0C533B72-56E8-40ED-8FC2-D4963DB0C397",
"versionEndExcluding": "12.10.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "6C2D99CC-CB24-43D8-A231-C76A2DAE1CFA",
"versionEndExcluding": "13.0.8",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "21BF96AA-827E-4CB3-943B-478C141917D2",
"versionEndExcluding": "13.0.8",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"matchCriteriaId": "51809B8F-141D-43B9-BAC5-328E9F4DD7BF",
"versionEndExcluding": "13.1.2",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "54A7E410-0F0C-414A-98AA-C3DA9B5191A5",
"versionEndExcluding": "13.1.2",
"versionStartIncluding": "13.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4367D9B-BF81-47AD-A840-AC46317C774D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D",
"versionEndExcluding": "8.2.12",
"versionStartIncluding": "8.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32",
"versionEndExcluding": "9.0.6",
"versionStartIncluding": "9.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring."
},
{
"lang": "es",
"value": "libpcre en PCRE versiones anteriores a 8.44, permite un desbordamiento de enteros por medio de un n\u00famero grande despu\u00e9s de una subcadena (?C"
}
],
"id": "CVE-2020-14155",
"lastModified": "2024-11-21T05:02:45.440",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-15T17:15:10.777",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/717920"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT211931"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT212147"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.pcre.org/original/changelog.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/717920"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221028-0010/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT211931"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT212147"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.pcre.org/original/changelog.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.