FEDORA-EPEL-2020-348d34c4c6 created by tc01 14 days ago for Fedora EPEL 7
testing stable

Security fix for CVE-2019-3993, CVE-2019-3994, CVE-2019-3995, CVE-2019-3992, CVE-2019-3996

This update has been submitted for testing by tc01.

14 days ago

This update's test gating status has been changed to 'ignored'.

14 days ago

This update has been pushed to testing.

14 days ago

This update can be pushed to stable now if the maintainer wishes

6 hours ago

This update has been submitted for stable by bodhi.

6 hours ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
14 days ago
in testing
14 days ago
BZ#1786750 CVE-2019-3996 elog: unauthenticated remote users can proxy HTTP GET requests via crafted POST requests
0
0
BZ#1786751 CVE-2019-3996 elog: unauthenticated remote users can proxy HTTP GET requests via crafted POST requests [fedora-all]
0
0
BZ#1787051 CVE-2019-3992 elog: allows access the server configuration file by sending a HTTP GET request
0
0
BZ#1787052 CVE-2019-3992 elog: allows access the server configuration file by sending a HTTP GET request [fedora-all]
0
0
BZ#1787055 CVE-2019-3995 elog: NULL pointer dereference via crafted HTTP GET request
0
0
BZ#1787056 CVE-2019-3995 elog: NULL pointer dereference via crafted HTTP GET request [fedora-all]
0
0
BZ#1787060 CVE-2019-3994 elog: use-after-free by sending multiple crafted HTTP POST requests
0
0
BZ#1787062 CVE-2019-3994 elog: use-after-free by sending multiple crafted HTTP POST requests [fedora-all]
0
0
BZ#1787064 CVE-2019-3993 elog: allows recover an user password hash by sending a crafted HTTP POST request
0
0
BZ#1787065 CVE-2019-3993 elog: allows recover an user password hash by sending a crafted HTTP POST request [fedora-all]
0
0

Automated Test Results