diff --git a/2019/18xxx/CVE-2019-18906.json b/2019/18xxx/CVE-2019-18906.json index a0210d691d2..195c5e5a6f9 100644 --- a/2019/18xxx/CVE-2019-18906.json +++ b/2019/18xxx/CVE-2019-18906.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-06-23T00:00:00.000Z", "ID": "CVE-2019-18906", "STATE": "PUBLIC", @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "A Use of Password Hash Instead of Password for Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it.\nThis issue affects:\nSUSE Linux Enterprise Server for SAP 12-SP5\ncryptctl versions prior to 2.4.\nSUSE Manager Server 4.0\ncryptctl versions prior to 2.4." + "value": "A Use of Password Hash Instead of Password for Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it. This issue affects: SUSE Linux Enterprise Server for SAP 12-SP5 cryptctl versions prior to 2.4. SUSE Manager Server 4.0 cryptctl versions prior to 2.4." } ] }, diff --git a/2021/25xxx/CVE-2021-25321.json b/2021/25xxx/CVE-2021-25321.json index f0922018c38..5c2e1878ec2 100644 --- a/2021/25xxx/CVE-2021-25321.json +++ b/2021/25xxx/CVE-2021-25321.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2021-06-28T00:00:00.000Z", "ID": "CVE-2021-25321", "STATE": "PUBLIC", @@ -99,7 +99,7 @@ "description_data": [ { "lang": "eng", - "value": "A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch.\nThis issue affects:\nSUSE Linux Enterprise Server 11-SP4-LTSS\narpwatch versions prior to 2.1a15.\nSUSE Manager Server 4.0\narpwatch versions prior to 2.1a15.\nSUSE OpenStack Cloud Crowbar 9\narpwatch versions prior to 2.1a15.\nopenSUSE Factory\narpwatch version 2.1a15-169.5 and prior versions.\nopenSUSE Leap 15.2\narpwatch version 2.1a15-lp152.5.5 and prior versions." + "value": "A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions." } ] },