U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-11135

Change History

Modified Analysis by NIST 10/07/2022 11:03:48 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:codeready_linux_builder_eus:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:codeready_linux_builder_eus:8.2:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html Mailing List, Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0026 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0026 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0028 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0028 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0204 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0204 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0279 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0279 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0366 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0366 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0555 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0555 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0666 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0666 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0730 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0730 Third Party Advisory
Changed Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10306 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10306 Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html Mailing List, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/ Mailing List, Third Party Advisory
Changed Reference Type
https://seclists.org/bugtraq/2019/Dec/28 No Types Assigned
https://seclists.org/bugtraq/2019/Dec/28 Mailing List, Third Party Advisory
Changed Reference Type
https://seclists.org/bugtraq/2020/Jan/21 No Types Assigned
https://seclists.org/bugtraq/2020/Jan/21 Mailing List, Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/202003-56 No Types Assigned
https://security.gentoo.org/glsa/202003-56 Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2020/dsa-4602 No Types Assigned
https://www.debian.org/security/2020/dsa-4602 Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujan2021.html No Types Assigned
https://www.oracle.com/security-alerts/cpujan2021.html Patch, Third Party Advisory