mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
- Synchronized data.
This commit is contained in:
parent
376aeb50f6
commit
1056be5f2b
@ -81,6 +81,11 @@
|
||||
"name" : "https://lists.frrouting.org/pipermail/frog/2019-January/000404.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://lists.frrouting.org/pipermail/frog/2019-January/000404.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://frrouting.org/community/security/cve-2019-5892.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://frrouting.org/community/security/cve-2019-5892.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
77
2019/6xxx/CVE-2019-6133.json
Normal file
77
2019/6xxx/CVE-2019-6133.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-2019-6133",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "n/a",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "In PolicyKit (aka polkit) 0.115, the \"start time\" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692"
|
||||
},
|
||||
{
|
||||
"name" : "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf"
|
||||
},
|
||||
{
|
||||
"name" : "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81"
|
||||
},
|
||||
{
|
||||
"name" : "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2019/6xxx/CVE-2019-6134.json
Normal file
18
2019/6xxx/CVE-2019-6134.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-2019-6134",
|
||||
"STATE" : "RESERVED"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user