cvelist/2021/31xxx/CVE-2021-31918.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2021-04-29 19:00:53 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31918",
2021-05-06 17:00:43 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "tripleo-ansible",
"version": {
"version_data": [
{
"version_value": "As shipped in Red Hat Openstack 16.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1954250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954250"
}
]
2021-04-29 19:00:53 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-05-06 17:00:43 +00:00
"value": "A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality."
2021-04-29 19:00:53 +00:00
}
]
}
}