Skip to content

Commit

Permalink
Updated VEX files
Browse files Browse the repository at this point in the history
Signed-off-by: mrizzi <mrizzi@redhat.com>
  • Loading branch information
mrizzi committed Nov 24, 2023
1 parent 0f4a266 commit 1bc02a7
Show file tree
Hide file tree
Showing 21 changed files with 115,061 additions and 76,434 deletions.
96 changes: 48 additions & 48 deletions data/ds1/csaf/cve-2023-1108.json
Original file line number Diff line number Diff line change
Expand Up @@ -35,11 +35,11 @@
"url": "https://access.redhat.com/security/data/csaf/beta/vex/2023/cve-2023-1108.json"
}
],
"title": "Infinite loop in SslConduit during close",
"title": "Undertow: Infinite loop in SslConduit during close",
"tracking": {
"current_release_date": "2023-09-14T14:20:52+00:00",
"generator": {
"date": "2023-11-09T01:22:56+00:00",
"date": "2023-11-14T23:15:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "3.24.0"
Expand Down Expand Up @@ -9368,7 +9368,7 @@
},
{
"category": "summary",
"text": "Infinite loop in SslConduit during close",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
Expand Down Expand Up @@ -9840,6 +9840,14 @@
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Fuse 7.12"
],
"url": "https://access.redhat.com/errata/RHSA-2023:3954"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
Expand Down Expand Up @@ -9879,35 +9887,11 @@
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.8-1.redhat_00001.1.el7sso.noarch"
],
"url": "https://access.redhat.com/errata/RHSA-2023:3883"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
"Red Hat support for Spring Boot 2.7.13"
],
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
"url": "https://access.redhat.com/errata/RHSA-2023:4612"
},
{
"category": "vendor_fix",
Expand All @@ -9919,40 +9903,46 @@
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"url": "https://access.redhat.com/errata/RHSA-2023:1184"
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.8-1.redhat_00001.1.el9sso.noarch"
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.8-1.redhat_00001.1.el7sso.noarch"
],
"url": "https://access.redhat.com/errata/RHSA-2023:3885"
"url": "https://access.redhat.com/errata/RHSA-2023:3883"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Fuse 7.12"
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"url": "https://access.redhat.com/errata/RHSA-2023:3954"
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "vendor_fix",
Expand All @@ -9966,11 +9956,21 @@
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat support for Spring Boot 2.7.13"
"Red Hat JBoss Enterprise Application Platform 7"
],
"url": "https://access.redhat.com/errata/RHSA-2023:4612"
"url": "https://access.redhat.com/errata/RHSA-2023:1184"
},
{
"category": "vendor_fix",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.8-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.8-1.redhat_00001.1.el9sso.noarch"
],
"url": "https://access.redhat.com/errata/RHSA-2023:3885"
},
{
"category": "vendor_fix",
Expand Down Expand Up @@ -10146,7 +10146,7 @@
]
}
],
"title": "Infinite loop in SslConduit during close"
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
Loading

0 comments on commit 1bc02a7

Please sign in to comment.