ID

VAR-202010-0251


CVE

CVE-2019-17006


TITLE

Network Security Services  Vulnerability for inadequate validation of data reliability in

Trust: 0.8

sources: JVNDB: JVNDB-2019-016070

DESCRIPTION

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. Network Security Services (NSS) Exists in an inadequate validation of data reliability vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Bug Fix(es): * Gather image registry config (backport to 4.3) (BZ#1836815) * Builds fail after running postCommit script if OCP cluster is configured with a container registry whitelist (BZ#1849176) * Login with OpenShift not working after cluster upgrade (BZ#1852429) * Limit the size of gathered federated metrics from alerts in Insights Operator (BZ#1874018) * [4.3] Storage operator stops reconciling when going Upgradeable=False on v1alpha1 CRDs (BZ#1879110) * [release 4.3] OpenShift APIs become unavailable for more than 15 minutes after one of master nodes went down(OAuth) (BZ#1880293) You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-x86_64 The image digest is sha256:9ff90174a170379e90a9ead6e0d8cf6f439004191f80762764a5ca3dbaab01dc (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-s390x The image digest is sha256:605ddde0442e604cfe2d6bd1541ce48df5956fe626edf9cc95b1fca75d231b64 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-ppc64le The image digest is sha256:d3c9e391c145338eae3feb7f6a4e487dadc8139a353117d642fe686d277bcccc 3. Solution: For OpenShift Container Platform 4.3 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.3/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1836815 - Gather image registry config (backport to 4.3) 1849176 - Builds fail after running postCommit script if OCP cluster is configured with a container registry whitelist 1874018 - Limit the size of gathered federated metrics from alerts in Insights Operator 1874399 - [DR] etcd-member-recover.sh fails to pull image with unauthorized 1879110 - [4.3] Storage operator stops reconciling when going Upgradeable=False on v1alpha1 CRDs 5. 7.7) - ppc64, ppc64le, s390x, x86_64 3. Summary: Red Hat Ansible Automation Platform Resource Operator 1.2 (technical preview) images that fix several security issues. Description: Red Hat Ansible Automation Platform Resource Operator container images with security fixes. Ansible Automation Platform manages Ansible Platform jobs and workflows that can interface with any infrastructure on a Red Hat OpenShift Container Platform cluster, or on a traditional infrastructure that is running off-cluster. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1914774 - CVE-2021-20178 ansible: user data leak in snmp_facts module 1915808 - CVE-2021-20180 ansible module: bitbucket_pipeline_variable exposes secured values 1916813 - CVE-2021-20191 ansible: multiple modules expose secured values 1925002 - CVE-2021-20228 ansible: basic.py no_log with fallback option 1939349 - CVE-2021-3447 ansible: multiple modules expose secured values 5. Description: Red Hat OpenShift Do (odo) is a simple CLI tool for developers to create, build, and deploy applications on OpenShift. The odo tool is completely client-based and requires no server within the OpenShift cluster for deployment. It detects changes to local code and deploys it to the cluster automatically, giving instant feedback to validate changes in real-time. It supports multiple programming languages and frameworks. Red Hat OpenShift Do openshift/odo-init-image 1.1.3 is a container image that is used as part of the InitContainer setup that provisions odo components. The advisory addresses the following issues: * Re-release of odo-init-image 1.1.3 for security updates 3. Solution: Download and install a new CLI binary by following the instructions linked from the References section. Bugs fixed (https://bugzilla.redhat.com/): 1832983 - Release of 1.1.3 odo-init-image 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: nss and nspr security, bug fix, and enhancement update Advisory ID: RHSA-2020:4076-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4076 Issue date: 2020-09-29 CVE Names: CVE-2019-11719 CVE-2019-11727 CVE-2019-11756 CVE-2019-17006 CVE-2019-17023 CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12402 CVE-2020-12403 ==================================================================== 1. Summary: An update for nss, nss-softokn, nss-util, and nspr is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0). (BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273) Security Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958) * NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1712924) * Make TLS 1.3 work in FIPS mode (BZ#1724251) * Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1737910) * x25519 allowed in FIPS mode (BZ#1754518) * When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess (BZ#1779325) * Running ipa-backup continuously causes httpd to crash and makes it irrecoverable (BZ#1804015) * nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308) * KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, applications using NSS or NSPR (for example, Firefox) must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1688958 - Memory leak: libcurl leaks 120 bytes on each connection [rhel-7.9.z] 1724251 - Make TLS 1.3 work in FIPS mode [rhel-7.9.z] 1728436 - CVE-2019-11719 nss: Out-of-bounds read when importing curve25519 private key 1730988 - CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 1737910 - Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name [rhel-7.9.z] 1774835 - CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting 1775916 - CVE-2019-17006 nss: Check length of inputs for cryptographic primitives 1779325 - when NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess 1791225 - CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state 1804015 - Running ipa-backup continuously causes httpd to crash and makes it irrecoverable 1826187 - CVE-2020-6829 nss: Side channel attack on ECDSA signature generation 1826231 - CVE-2020-12402 nss: Side channel vulnerabilities during RSA key generation 1851294 - CVE-2020-12401 nss: ECDSA timing attack mitigation bypass 1853983 - CVE-2020-12400 nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function 1868931 - CVE-2020-12403 nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read 1870885 - KDF-self-tests-induced changes for nss in RHEL 7.9 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: nspr-4.25.0-2.el7_9.src.rpm nss-3.53.1-3.el7_9.src.rpm nss-softokn-3.53.1-6.el7_9.src.rpm nss-util-3.53.1-1.el7_9.src.rpm x86_64: nspr-4.25.0-2.el7_9.i686.rpm nspr-4.25.0-2.el7_9.x86_64.rpm nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nss-3.53.1-3.el7_9.i686.rpm nss-3.53.1-3.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-softokn-3.53.1-6.el7_9.i686.rpm nss-softokn-3.53.1-6.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm nss-sysinit-3.53.1-3.el7_9.x86_64.rpm nss-tools-3.53.1-3.el7_9.x86_64.rpm nss-util-3.53.1-1.el7_9.i686.rpm nss-util-3.53.1-1.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nspr-devel-4.25.0-2.el7_9.i686.rpm nspr-devel-4.25.0-2.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-devel-3.53.1-3.el7_9.i686.rpm nss-devel-3.53.1-3.el7_9.x86_64.rpm nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm nss-util-devel-3.53.1-1.el7_9.i686.rpm nss-util-devel-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nspr-4.25.0-2.el7_9.src.rpm nss-3.53.1-3.el7_9.src.rpm nss-softokn-3.53.1-6.el7_9.src.rpm nss-util-3.53.1-1.el7_9.src.rpm x86_64: nspr-4.25.0-2.el7_9.i686.rpm nspr-4.25.0-2.el7_9.x86_64.rpm nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nss-3.53.1-3.el7_9.i686.rpm nss-3.53.1-3.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-softokn-3.53.1-6.el7_9.i686.rpm nss-softokn-3.53.1-6.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm nss-sysinit-3.53.1-3.el7_9.x86_64.rpm nss-tools-3.53.1-3.el7_9.x86_64.rpm nss-util-3.53.1-1.el7_9.i686.rpm nss-util-3.53.1-1.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nspr-devel-4.25.0-2.el7_9.i686.rpm nspr-devel-4.25.0-2.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-devel-3.53.1-3.el7_9.i686.rpm nss-devel-3.53.1-3.el7_9.x86_64.rpm nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm nss-util-devel-3.53.1-1.el7_9.i686.rpm nss-util-devel-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nspr-4.25.0-2.el7_9.src.rpm nss-3.53.1-3.el7_9.src.rpm nss-softokn-3.53.1-6.el7_9.src.rpm nss-util-3.53.1-1.el7_9.src.rpm ppc64: nspr-4.25.0-2.el7_9.ppc.rpm nspr-4.25.0-2.el7_9.ppc64.rpm nspr-debuginfo-4.25.0-2.el7_9.ppc.rpm nspr-debuginfo-4.25.0-2.el7_9.ppc64.rpm nspr-devel-4.25.0-2.el7_9.ppc.rpm nspr-devel-4.25.0-2.el7_9.ppc64.rpm nss-3.53.1-3.el7_9.ppc.rpm nss-3.53.1-3.el7_9.ppc64.rpm nss-debuginfo-3.53.1-3.el7_9.ppc.rpm nss-debuginfo-3.53.1-3.el7_9.ppc64.rpm nss-devel-3.53.1-3.el7_9.ppc.rpm nss-devel-3.53.1-3.el7_9.ppc64.rpm nss-softokn-3.53.1-6.el7_9.ppc.rpm nss-softokn-3.53.1-6.el7_9.ppc64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.ppc.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.ppc64.rpm nss-softokn-devel-3.53.1-6.el7_9.ppc.rpm nss-softokn-devel-3.53.1-6.el7_9.ppc64.rpm nss-softokn-freebl-3.53.1-6.el7_9.ppc.rpm nss-softokn-freebl-3.53.1-6.el7_9.ppc64.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc64.rpm nss-sysinit-3.53.1-3.el7_9.ppc64.rpm nss-tools-3.53.1-3.el7_9.ppc64.rpm nss-util-3.53.1-1.el7_9.ppc.rpm nss-util-3.53.1-1.el7_9.ppc64.rpm nss-util-debuginfo-3.53.1-1.el7_9.ppc.rpm nss-util-debuginfo-3.53.1-1.el7_9.ppc64.rpm nss-util-devel-3.53.1-1.el7_9.ppc.rpm nss-util-devel-3.53.1-1.el7_9.ppc64.rpm ppc64le: nspr-4.25.0-2.el7_9.ppc64le.rpm nspr-debuginfo-4.25.0-2.el7_9.ppc64le.rpm nspr-devel-4.25.0-2.el7_9.ppc64le.rpm nss-3.53.1-3.el7_9.ppc64le.rpm nss-debuginfo-3.53.1-3.el7_9.ppc64le.rpm nss-devel-3.53.1-3.el7_9.ppc64le.rpm nss-softokn-3.53.1-6.el7_9.ppc64le.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.ppc64le.rpm nss-softokn-devel-3.53.1-6.el7_9.ppc64le.rpm nss-softokn-freebl-3.53.1-6.el7_9.ppc64le.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc64le.rpm nss-sysinit-3.53.1-3.el7_9.ppc64le.rpm nss-tools-3.53.1-3.el7_9.ppc64le.rpm nss-util-3.53.1-1.el7_9.ppc64le.rpm nss-util-debuginfo-3.53.1-1.el7_9.ppc64le.rpm nss-util-devel-3.53.1-1.el7_9.ppc64le.rpm s390x: nspr-4.25.0-2.el7_9.s390.rpm nspr-4.25.0-2.el7_9.s390x.rpm nspr-debuginfo-4.25.0-2.el7_9.s390.rpm nspr-debuginfo-4.25.0-2.el7_9.s390x.rpm nspr-devel-4.25.0-2.el7_9.s390.rpm nspr-devel-4.25.0-2.el7_9.s390x.rpm nss-3.53.1-3.el7_9.s390.rpm nss-3.53.1-3.el7_9.s390x.rpm nss-debuginfo-3.53.1-3.el7_9.s390.rpm nss-debuginfo-3.53.1-3.el7_9.s390x.rpm nss-devel-3.53.1-3.el7_9.s390.rpm nss-devel-3.53.1-3.el7_9.s390x.rpm nss-softokn-3.53.1-6.el7_9.s390.rpm nss-softokn-3.53.1-6.el7_9.s390x.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.s390.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.s390x.rpm nss-softokn-devel-3.53.1-6.el7_9.s390.rpm nss-softokn-devel-3.53.1-6.el7_9.s390x.rpm nss-softokn-freebl-3.53.1-6.el7_9.s390.rpm nss-softokn-freebl-3.53.1-6.el7_9.s390x.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.s390.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.s390x.rpm nss-sysinit-3.53.1-3.el7_9.s390x.rpm nss-tools-3.53.1-3.el7_9.s390x.rpm nss-util-3.53.1-1.el7_9.s390.rpm nss-util-3.53.1-1.el7_9.s390x.rpm nss-util-debuginfo-3.53.1-1.el7_9.s390.rpm nss-util-debuginfo-3.53.1-1.el7_9.s390x.rpm nss-util-devel-3.53.1-1.el7_9.s390.rpm nss-util-devel-3.53.1-1.el7_9.s390x.rpm x86_64: nspr-4.25.0-2.el7_9.i686.rpm nspr-4.25.0-2.el7_9.x86_64.rpm nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nspr-devel-4.25.0-2.el7_9.i686.rpm nspr-devel-4.25.0-2.el7_9.x86_64.rpm nss-3.53.1-3.el7_9.i686.rpm nss-3.53.1-3.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-devel-3.53.1-3.el7_9.i686.rpm nss-devel-3.53.1-3.el7_9.x86_64.rpm nss-softokn-3.53.1-6.el7_9.i686.rpm nss-softokn-3.53.1-6.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm nss-sysinit-3.53.1-3.el7_9.x86_64.rpm nss-tools-3.53.1-3.el7_9.x86_64.rpm nss-util-3.53.1-1.el7_9.i686.rpm nss-util-3.53.1-1.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm nss-util-devel-3.53.1-1.el7_9.i686.rpm nss-util-devel-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: nss-debuginfo-3.53.1-3.el7_9.ppc.rpm nss-debuginfo-3.53.1-3.el7_9.ppc64.rpm nss-pkcs11-devel-3.53.1-3.el7_9.ppc.rpm nss-pkcs11-devel-3.53.1-3.el7_9.ppc64.rpm ppc64le: nss-debuginfo-3.53.1-3.el7_9.ppc64le.rpm nss-pkcs11-devel-3.53.1-3.el7_9.ppc64le.rpm s390x: nss-debuginfo-3.53.1-3.el7_9.s390.rpm nss-debuginfo-3.53.1-3.el7_9.s390x.rpm nss-pkcs11-devel-3.53.1-3.el7_9.s390.rpm nss-pkcs11-devel-3.53.1-3.el7_9.s390x.rpm x86_64: nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: nspr-4.25.0-2.el7_9.src.rpm nss-3.53.1-3.el7_9.src.rpm nss-softokn-3.53.1-6.el7_9.src.rpm nss-util-3.53.1-1.el7_9.src.rpm x86_64: nspr-4.25.0-2.el7_9.i686.rpm nspr-4.25.0-2.el7_9.x86_64.rpm nspr-debuginfo-4.25.0-2.el7_9.i686.rpm nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm nspr-devel-4.25.0-2.el7_9.i686.rpm nspr-devel-4.25.0-2.el7_9.x86_64.rpm nss-3.53.1-3.el7_9.i686.rpm nss-3.53.1-3.el7_9.x86_64.rpm nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-devel-3.53.1-3.el7_9.i686.rpm nss-devel-3.53.1-3.el7_9.x86_64.rpm nss-softokn-3.53.1-6.el7_9.i686.rpm nss-softokn-3.53.1-6.el7_9.x86_64.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm nss-softokn-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm nss-sysinit-3.53.1-3.el7_9.x86_64.rpm nss-tools-3.53.1-3.el7_9.x86_64.rpm nss-util-3.53.1-1.el7_9.i686.rpm nss-util-3.53.1-1.el7_9.x86_64.rpm nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm nss-util-devel-3.53.1-1.el7_9.i686.rpm nss-util-devel-3.53.1-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: nss-debuginfo-3.53.1-3.el7_9.i686.rpm nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-11719 https://access.redhat.com/security/cve/CVE-2019-11727 https://access.redhat.com/security/cve/CVE-2019-11756 https://access.redhat.com/security/cve/CVE-2019-17006 https://access.redhat.com/security/cve/CVE-2019-17023 https://access.redhat.com/security/cve/CVE-2020-6829 https://access.redhat.com/security/cve/CVE-2020-12400 https://access.redhat.com/security/cve/CVE-2020-12401 https://access.redhat.com/security/cve/CVE-2020-12402 https://access.redhat.com/security/cve/CVE-2020-12403 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX3Ok2NzjgjWX9erEAQidHRAAn/wr+iQpt5b54IqKwTLgtnBpRshAWWk1 9xIvejwv+oMhbvULKuTeiCKZetFXErAZcyPYwChDt2X5ZoGUxsIUAAx8pphKaScM 7dLXSGqgYNtduYmBAc2XlDIk244sYednkJ12uK6AjIgtY93wPcrk7wR9wbMF6xKL 9YjsfdKso7bN3vIx43idBVvgs2yArnFYhzCu7azIHxnuiDu9QC1KUomAhEjLlFFk vjsbxL32eb/XFQ6pizoO2Nn3ZREejnAOlTu9U0Hc/u4FxRTns+HcVx6GIA+yNNMO Hfbq1cKzshd7yowumhvatQNjtddmI8pHpW78KVJPma9t8IuoegXAwsXhti39dmtG mWcT0k+1ve+f9MIjY0FpZSFZycyUnmRf+bSstBwsoTL0hHe3RLOEYWulJMZGLyyg yCE36KONSTBo2SoNUMKVlWEIFVvEs9ixq0gzr9tGtGtYra5/GZ0MZntUM2zDwX6N Kd9i7BrjujmL+x0hdjHxGd8BbIf0DO7xOrKyB6IhRu+8MO2qoQayQ3dzyzJixH4z HMk5J5qMHcC2PVxLcKyIbKerm00ZY3ZNarxYdRHmJoX7xV2K69PiPv+2+82k8138 3OVEJSsjfckX2/tinighYNX8HsTtLG8+G1THzF5oRqCS9+T6lBsoorpL+X+YqJNQ eHKv0fAxZzA=Zbhx -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - aarch64, ppc64le, s390x 3. Solution: For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/ index.html 4. For the stable distribution (buster), these problems have been fixed in version 2:3.42.1-1+deb10u3. For the detailed security status of nss please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nss Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl8R6BYACgkQEMKTtsN8 Tjbolg/9H3VC4r4Wmc8A4OejmH67QEZqyhzCxvd4UCpvLTJuY9JOYGy3KVhClnsz XDTqyQ8k5ez7OQt5HLy3giLJpMKUSYuSDJSbK0A3DTO5bKVg17Uol5X6RA7Coz/2 yJRRWH03dTfRoqaWQ8xHigBChTxMdYhkvh6433DzLpbuj+FV77FcivjTxZB2zFrp tHuvzN9exI4+aZCFAZPyRFct0vYHpHCP8qzgD+FMflInzBAARFPjnx8+c50+Hlp2 cB/Iq3L5EiE5T1azAAD8fgKqEGnF9OHjWxBONhXqXwhvnKKqfrLIpMf+oBvr8OEZ rKZElK0wQb6z24vDiDxFR8C8EuigYpV3YDsWwu3V8M71igw8DJseHQ/UnC4dT/Y3 QTtNtcWcheM5qiOnkiHCCZsybglI6NbdxPwfnhv9ltnunipFPtE8A56QQuOXGIcc 4P/5tRlRwAVSy+JZVCbJu7jrBe/y02RYXb6Sv5hZ0iqUAZadiFlJC0WdvWAOLJsL Z/IrRkH7KMwchOAxp5NY6qHfxXHKjFvfahglFkDsaYoEwVROKjhG5idn3NVCc656 tP5rcl1dQY4LHQZEESgps86uJGy9+8NpHHU9v9fqFZNlkBfYBWTZv0otzssOwPfu QIq7f2J77JHM8ldYzmfDVQnWBnKpnjc/B8UmvaaAkEM73N3MPu0= =VQPA -----END PGP SIGNATURE-----

Trust: 2.52

sources: NVD: CVE-2019-17006 // JVNDB: JVNDB-2019-016070 // VULMON: CVE-2019-17006 // PACKETSTORM: 159661 // PACKETSTORM: 162026 // PACKETSTORM: 162142 // PACKETSTORM: 159553 // PACKETSTORM: 161916 // PACKETSTORM: 159396 // PACKETSTORM: 161842 // PACKETSTORM: 159552 // PACKETSTORM: 168879

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rox rx1400scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1512scope:ltversion:2.14.0

Trust: 1.0

vendor:netappmodel:hci storage nodescope:eqversion: -

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1510scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx5000scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1501scope:ltversion:2.14.0

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1511scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox mx5000scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1500scope:ltversion:2.14.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:ltversion:3.46

Trust: 1.0

vendor:mozillamodel:network security servicesscope: - version: -

Trust: 0.8

vendor:netappmodel:hci management nodescope: - version: -

Trust: 0.8

vendor:netappmodel:solidfirescope: - version: -

Trust: 0.8

vendor:netappmodel:hci compute nodescope: - version: -

Trust: 0.8

vendor:netappmodel:hci storage nodescope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1400scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1500scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1501scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1510scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1511scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1512scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx5000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-016070 // NVD: CVE-2019-17006

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-17006
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-17006
value: CRITICAL

Trust: 0.8

VULMON: CVE-2019-17006
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-17006
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2019-17006
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-17006
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2019-17006 // JVNDB: JVNDB-2019-016070 // NVD: CVE-2019-17006

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-20

Trust: 1.0

problemtype:Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2019-016070 // NVD: CVE-2019-17006

THREAT TYPE

local

Trust: 0.1

sources: PACKETSTORM: 161916

TYPE

memory leak

Trust: 0.1

sources: PACKETSTORM: 159396

PATCH

title:NTAP-20210129-0001 Siemens Siemens Security Advisoryurl:https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes

Trust: 0.8

title:Ubuntu Security Notice: nss vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4231-1

Trust: 0.1

title:Red Hat: Moderate: nss and nspr security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203280 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: A security vulnerabilitiy has been fixed in IBM Security Identity Manager Virtual Appliance(CVE-2019-17006)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=a91447c5697ecfb6bbab6f4cf67cb949

Trust: 0.1

title:Red Hat: Moderate: nss and nspr security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204076 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4726-1 nss -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2610caa3eacc40f97585be7c579718bd

Trust: 0.1

title:Red Hat: Low: OpenShift Virtualization 2.4.2 Imagesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204201 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: IBM Security Privileged Identity Manager is affected by security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=52844442ae85845bde006e7f0170408e

Trust: 0.1

title:Red Hat: Moderate: security update - Red Hat Ansible Tower 3.6 runner release (CVE-2019-18874)url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204255 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: security update - Red Hat Ansible Tower 3.7 runner release (CVE-2019-18874)url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204254 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=409c1cd1b8ef401020956950fd839000

Trust: 0.1

title:Red Hat: Low: OpenShift Container Platform 4.3.40 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204264 - Security Advisory

Trust: 0.1

title:zoturl:https://github.com/anuvu/zot

Trust: 0.1

sources: VULMON: CVE-2019-17006 // JVNDB: JVNDB-2019-016070

EXTERNAL IDS

db:NVDid:CVE-2019-17006

Trust: 2.8

db:ICS CERTid:ICSA-21-040-04

Trust: 1.9

db:SIEMENSid:SSA-379803

Trust: 1.1

db:JVNDBid:JVNDB-2019-016070

Trust: 0.8

db:VULMONid:CVE-2019-17006

Trust: 0.1

db:PACKETSTORMid:159661

Trust: 0.1

db:PACKETSTORMid:162026

Trust: 0.1

db:PACKETSTORMid:162142

Trust: 0.1

db:PACKETSTORMid:159553

Trust: 0.1

db:PACKETSTORMid:161916

Trust: 0.1

db:PACKETSTORMid:159396

Trust: 0.1

db:PACKETSTORMid:161842

Trust: 0.1

db:PACKETSTORMid:159552

Trust: 0.1

db:PACKETSTORMid:168879

Trust: 0.1

sources: VULMON: CVE-2019-17006 // JVNDB: JVNDB-2019-016070 // PACKETSTORM: 159661 // PACKETSTORM: 162026 // PACKETSTORM: 162142 // PACKETSTORM: 159553 // PACKETSTORM: 161916 // PACKETSTORM: 159396 // PACKETSTORM: 161842 // PACKETSTORM: 159552 // PACKETSTORM: 168879 // NVD: CVE-2019-17006

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-17006

Trust: 1.7

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.46_release_notes

Trust: 1.1

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1539788

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210129-0001/

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2020-12403

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11756

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-11756

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-17006

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-17023

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2019-17023

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-6829

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-12400

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-11727

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-11719

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-12402

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-12401

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-11719

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-11727

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-12749

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-14866

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-20388

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-12243

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-17498

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-12749

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-7595

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-19956

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-5094

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-19956

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-15903

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-20843

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-5188

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-20843

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20388

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-14866

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-5094

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-5188

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-15903

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-17498

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-12403

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-12400

Trust: 0.5

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-12652

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-14973

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-17546

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-14973

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-12652

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-17546

Trust: 0.4

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-12402

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-12243

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-19126

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-5482

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-16935

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-12450

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20386

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-14822

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-14822

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-16935

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-5482

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-12450

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20386

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-19126

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-12401

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-5313

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20907

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1971

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8177

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1971

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20907

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1240

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-18874

Trust: 0.2

url:https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-18874

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14365

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6829

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/345.html

Trust: 0.1

url:https://usn.ubuntu.com/4231-1/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/111311

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4264

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-2974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2226

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2780

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2752

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2574

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14352

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8492

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12825

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2181

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2182

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.3/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8675

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2224

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2812

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1026

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1079

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3447

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-5313

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20191

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14422

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14422

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4255

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8177

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.4/cli_reference/openshift_developer_cli/installing-odo.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7595

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4076

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17007

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4254

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12399

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/nss

Trust: 0.1

sources: VULMON: CVE-2019-17006 // JVNDB: JVNDB-2019-016070 // PACKETSTORM: 159661 // PACKETSTORM: 162026 // PACKETSTORM: 162142 // PACKETSTORM: 159553 // PACKETSTORM: 161916 // PACKETSTORM: 159396 // PACKETSTORM: 161842 // PACKETSTORM: 159552 // PACKETSTORM: 168879 // NVD: CVE-2019-17006

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 159661 // PACKETSTORM: 162026 // PACKETSTORM: 162142 // PACKETSTORM: 159553 // PACKETSTORM: 161916 // PACKETSTORM: 159396 // PACKETSTORM: 161842 // PACKETSTORM: 159552

SOURCES

db:VULMONid:CVE-2019-17006
db:JVNDBid:JVNDB-2019-016070
db:PACKETSTORMid:159661
db:PACKETSTORMid:162026
db:PACKETSTORMid:162142
db:PACKETSTORMid:159553
db:PACKETSTORMid:161916
db:PACKETSTORMid:159396
db:PACKETSTORMid:161842
db:PACKETSTORMid:159552
db:PACKETSTORMid:168879
db:NVDid:CVE-2019-17006

LAST UPDATE DATE

2024-11-07T20:45:55.787000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2019-17006date:2021-02-19T00:00:00
db:JVNDBid:JVNDB-2019-016070date:2021-05-12T08:27:00
db:NVDid:CVE-2019-17006date:2021-07-21T11:39:23.747

SOURCES RELEASE DATE

db:VULMONid:CVE-2019-17006date:2020-10-22T00:00:00
db:JVNDBid:JVNDB-2019-016070date:2021-05-12T00:00:00
db:PACKETSTORMid:159661date:2020-10-21T15:40:32
db:PACKETSTORMid:162026date:2021-03-30T14:29:43
db:PACKETSTORMid:162142date:2021-04-09T15:06:13
db:PACKETSTORMid:159553date:2020-10-14T16:52:18
db:PACKETSTORMid:161916date:2021-03-22T15:36:55
db:PACKETSTORMid:159396date:2020-09-30T15:50:53
db:PACKETSTORMid:161842date:2021-03-17T14:35:53
db:PACKETSTORMid:159552date:2020-10-14T16:52:12
db:PACKETSTORMid:168879date:2020-07-28T19:12:00
db:NVDid:CVE-2019-17006date:2020-10-22T21:15:12.560