From 085902b6c60a0c271ce1778e93bb6424ba3b406e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Jan 2020 12:01:12 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/3xxx/CVE-2019-3683.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2019/3xxx/CVE-2019-3683.json b/2019/3xxx/CVE-2019-3683.json index d69cf9ce182..0c72836ebbb 100644 --- a/2019/3xxx/CVE-2019-3683.json +++ b/2019/3xxx/CVE-2019-3683.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2019-02-18T00:00:00.000Z", "ID": "CVE-2019-3683", "STATE": "PUBLIC", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full \"member\" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations." + "value": "The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full \"member\" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations." } ] },