{"id":"RHSA-2020:1644","summary":"Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update","modified":"2026-03-13T10:01:49Z","published":"2024-09-13T22:39:57Z","upstream":["CVE-2019-14540","CVE-2019-16335","CVE-2019-16942","CVE-2019-16943","CVE-2019-17531","CVE-2019-20330","CVE-2020-10672","CVE-2020-10673","CVE-2020-8840","CVE-2020-9546","CVE-2020-9547","CVE-2020-9548"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:1644"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535313"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655438"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1698084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1755831"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1755849"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777032"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1782486"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1795215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1806840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809210"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1644.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-14540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-14540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16335"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16335"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16335"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16942"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16942"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16942"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16943"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16943"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16943"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-17531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-17531"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17531"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20330"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20330"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816330"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8840"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8840"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-9546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816332"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-9546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9546"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-9547"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816337"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-9547"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9547"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-9548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816340"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-9548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9548"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10672"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1815495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10672"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10672"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1815470"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10673"}],"affected":[{"package":{"name":"apache-commons-collections","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/apache-commons-collections"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.2-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"apache-commons-lang","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/apache-commons-lang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6-21.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"bea-stax","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/bea-stax"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-16.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"bea-stax-api","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/bea-stax-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-16.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-fastinfoset","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-fastinfoset"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.13-9.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-jaxb","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-jaxb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.11-11.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-jaxb-api","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-jaxb-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.12-8.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-jaxb-core","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-jaxb-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.11-11.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-jaxb-runtime","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-jaxb-runtime"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.11-11.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"glassfish-jaxb-txw2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/glassfish-jaxb-txw2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.11-11.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-annotations","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-annotations"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.10.0-1.module+el8.2.0+5059+3eb3af25"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-core","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.10.0-1.module+el8.2.0+5059+3eb3af25"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-databind","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-databind"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.10.0-1.module+el8.2.0+5059+3eb3af25"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-jaxrs-json-provider","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-jaxrs-json-provider"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.9.9-1.module+el8.1.0+3832+9784644d"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-jaxrs-providers","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-jaxrs-providers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.9.9-1.module+el8.1.0+3832+9784644d"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jackson-module-jaxb-annotations","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jackson-module-jaxb-annotations"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.6-4.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jakarta-commons-httpclient","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jakarta-commons-httpclient"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.1-28.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"javassist","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/javassist"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.18.1-8.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"javassist-javadoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/javassist-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.18.1-8.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.module+el8.2.0+6123+b4678599"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jss-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jss-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.module+el8.2.0+6123+b4678599"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jss-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jss-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.module+el8.2.0+6123+b4678599"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"jss-javadoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/jss-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.module+el8.2.0+6123+b4678599"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"ldapjdk","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ldapjdk"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.21.0-2.module+el8.2.0+4573+c3c38c7b"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"ldapjdk-javadoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ldapjdk-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.21.0-2.module+el8.2.0+4573+c3c38c7b"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-base","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-base-java","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-base-java"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-ca","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-ca"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-core","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-core-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-core-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-core-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-core-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-kra","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-kra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-server","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-servlet-4.0-api","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-servlet-4.0-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:9.0.7-16.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-servlet-engine","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-servlet-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:9.0.7-16.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-symkey","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-symkey"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-symkey-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-symkey-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-tools","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"pki-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/pki-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python-nss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python-nss-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python-nss-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python-nss-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python-nss-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python3-nss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python3-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python3-nss-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python3-nss-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-10.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"python3-pki","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/python3-pki"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:10.8.3-1.module+el8.2.0+5925+bad5981a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"relaxngDatatype","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/relaxngDatatype"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2011.1-7.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"resteasy","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/resteasy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.26-3.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"slf4j","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/slf4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.25-4.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"slf4j-jdk14","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/slf4j-jdk14"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.25-4.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"stax-ex","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/stax-ex"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.7-8.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"tomcatjss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/tomcatjss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.1-2.module+el8.2.0+4573+c3c38c7b"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"velocity","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/velocity"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7-24.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xalan-j2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xalan-j2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.1-38.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xerces-j2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xerces-j2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.11.0-34.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xml-commons-apis","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xml-commons-apis"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.01-25.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xml-commons-resolver","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xml-commons-resolver"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2-26.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xmlstreambuffer","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xmlstreambuffer"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.4-8.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}},{"package":{"name":"xsom","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/xsom"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1644.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}