Vulnerability Change Records for CVE-2015-5346

Change History

CVE Modified by Red Hat, Inc. 6/01/2018 9:29:00 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://security.netapp.com/advisory/ntap-20180531-0001/ [No Types Assigned]

Modified Analysis 3/01/2016 2:50:51 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
Configuration 1
     OR
          *cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NVD-CWE-Other
Added Evaluator Description

								
							
							
						
<a href="https://cwe.mitre.org/data/definitions/384.html">CWE-384: Session Fixation</a>
Changed Reference Type
http://tomcat.apache.org/security-7.html No Types Assigned
http://tomcat.apache.org/security-7.html Advisory
Changed Reference Type
http://tomcat.apache.org/security-8.html No Types Assigned
http://tomcat.apache.org/security-8.html Advisory
Changed Reference Type
http://tomcat.apache.org/security-9.html No Types Assigned
http://tomcat.apache.org/security-9.html Advisory

CVE Modified by Source 4/25/2016 9:59:19 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.debian.org/security/2016/dsa-3530

CVE Modified by Source 6/10/2016 10:0:33 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
Added Reference

								
							
							
						
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626

CVE Modified by Red Hat, Inc. 2/13/2020 12:15:24 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E [No Types Assigned]

Initial CVE Analysis 2/26/2016 8:26:55 AM

Action Type Old Value New Value

CVE Modified by Red Hat, Inc. 11/29/2016 10:1:54 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://rhn.redhat.com/errata/RHSA-2016-1089.html [No Types Assigned]
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2016:1087 [No Types Assigned]
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2016:1088 [No Types Assigned]

CVE Modified by Source 7/27/2016 9:59:11 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
Added Reference

								
							
							
						
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626

CVE Modified by Source 10/26/2016 9:59:26 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

CVE Modified by Source 7/28/2016 9:59:13 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.debian.org/security/2016/dsa-3552

Modified Analysis 5/27/2016 11:47:29 AM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*
Configuration 1
     OR
          *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*

CVE Modified by Red Hat, Inc. 12/05/2016 10:2:55 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html [No Types Assigned]
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1035069 [No Types Assigned]

CVE Modified by Red Hat, Inc. 1/04/2018 9:30:13 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://rhn.redhat.com/errata/RHSA-2016-2807.html [No Types Assigned]
Added Reference

								
							
							
						
http://rhn.redhat.com/errata/RHSA-2016-2808.html [No Types Assigned]

CVE Modified by Source 8/22/2016 10:9:58 PM

Action Type Old Value New Value
Removed Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442

								
						
Removed Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626

								
						

CVE Modified by Red Hat, Inc. 7/18/2018 9:29:02 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html [No Types Assigned]

CVE Modified by Red Hat, Inc. 11/28/2016 2:33:10 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/83323 [No Types Assigned]

CVE Modified by Source 7/18/2016 9:59:11 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.debian.org/security/2016/dsa-3609
Added Reference

								
							
							
						
http://www.ubuntu.com/usn/USN-3024-1

CVE Modified by Red Hat, Inc. 12/02/2016 10:11:03 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html [No Types Assigned]
Added Reference

								
							
							
						
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html [No Types Assigned]
Added Reference

								
							
							
						
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html [No Types Assigned]
Added Reference

								
							
							
						
https://bto.bluecoat.com/security-advisory/sa118 [No Types Assigned]

CVE Modified by Red Hat, Inc. 6/30/2017 9:29:19 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://security.gentoo.org/glsa/201705-09 [No Types Assigned]

CVE Modified by Source 10/14/2016 10:2:55 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://rhn.redhat.com/errata/RHSA-2016-2046.html
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html