cvelist/2019/6xxx/CVE-2019-6501.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2019-01-21 14:03:45 -05:00
{
2019-03-18 03:00:03 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6501",
2019-03-18 14:00:59 +00:00
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
2019-03-18 03:00:03 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
2019-03-18 14:00:59 +00:00
"value": "In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "MLIST [oss-security] 20190124 CVE-2019-6501 QEMU: scsi-generic: possible OOB access while handling inquiry request",
"url": "http://www.openwall.com/lists/oss-security/2019/01/24/1"
},
{
"refsource": "MLIST",
"name": "[Qemu-devel][PATCH] 20190111 scsi-generic: avoid possible out-of-bounds access to r->buf",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html"
2019-03-28 20:00:47 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-0664c7724d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/"
2019-04-11 22:00:40 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190411-0006/",
"url": "https://security.netapp.com/advisory/ntap-20190411-0006/"
2019-08-06 17:00:50 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2166",
"url": "https://access.redhat.com/errata/RHSA-2019:2166"
2019-08-09 04:00:54 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2425",
"url": "https://access.redhat.com/errata/RHSA-2019:2425"
2019-03-18 03:00:03 +00:00
}
]
}
}