diff --git a/2016/4xxx/CVE-2016-4971.json b/2016/4xxx/CVE-2016-4971.json index a66836162fd..5dafb387b44 100644 --- a/2016/4xxx/CVE-2016-4971.json +++ b/2016/4xxx/CVE-2016-4971.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that wget used a file name provided by the server for the downloaded file when following a HTTP redirect to a FTP server resource. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client." + "value": "GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "External Control of File Name or Path", - "cweId": "CWE-73" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:1.14-13.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -99,21 +98,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-3012-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2587", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2587" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-4971", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-4971" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666" - }, { "url": "https://security.gentoo.org/glsa/201610-11", "refsource": "MISC", @@ -128,57 +112,11 @@ "url": "https://www.exploit-db.com/exploits/40064/", "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/40064/" - } - ] - }, - "work_around": [ - { - "lang": "en", - "value": "Use wget with \"-O\" option to explicitly specify the output filename." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank GNU wget project for reporting this issue. Upstream acknowledges Dawid Golunski as the original reporter." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "NETWORK", - "authentication": "NONE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.8, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", - "version": "2.0" }, { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666" } ] } diff --git a/2016/4xxx/CVE-2016-4972.json b/2016/4xxx/CVE-2016-4972.json index ef253e9f562..ab94d998ff4 100644 --- a/2016/4xxx/CVE-2016-4972.json +++ b/2016/4xxx/CVE-2016-4972.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4972", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,22 +27,46 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugs.launchpad.net/python-muranoclient/+bug/1586078", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/python-muranoclient/+bug/1586078" + "url": "http://www.openwall.com/lists/oss-security/2016/06/23/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/06/23/8" }, { - "name": "[oss-security] 20160623 RCE vulnerability in Openstack Murano using insecure YAML tags (CVE-2016-4972)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/06/23/8" + "url": "https://bugs.launchpad.net/murano/+bug/1586079", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/murano/+bug/1586079" }, { - "name": "https://bugs.launchpad.net/murano/+bug/1586079", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/murano/+bug/1586079" + "url": "https://bugs.launchpad.net/python-muranoclient/+bug/1586078", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/python-muranoclient/+bug/1586078" } ] } diff --git a/2016/4xxx/CVE-2016-4978.json b/2016/4xxx/CVE-2016-4978.json index b5ab99c343e..c0786969ee3 100644 --- a/2016/4xxx/CVE-2016-4978.json +++ b/2016/4xxx/CVE-2016-4978.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4978", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,107 +27,131 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf", + "url": "https://access.redhat.com/errata/RHSA-2017:3454", "refsource": "MISC", - "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf" + "name": "https://access.redhat.com/errata/RHSA-2017:3454" }, { - "name": "93142", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93142" + "url": "https://access.redhat.com/errata/RHSA-2017:3455", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:3455" }, { - "name": "RHSA-2018:1448", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2018:1448" + "url": "https://access.redhat.com/errata/RHSA-2017:3456", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:3456" }, { - "name": "RHSA-2017:1836", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:1836" + "url": "https://access.redhat.com/errata/RHSA-2017:3458", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:3458" }, { - "name": "RHSA-2017:1835", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:1835" + "url": "http://mail-archives.apache.org/mod_mbox/activemq-users/201609.mbox/%3CCAH6wpnqzeNtpykT7emtDU1-GV7AvjFP5-YroWcCC4UZyQEFvtA%40mail.gmail.com%3E", + "refsource": "MISC", + "name": "http://mail-archives.apache.org/mod_mbox/activemq-users/201609.mbox/%3CCAH6wpnqzeNtpykT7emtDU1-GV7AvjFP5-YroWcCC4UZyQEFvtA%40mail.gmail.com%3E" }, { - "name": "RHSA-2018:1449", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2018:1449" + "url": "http://www.securityfocus.com/bid/93142", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93142" }, { - "name": "RHSA-2018:1450", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2018:1450" + "url": "https://access.redhat.com/errata/RHSA-2017:1834", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:1834" }, { - "name": "RHSA-2017:3458", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:3458" + "url": "https://access.redhat.com/errata/RHSA-2017:1835", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:1835" }, { - "name": "RHSA-2017:1837", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:1837" + "url": "https://access.redhat.com/errata/RHSA-2017:1836", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:1836" }, { - "name": "RHSA-2017:1834", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:1834" + "url": "https://access.redhat.com/errata/RHSA-2017:1837", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2017:1837" }, { - "name": "[activemq-users] 20160923 [CVE-2016-4978] Apache ActiveMQ Artemis: Deserialization of untrusted input vunerability", - "refsource": "MLIST", - "url": "http://mail-archives.apache.org/mod_mbox/activemq-users/201609.mbox/%3CCAH6wpnqzeNtpykT7emtDU1-GV7AvjFP5-YroWcCC4UZyQEFvtA%40mail.gmail.com%3E" + "url": "https://access.redhat.com/errata/RHSA-2018:1447", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2018:1447" }, { - "name": "RHSA-2018:1451", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2018:1451" + "url": "https://access.redhat.com/errata/RHSA-2018:1448", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2018:1448" }, { - "name": "RHSA-2017:3455", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:3455" + "url": "https://access.redhat.com/errata/RHSA-2018:1449", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2018:1449" }, { - "name": "RHSA-2017:3456", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:3456" + "url": "https://access.redhat.com/errata/RHSA-2018:1450", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2018:1450" }, { - "name": "RHSA-2017:3454", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2017:3454" + "url": "https://access.redhat.com/errata/RHSA-2018:1451", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2018:1451" }, { - "name": "RHSA-2018:1447", - "refsource": "REDHAT", - "url": "https://access.redhat.com/errata/RHSA-2018:1447" + "url": "https://lists.apache.org/thread.html/7260bd0955c12aac5bd892039d3356ba3aa0ff4caaf2aa4fd4fe84a2%40%3Cissues.activemq.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/7260bd0955c12aac5bd892039d3356ba3aa0ff4caaf2aa4fd4fe84a2%40%3Cissues.activemq.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[activemq-issues] 20190529 [jira] [Created] (ARTEMIS-2362) activemq-artemis-native-1.0.0.jar is vulnerable to CVE-2016-4978", - "url": "https://lists.apache.org/thread.html/7260bd0955c12aac5bd892039d3356ba3aa0ff4caaf2aa4fd4fe84a2@%3Cissues.activemq.apache.org%3E" + "url": "https://lists.apache.org/thread.html/d4ffbc6a43a915324a394b2913ceb7d07bc352f2d08caa19df0aff02%40%3Cissues.activemq.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/d4ffbc6a43a915324a394b2913ceb7d07bc352f2d08caa19df0aff02%40%3Cissues.activemq.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[activemq-issues] 20190529 [jira] [Closed] (ARTEMIS-2362) activemq-artemis-native-1.0.0.jar is vulnerable to CVE-2016-4978", - "url": "https://lists.apache.org/thread.html/d4ffbc6a43a915324a394b2913ceb7d07bc352f2d08caa19df0aff02@%3Cissues.activemq.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[activemq-commits] 20210127 [activemq-website] branch master updated: Publish CVE-2021-26118", - "url": "https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[activemq-commits] 20210127 [activemq-website] branch master updated: Publish CVE-2021-26117", - "url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E" + "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf", + "refsource": "MISC", + "name": "https://www.blackhat.com/docs/us-16/materials/us-16-Kaiser-Pwning-Your-Java-Messaging-With-Deserialization-Vulnerabilities.pdf" } ] } diff --git a/2016/4xxx/CVE-2016-4997.json b/2016/4xxx/CVE-2016-4997.json index 97d58de1157..2c5a07677d3 100644 --- a/2016/4xxx/CVE-2016-4997.json +++ b/2016/4xxx/CVE-2016-4997.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges." + "value": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", - "cweId": "CWE-20" + "value": "n/a" } ] } @@ -32,31 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.10.0-327.36.1.rt56.237.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-327.36.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "1:3.10.0-327.rt56.197.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -254,31 +238,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-3020-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:1847", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:1847" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:1875", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:1875" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:1883", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:1883" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-4997", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-4997" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" - }, { "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt", "refsource": "MISC", @@ -303,45 +262,11 @@ "url": "https://www.exploit-db.com/exploits/40489/", "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/40489/" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.2, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "version": "2.0" }, { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" } ] } diff --git a/2016/5xxx/CVE-2016-5107.json b/2016/5xxx/CVE-2016-5107.json index c54e53cd7e5..28563fcceee 100644 --- a/2016/5xxx/CVE-2016-5107.json +++ b/2016/5xxx/CVE-2016-5107.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5107", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-3047-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-1" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "[oss-security] 20160525 CVE Request Qemu: scsi: megasas: out-of-bounds read in megasas_lookup_frame() function", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/25/7" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "[oss-security] 20160526 Re: CVE Request Qemu: scsi: megasas: out-of-bounds read in megasas_lookup_frame() function", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/05/26/9" + "url": "http://www.ubuntu.com/usn/USN-3047-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-1" }, { - "name": "[qemu-devel] 20160525 [Qemu-devel] [PATCH v2] scsi: megasas: check 'read_queue_head' index val", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04424.html" + "url": "http://www.ubuntu.com/usn/USN-3047-2", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-2" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.openwall.com/lists/oss-security/2016/05/25/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/25/7" }, { - "name": "USN-3047-2", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-2" + "url": "http://www.openwall.com/lists/oss-security/2016/05/26/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/05/26/9" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1336461", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336461" + "url": "http://www.securityfocus.com/bid/90874", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/90874" }, { - "name": "90874", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/90874" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04424.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04424.html" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336461", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1336461" } ] } diff --git a/2016/5xxx/CVE-2016-5337.json b/2016/5xxx/CVE-2016-5337.json index 20d5933c570..ba6199add27 100644 --- a/2016/5xxx/CVE-2016-5337.json +++ b/2016/5xxx/CVE-2016-5337.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5337", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-3047-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-1" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "91097", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/91097" + "url": "http://www.ubuntu.com/usn/USN-3047-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-1" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.ubuntu.com/usn/USN-3047-2", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-3047-2" }, { - "name": "USN-3047-2", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-3047-2" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6" }, { - "name": "[oss-security] 20160608 Re: CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/06/08/13" + "url": "http://www.openwall.com/lists/oss-security/2016/06/08/13", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/06/08/13" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "http://www.openwall.com/lists/oss-security/2016/06/08/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/06/08/3" }, { - "name": "[qemu-devel] 20160607 [PULL 06/13] scsi: megasas: null terminate bios version buffer", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html" + "url": "http://www.securityfocus.com/bid/91097", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/91097" }, { - "name": "[oss-security] 20160608 CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/06/08/3" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html" } ] } diff --git a/2016/5xxx/CVE-2016-5417.json b/2016/5xxx/CVE-2016-5417.json index a939c49e196..6530e2040b5 100644 --- a/2016/5xxx/CVE-2016-5417.json +++ b/2016/5xxx/CVE-2016-5417.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5417", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=19257", - "refsource": "CONFIRM", - "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19257" + "url": "http://www.openwall.com/lists/oss-security/2016/08/02/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/08/02/5" }, { - "name": "92257", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92257" + "url": "http://www.securityfocus.com/bid/92257", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92257" }, { - "name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2212c1420c92a33b0e0bd9a34938c9814a56c0f7", - "refsource": "CONFIRM", - "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2212c1420c92a33b0e0bd9a34938c9814a56c0f7" + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19257", + "refsource": "MISC", + "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=19257" }, { - "name": "[oss-security] 20160802 glibc: Per-thread memory leak in __res_vinit with IPv6 nameservers (CVE-2016-5417)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/08/02/5" + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2212c1420c92a33b0e0bd9a34938c9814a56c0f7", + "refsource": "MISC", + "name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2212c1420c92a33b0e0bd9a34938c9814a56c0f7" }, { - "name": "[libc-alpha] 20160804 The GNU C Library version 2.24 is now available", - "refsource": "MLIST", - "url": "https://www.sourceware.org/ml/libc-alpha/2016-08/msg00212.html" + "url": "https://www.sourceware.org/ml/libc-alpha/2016-08/msg00212.html", + "refsource": "MISC", + "name": "https://www.sourceware.org/ml/libc-alpha/2016-08/msg00212.html" } ] } diff --git a/2016/6xxx/CVE-2016-6170.json b/2016/6xxx/CVE-2016-6170.json index 0ca3d1abeab..2fb1bfd2f28 100644 --- a/2016/6xxx/CVE-2016-6170.json +++ b/2016/6xxx/CVE-2016-6170.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6170", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[dns-operations] 20160706 DNS activities in Japan", - "refsource": "MLIST", - "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html" - }, - { - "name": "[dns-operations] 20160706 DNS activities in Japan", - "refsource": "MLIST", - "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html" - }, - { - "name": "[oss-security] 20160706 Malicious primary DNS servers can crash secondaries", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3" - }, - { - "name": "1036241", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1036241" - }, - { - "name": "[dns-operations] 20160704 DNS activities in Japan", - "refsource": "MLIST", - "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" - }, - { - "name": "GLSA-201610-07", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201610-07" - }, - { - "name": "https://kb.isc.org/article/AA-01390", - "refsource": "CONFIRM", - "url": "https://kb.isc.org/article/AA-01390" - }, - { - "name": "91611", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/91611" - }, - { - "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3", "refsource": "MISC", - "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + "name": "http://www.openwall.com/lists/oss-security/2016/07/06/3" }, { - "name": "https://kb.isc.org/article/AA-01390/169/CVE-2016-6170", - "refsource": "CONFIRM", - "url": "https://kb.isc.org/article/AA-01390/169/CVE-2016-6170" + "url": "http://www.securityfocus.com/bid/91611", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/91611" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1353563", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353563" + "url": "http://www.securitytracker.com/id/1036241", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1036241" + }, + { + "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "refsource": "MISC", + "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + }, + { + "url": "https://kb.isc.org/article/AA-01390", + "refsource": "MISC", + "name": "https://kb.isc.org/article/AA-01390" + }, + { + "url": "https://kb.isc.org/article/AA-01390/169/CVE-2016-6170", + "refsource": "MISC", + "name": "https://kb.isc.org/article/AA-01390/169/CVE-2016-6170" + }, + { + "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html", + "refsource": "MISC", + "name": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" + }, + { + "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html", + "refsource": "MISC", + "name": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html" + }, + { + "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html", + "refsource": "MISC", + "name": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html" + }, + { + "url": "https://security.gentoo.org/glsa/201610-07", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201610-07" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353563", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1353563" } ] } diff --git a/2016/6xxx/CVE-2016-6171.json b/2016/6xxx/CVE-2016-6171.json index c992a266cc5..fe72fb037ef 100644 --- a/2016/6xxx/CVE-2016-6171.json +++ b/2016/6xxx/CVE-2016-6171.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6171", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20160706 Malicious primary DNS servers can crash secondaries", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3" - }, - { - "name": "91678", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/91678" - }, - { - "name": "[dns-operations] 20160704 DNS activities in Japan", - "refsource": "MLIST", - "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" - }, - { - "name": "[oss-security] 20160706 Re: Malicious primary DNS servers can crash secondaries", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/06/4" - }, - { - "name": "https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS", - "refsource": "CONFIRM", - "url": "https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS" - }, - { - "name": "https://gitlab.labs.nic.cz/labs/knot/issues/464", - "refsource": "CONFIRM", - "url": "https://gitlab.labs.nic.cz/labs/knot/issues/464" - }, - { - "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3", "refsource": "MISC", - "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + "name": "http://www.openwall.com/lists/oss-security/2016/07/06/3" + }, + { + "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "refsource": "MISC", + "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + }, + { + "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html", + "refsource": "MISC", + "name": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2016/07/06/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/07/06/4" + }, + { + "url": "http://www.securityfocus.com/bid/91678", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/91678" + }, + { + "url": "https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS", + "refsource": "MISC", + "name": "https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS" + }, + { + "url": "https://gitlab.labs.nic.cz/labs/knot/issues/464", + "refsource": "MISC", + "name": "https://gitlab.labs.nic.cz/labs/knot/issues/464" } ] } diff --git a/2016/6xxx/CVE-2016-6172.json b/2016/6xxx/CVE-2016-6172.json index 3a7f7b84878..3359d726bb9 100644 --- a/2016/6xxx/CVE-2016-6172.json +++ b/2016/6xxx/CVE-2016-6172.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6172", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,62 +27,86 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-401", - "refsource": "CONFIRM", - "url": "https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-401" - }, - { - "name": "DSA-3664", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2016/dsa-3664" - }, - { - "name": "1036242", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1036242" - }, - { - "name": "[oss-security] 20160706 Malicious primary DNS servers can crash secondaries", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3" - }, - { - "name": "https://github.com/PowerDNS/pdns/issues/4128", - "refsource": "CONFIRM", - "url": "https://github.com/PowerDNS/pdns/issues/4128" - }, - { - "name": "https://github.com/PowerDNS/pdns/issues/4133", - "refsource": "CONFIRM", - "url": "https://github.com/PowerDNS/pdns/issues/4133" - }, - { - "name": "91678", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/91678" - }, - { - "name": "[dns-operations] 20160704 DNS activities in Japan", - "refsource": "MLIST", - "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" - }, - { - "name": "https://github.com/PowerDNS/pdns/pull/4134", - "refsource": "CONFIRM", - "url": "https://github.com/PowerDNS/pdns/pull/4134" - }, - { - "name": "openSUSE-SU-2016:2116", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00085.html" - }, - { - "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "url": "http://www.openwall.com/lists/oss-security/2016/07/06/3", "refsource": "MISC", - "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + "name": "http://www.openwall.com/lists/oss-security/2016/07/06/3" + }, + { + "url": "https://github.com/sischkg/xfer-limit/blob/master/README.md", + "refsource": "MISC", + "name": "https://github.com/sischkg/xfer-limit/blob/master/README.md" + }, + { + "url": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html", + "refsource": "MISC", + "name": "https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html" + }, + { + "url": "http://www.securityfocus.com/bid/91678", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/91678" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00085.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00085.html" + }, + { + "url": "http://www.debian.org/security/2016/dsa-3664", + "refsource": "MISC", + "name": "http://www.debian.org/security/2016/dsa-3664" + }, + { + "url": "http://www.securitytracker.com/id/1036242", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1036242" + }, + { + "url": "https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-401", + "refsource": "MISC", + "name": "https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-401" + }, + { + "url": "https://github.com/PowerDNS/pdns/issues/4128", + "refsource": "MISC", + "name": "https://github.com/PowerDNS/pdns/issues/4128" + }, + { + "url": "https://github.com/PowerDNS/pdns/issues/4133", + "refsource": "MISC", + "name": "https://github.com/PowerDNS/pdns/issues/4133" + }, + { + "url": "https://github.com/PowerDNS/pdns/pull/4134", + "refsource": "MISC", + "name": "https://github.com/PowerDNS/pdns/pull/4134" } ] } diff --git a/2016/6xxx/CVE-2016-6327.json b/2016/6xxx/CVE-2016-6327.json index e9cad893c95..fb117e21ff4 100644 --- a/2016/6xxx/CVE-2016-6327.json +++ b/2016/6xxx/CVE-2016-6327.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes to a device using this initiator." + "value": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", - "cweId": "CWE-476" + "value": "n/a" } ] } @@ -32,20 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:3.10.0-514.rt56.420.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-514.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -73,16 +68,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2016-2584.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2574", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2574" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2584", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2584" - }, { "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51093254bf879bc9ce96590400a87897c7498463", "refsource": "MISC", @@ -99,58 +84,14 @@ "name": "http://www.securityfocus.com/bid/92549" }, { - "url": "https://access.redhat.com/security/cve/CVE-2016-6327", + "url": "https://github.com/torvalds/linux/commit/51093254bf879bc9ce96590400a87897c7498463", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-6327" + "name": "https://github.com/torvalds/linux/commit/51093254bf879bc9ce96590400a87897c7498463" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354525", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1354525" - }, - { - "url": "https://github.com/torvalds/linux/commit/51093254bf879bc9ce96590400a87897c7498463", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/51093254bf879bc9ce96590400a87897c7498463" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.7, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", - "version": "2.0" - }, - { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" } ] } diff --git a/2016/7xxx/CVE-2016-7030.json b/2016/7xxx/CVE-2016-7030.json index 52e0b31ca30..32ec9d9bd4e 100644 --- a/2016/7xxx/CVE-2016-7030.json +++ b/2016/7xxx/CVE-2016-7030.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7030", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370493", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370493" + "url": "http://rhn.redhat.com/errata/RHSA-2017-0001.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2017-0001.html" }, { - "name": "94934", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/94934" + "url": "http://www.openwall.com/lists/oss-security/2017/01/02/5", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2017/01/02/5" }, { - "name": "https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61", - "refsource": "CONFIRM", - "url": "https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61" + "url": "http://www.securityfocus.com/bid/94934", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/94934" }, { - "name": "RHSA-2017:0001", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2017-0001.html" + "url": "https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61", + "refsource": "MISC", + "name": "https://pagure.io/freeipa?id=6f1d927467e7907fd1991f88388d96c67c9bff61" }, { - "name": "[oss-security] 20170102 freeIPA CVEs CVE-2016-9575 (insufficient permission check) & CVE-2016-7030 (DoS)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2017/01/02/5" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370493", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370493" } ] } diff --git a/2016/7xxx/CVE-2016-7031.json b/2016/7xxx/CVE-2016-7031.json index 4011ce0a408..6510b630b71 100644 --- a/2016/7xxx/CVE-2016-7031.json +++ b/2016/7xxx/CVE-2016-7031.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7031", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "93240", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93240" + "url": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1", + "refsource": "MISC", + "name": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1" }, { - "name": "https://github.com/ceph/ceph/pull/6057", - "refsource": "CONFIRM", - "url": "https://github.com/ceph/ceph/pull/6057" + "url": "http://rhn.redhat.com/errata/RHSA-2016-1972.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-1972.html" }, { - "name": "RHSA-2016:1972", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-1972.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-1973.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-1973.html" }, { - "name": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1", - "refsource": "CONFIRM", - "url": "http://docs.ceph.com/docs/master/release-notes/#v10-0-1" + "url": "http://tracker.ceph.com/issues/13207", + "refsource": "MISC", + "name": "http://tracker.ceph.com/issues/13207" }, { - "name": "RHSA-2016:1973", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-1973.html" + "url": "http://www.securityfocus.com/bid/93240", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93240" }, { - "name": "http://tracker.ceph.com/issues/13207", - "refsource": "CONFIRM", - "url": "http://tracker.ceph.com/issues/13207" + "url": "https://github.com/ceph/ceph/pull/6057", + "refsource": "MISC", + "name": "https://github.com/ceph/ceph/pull/6057" } ] } diff --git a/2016/7xxx/CVE-2016-7041.json b/2016/7xxx/CVE-2016-7041.json index 95946b6c5e0..ca9b8bfe4dd 100644 --- a/2016/7xxx/CVE-2016-7041.json +++ b/2016/7xxx/CVE-2016-7041.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7041", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Drools Workbench", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "Red Hat" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -38,70 +15,97 @@ } ] }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" - } - ], - [ - { - "vectorString": "6.8/AV:N/AC:L/Au:S/C:C/I:N/A:N", - "version": "2.0" - } - ] - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-22" + "value": "CWE-22", + "cweId": "CWE-22" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Red Hat", + "product": { + "product_data": [ + { + "product_name": "Drools Workbench", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2016:2937", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2937.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2822.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2822.html" }, { - "name": "RHSA-2016:2938", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2938.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2823.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2823.html" }, { - "name": "94566", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/94566" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2937.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2937.html" }, { - "name": "RHSA-2016:2822", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2822.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2938.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2938.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041" + "url": "http://www.securityfocus.com/bid/94566", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/94566" }, { - "name": "1037406", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id/1037406" + "url": "http://www.securitytracker.com/id/1037406", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id/1037406" }, { - "name": "RHSA-2016:2823", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2823.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" } ] } diff --git a/2016/7xxx/CVE-2016-7056.json b/2016/7xxx/CVE-2016-7056.json index f3ded005a5e..a57a0e1adb8 100644 --- a/2016/7xxx/CVE-2016-7056.json +++ b/2016/7xxx/CVE-2016-7056.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys." + "value": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Covert Timing Channel", + "value": "CWE-385", "cweId": "CWE-385" } ] @@ -32,100 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The OpenSSL Project", "product": { "product_data": [ { - "product_name": "JBoss Core Services on RHEL 6", + "product_name": "openssl", "version": { "version_data": [ { - "version_value": "0:2.4.23-120.jbcs.el6", - "version_affected": "!" - }, - { - "version_value": "0:2.9.1-19.GA.jbcs.el6", - "version_affected": "!" - }, - { - "version_value": "1:1.0.2h-13.jbcs.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "JBoss Core Services on RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2.4.23-120.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.9.1-19.GA.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.0.2h-13.jbcs.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "1:1.0.2k-8.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Web Server 3 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:1.2.16-12.redhat_3.1.ep6.el6", - "version_affected": "!" - }, - { - "version_value": "0:7.0.70-22.ep7.el6", - "version_affected": "!" - }, - { - "version_value": "0:8.0.36-24.ep7.el6", - "version_affected": "!" - }, - { - "version_value": "0:1.2.8-10.redhat_10.ep7.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat JBoss Web Server 3 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:1.2.16-12.redhat_3.1.ep6.el7", - "version_affected": "!" - }, - { - "version_value": "0:7.0.70-22.ep7.el7", - "version_affected": "!" - }, - { - "version_value": "0:8.0.36-24.ep7.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.2.8-10.redhat_10.ep7.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "openssl 1.0.1u" } ] } @@ -153,11 +69,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1414" }, - { - "url": "https://access.redhat.com/errata/RHSA-2017:1415", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2017:1415" - }, { "url": "https://access.redhat.com/errata/RHSA-2017:1801", "refsource": "MISC", @@ -183,21 +94,6 @@ "refsource": "MISC", "name": "http://www.securitytracker.com/id/1037575" }, - { - "url": "https://access.redhat.com/errata/RHBA-2017:1929", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHBA-2017:1929" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-7056", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-7056" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056", "refsource": "MISC", diff --git a/2016/7xxx/CVE-2016-7097.json b/2016/7xxx/CVE-2016-7097.json index d06c632e34d..3c7fab5a16a 100644 --- a/2016/7xxx/CVE-2016-7097.json +++ b/2016/7xxx/CVE-2016-7097.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that when file permissions were modified via chmod and the user modifying them was not in the owning group or capable of CAP_FSETID, the setgid bit would be cleared. Setting a POSIX ACL via setxattr sets the file permissions as well as the new ACL, but doesn't clear the setgid bit in a similar way. This could allow a local user to gain group privileges via certain setgid applications." + "value": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Authentication", - "cweId": "CWE-287" + "value": "n/a" } ] } @@ -32,42 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.32-696.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-693.rt56.617.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-693.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "1:3.10.0-693.2.1.rt56.585.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -150,21 +123,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-3147-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2017:0817", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2017:0817" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-7097", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-7097" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938" - }, { "url": "https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef", "refsource": "MISC", @@ -174,51 +132,11 @@ "url": "https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS", "refsource": "MISC", "name": "https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Andreas Gruenbacher (Red Hat) and Jan Kara (SUSE)." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "NONE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 3.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "PARTIAL", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", - "version": "2.0" }, { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 4.4, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938" } ] } diff --git a/2016/7xxx/CVE-2016-7098.json b/2016/7xxx/CVE-2016-7098.json index 2bbd8b4da17..2d3c703673c 100644 --- a/2016/7xxx/CVE-2016-7098.json +++ b/2016/7xxx/CVE-2016-7098.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7098", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20160827 Re: CVE Request - Gnu Wget 1.17 - Design Error Vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/08/27/2" + "url": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html", + "refsource": "MISC", + "name": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html" }, { - "name": "openSUSE-SU-2017:0015", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html" + "url": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html", + "refsource": "MISC", + "name": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html" }, { - "name": "openSUSE-SU-2016:2284", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html" + "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html" }, { - "name": "93157", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93157" + "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html" }, { - "name": "40824", - "refsource": "EXPLOIT-DB", - "url": "https://www.exploit-db.com/exploits/40824/" + "url": "http://www.openwall.com/lists/oss-security/2016/08/27/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/08/27/2" }, { - "name": "[bug-wget] 20160814 Wget - acess list bypass / race condition PoC", - "refsource": "MLIST", - "url": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00083.html" + "url": "http://www.securityfocus.com/bid/93157", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93157" }, { - "name": "[bug-wget] 20160824 Re: Wget - acess list bypass / race condition PoC", - "refsource": "MLIST", - "url": "http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00134.html" + "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00031.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2020/01/msg00031.html" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2086-1] wget security update", - "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00031.html" + "url": "https://www.exploit-db.com/exploits/40824/", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/40824/" } ] } diff --git a/2016/7xxx/CVE-2016-7116.json b/2016/7xxx/CVE-2016-7116.json index afa7a30c263..e9f9a695020 100644 --- a/2016/7xxx/CVE-2016-7116.json +++ b/2016/7xxx/CVE-2016-7116.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7116", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[qemu-devel] 20160826 [PATCH v2 0/5] 9P security fixes", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "[oss-security] 20160830 Re: CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/08/30/3" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "92680", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92680" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "http://www.openwall.com/lists/oss-security/2016/08/30/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/08/30/1" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=56f101ecce0eafd09e2daf1c4eeb1377d6959261", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=56f101ecce0eafd09e2daf1c4eeb1377d6959261" + "url": "http://www.openwall.com/lists/oss-security/2016/08/30/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/08/30/3" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "http://www.securityfocus.com/bid/92680", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92680" }, { - "name": "[oss-security] 20160830 CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/08/30/1" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html" }, { - "name": "[qemu-devel] 20160830 [PATCH v4 0/3] 9pfs security fixes", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html" } ] } diff --git a/2016/7xxx/CVE-2016-7170.json b/2016/7xxx/CVE-2016-7170.json index e2b60fe8468..8ee323bb3c5 100644 --- a/2016/7xxx/CVE-2016-7170.json +++ b/2016/7xxx/CVE-2016-7170.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7170", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "92904", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92904" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db" + "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" }, { - "name": "openSUSE-SU-2016:3237", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=167d97a3def77ee2dbf6e908b0ecbfe2103977db", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=167d97a3def77ee2dbf6e908b0ecbfe2103977db" }, { - "name": "[qemu-devel] 20160908 [PATCH] vmsvga: correct bitmap and pixmap size checks", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html" + "url": "http://www.openwall.com/lists/oss-security/2016/09/09/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/09/4" }, { - "name": "[oss-security] 20160909 Re: CVE Request Qemu: vmware_vga: OOB stack memory access when processing svga command", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/09/7" + "url": "http://www.openwall.com/lists/oss-security/2016/09/09/7", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/09/7" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "http://www.securityfocus.com/bid/92904", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92904" }, { - "name": "[oss-security] 20160909 CVE Request Qemu: vmware_vga: OOB stack memory access when processing svga command", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/09/4" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html" } ] } diff --git a/2016/7xxx/CVE-2016-7421.json b/2016/7xxx/CVE-2016-7421.json index 076d1f5dbf1..da2c37b7638 100644 --- a/2016/7xxx/CVE-2016-7421.json +++ b/2016/7xxx/CVE-2016-7421.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7421", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[qemu-devel] 20160915 [PULL 07/17] scsi: pvscsi: limit process IO loop to ring size", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html" + "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" }, { - "name": "GLSA-201609-01", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201609-01" + "url": "https://security.gentoo.org/glsa/201609-01", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201609-01" }, { - "name": "92998", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/92998" + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d251157ac1928191af851d199a9ff255d330bec9", + "refsource": "MISC", + "name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d251157ac1928191af851d199a9ff255d330bec9" }, { - "name": "[oss-security] 20160916 Re: CVE Request: Qemu: scsi: pvscsi: infinite loop when processing IO requests", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/16/9" + "url": "http://www.openwall.com/lists/oss-security/2016/09/16/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/16/3" }, { - "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=d251157ac1928191af851d199a9ff255d330bec9", - "refsource": "CONFIRM", - "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=d251157ac1928191af851d199a9ff255d330bec9" + "url": "http://www.openwall.com/lists/oss-security/2016/09/16/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/16/9" }, { - "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" + "url": "http://www.securityfocus.com/bid/92998", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/92998" }, { - "name": "[oss-security] 20160916 CVE Request: Qemu: scsi: pvscsi: infinite loop when processing IO requests", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/16/3" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html" } ] } diff --git a/2016/7xxx/CVE-2016-7422.json b/2016/7xxx/CVE-2016-7422.json index 10ebb653989..111a65e4876 100644 --- a/2016/7xxx/CVE-2016-7422.json +++ b/2016/7xxx/CVE-2016-7422.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2016-7422 Qemu: virtio: null pointer dereference in virtqueu_map_desc" + "value": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", - "cweId": "CWE-476" + "value": "n/a" } ] } @@ -32,82 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 8.0 (Liberty)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-14.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -160,66 +93,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/92996" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-7422", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-7422" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376755", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1376755" - }, { "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html", "refsource": "MISC", "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html" } ] - }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Qinghao Tang (360.cn Marvel Team) and Zhenhao Hong (360.cn Marvel Team) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", - "version": "2.0" - }, - { - "attackComplexity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "LOW", - "baseScore": 2.6, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", - "version": "3.0" - } - ] } } \ No newline at end of file diff --git a/2016/7xxx/CVE-2016-7466.json b/2016/7xxx/CVE-2016-7466.json index 39486412d81..628279d87cb 100644 --- a/2016/7xxx/CVE-2016-7466.json +++ b/2016/7xxx/CVE-2016-7466.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A memory-leak flaw was found in the Quick Emulator(QEMU) built with USB xHCI controller emulation support. The flaw could occur while doing a USB-device unplug operation. Unplugging the device repeatedly resulted in leaking host memory, which affected other services on the host. A privileged user inside the guest could exploit this flaw to cause a denial of service on the host or potentially crash the host's QEMU process instance." + "value": "Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "cweId": "CWE-119" + "value": "n/a" } ] } @@ -32,82 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 11.0 (Ocata)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 8.0 (Liberty)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-10.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "10:2.9.0-14.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -160,66 +93,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/93029" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2016-7466", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2016-7466" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837" - }, { "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html", "refsource": "MISC", "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg02773.html" } ] - }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Li Qiang (360.cn Inc.) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "PARTIAL", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 2.3, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", - "version": "2.0" - }, - { - "attackComplexity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "LOW", - "baseScore": 3, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", - "version": "3.0" - } - ] } } \ No newline at end of file diff --git a/2016/7xxx/CVE-2016-7498.json b/2016/7xxx/CVE-2016-7498.json index 32a70602484..8bbc12bbc96 100644 --- a/2016/7xxx/CVE-2016-7498.json +++ b/2016/7xxx/CVE-2016-7498.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7498", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "OpenStack Compute (nova) 13.0.0 does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state. NOTE: this vulnerability exists because of a CVE-2015-3280 regression." + "value": "OpenStack Compute (nova) 13.0.0 does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state. NOTE: this vulnerability exists because of a CVE-2015-3280 regression." } ] }, @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "93068", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93068" + "url": "http://www.openwall.com/lists/oss-security/2016/09/21/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/21/8" }, { - "name": "[oss-security] 20160923 [OSSA 2016-011] Nova may fail to delete images in resize state regression (CVE-2016-7498)", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/23/1" + "url": "http://www.openwall.com/lists/oss-security/2016/09/23/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/09/23/1" }, { - "name": "https://security.openstack.org/ossa/OSSA-2016-011.html", - "refsource": "CONFIRM", - "url": "https://security.openstack.org/ossa/OSSA-2016-011.html" + "url": "http://www.securityfocus.com/bid/93068", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93068" }, { - "name": "[oss-security] 20160921 Re: CVE request for vulnerability in OpenStack Nova", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/09/21/8" + "url": "https://security.openstack.org/ossa/OSSA-2016-011.html", + "refsource": "MISC", + "name": "https://security.openstack.org/ossa/OSSA-2016-011.html" } ] } diff --git a/2016/7xxx/CVE-2016-7797.json b/2016/7xxx/CVE-2016-7797.json index 17dcce65074..4ccbfd70857 100644 --- a/2016/7xxx/CVE-2016-7797.json +++ b/2016/7xxx/CVE-2016-7797.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7797", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2016:2578", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" + "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269", + "refsource": "MISC", + "name": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { - "name": "openSUSE-SU-2016:3101", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { - "name": "[oss-security] 20160930 Re: CVE request: pacemaker DoS when pacemaker remote is in use", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { - "name": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269", - "refsource": "CONFIRM", - "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" + "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { - "name": "openSUSE-SU-2016:2965", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" + "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { - "name": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410", - "refsource": "CONFIRM", - "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" + "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { - "name": "93261", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93261" + "url": "http://www.securityfocus.com/bid/93261", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93261" }, { - "name": "SUSE-SU-2016:2869", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" + "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410", + "refsource": "MISC", + "name": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" } ] } diff --git a/2016/7xxx/CVE-2016-7907.json b/2016/7xxx/CVE-2016-7907.json index ffe3c27fd24..3346a5076c3 100644 --- a/2016/7xxx/CVE-2016-7907.json +++ b/2016/7xxx/CVE-2016-7907.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7907", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20161003 CVE request Qemu: net: inifinte loop in imx_fec_do_tx() function", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/03/1" + "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" }, { - "name": "GLSA-201611-11", - "refsource": "GENTOO", - "url": "https://security.gentoo.org/glsa/201611-11" + "url": "http://www.openwall.com/lists/oss-security/2016/10/03/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/03/1" }, { - "name": "openSUSE-SU-2016:3237", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" + "url": "http://www.openwall.com/lists/oss-security/2016/10/03/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2016/10/03/4" }, { - "name": "[qemu-devel] 20160922 [PATCH v2] net: imx: limit buffer descriptor count", - "refsource": "MLIST", - "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05556.html" + "url": "http://www.securityfocus.com/bid/93274", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/93274" }, { - "name": "93274", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/93274" + "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05556.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg05556.html" }, { - "name": "[oss-security] 20161003 Re: CVE request Qemu: net: inifinte loop in imx_fec_do_tx() function", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2016/10/03/4" + "url": "https://security.gentoo.org/glsa/201611-11", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/201611-11" } ] } diff --git a/2018/14xxx/CVE-2018-14643.json b/2018/14xxx/CVE-2018-14643.json index 966e1d7892b..25fa9fbd0b4 100644 --- a/2018/14xxx/CVE-2018-14643.json +++ b/2018/14xxx/CVE-2018-14643.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "Improper Authentication", - "cweId": "CWE-287" + "value": "CWE-592", + "cweId": "CWE-592" } ] } @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 6.3 for RHEL 7", + "product_name": "smart_proxy_dynflow", "version": { "version_data": [ { - "version_value": "0:0.1.10.2-1.el7sat", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -64,16 +64,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:2733" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-14643", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-14643" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629063", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1629063" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14643", "refsource": "MISC", @@ -86,18 +76,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file." - } - ], - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Ivan Necas (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2018/14xxx/CVE-2018-14651.json b/2018/14xxx/CVE-2018-14651.json index 715b67b40a2..d9ad48a5ac7 100644 --- a/2018/14xxx/CVE-2018-14651.json +++ b/2018/14xxx/CVE-2018-14651.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Link Resolution Before File Access ('Link Following')", + "value": "CWE-59", "cweId": "CWE-59" } ] @@ -32,68 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Native Client for RHEL 6 for Red Hat Storage", + "product_name": "glusterfs", "version": { "version_data": [ { - "version_value": "0:3.12.2-25.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Native Client for RHEL 7 for Red Hat Storage", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el6rhs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7rhgs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el7rhgs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -121,16 +69,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3432" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-14651", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-14651" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632557", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1632557" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651", "refsource": "MISC", @@ -143,12 +81,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2018/14xxx/CVE-2018-14652.json b/2018/14xxx/CVE-2018-14652.json index d512475b1e7..f87898f238b 100644 --- a/2018/14xxx/CVE-2018-14652.json +++ b/2018/14xxx/CVE-2018-14652.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow was found in strncpy of the pl_getxattr() function. An authenticated attacker could remotely overflow the buffer by sending a buffer of larger length than the size of the key resulting in remote denial of service." + "value": "The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "value": "CWE-120", "cweId": "CWE-120" } ] @@ -32,80 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Gluster Project", "product": { "product_data": [ { - "product_name": "Native Client for RHEL 6 for Red Hat Storage", + "product_name": "glusterfs", "version": { "version_data": [ { - "version_value": "0:3.12.2-25.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Native Client for RHEL 7 for Red Hat Storage", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el6rhs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7rhgs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el7rhgs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.29-1.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.2-7.3.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2-20181026.0.el7_6", - "version_affected": "!" + "version_affected": "=", + "version_value": "through 3.12 and 4.1.4" } ] } @@ -148,16 +84,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3470" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-14652", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-14652" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632974", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1632974" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652", "refsource": "MISC", @@ -165,12 +91,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2018/14xxx/CVE-2018-14653.json b/2018/14xxx/CVE-2018-14653.json index 7f6783c47b8..d4dfb9a0bac 100644 --- a/2018/14xxx/CVE-2018-14653.json +++ b/2018/14xxx/CVE-2018-14653.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow on the heap was found in gf_getspec_req RPC request. A remote, authenticated attacker could use this flaw to cause denial of service and read arbitrary files on glusterfs server node." + "value": "The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", + "value": "CWE-122", "cweId": "CWE-122" } ] @@ -32,80 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Gluster Project", "product": { "product_data": [ { - "product_name": "Native Client for RHEL 6 for Red Hat Storage", + "product_name": "glusterfs", "version": { "version_data": [ { - "version_value": "0:3.12.2-25.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Native Client for RHEL 7 for Red Hat Storage", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el6rhs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7rhgs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el7rhgs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.29-1.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.2-7.3.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2-20181026.0.el7_6", - "version_affected": "!" + "version_affected": "=", + "version_value": "through 3.12 and 4.1.4" } ] } @@ -148,16 +84,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3470" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-14653", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-14653" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1633431", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1633431" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653", "refsource": "MISC", @@ -165,12 +91,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2018/14xxx/CVE-2018-14661.json b/2018/14xxx/CVE-2018-14661.json index b205a6adf4f..db55431431e 100644 --- a/2018/14xxx/CVE-2018-14661.json +++ b/2018/14xxx/CVE-2018-14661.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that usage of snprintf function in feature/locks translator of glusterfs server was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service." + "value": "It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Input Validation", + "value": "CWE-20", "cweId": "CWE-20" } ] @@ -32,80 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Gluster Project", "product": { "product_data": [ { - "product_name": "Native Client for RHEL 6 for Red Hat Storage", + "product_name": "glusterfs-server", "version": { "version_data": [ { - "version_value": "0:3.12.2-25.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Native Client for RHEL 7 for Red Hat Storage", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 6", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el6rhs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el6rhs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Gluster Storage 3.4 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7rhgs", - "version_affected": "!" - }, - { - "version_value": "0:3.4.1.0-1.el7rhgs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.12.2-25.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.29-1.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.2-7.3.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2-20181026.0.el7_6", - "version_affected": "!" + "version_affected": "=", + "version_value": "3.8.4" } ] } @@ -148,16 +84,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3470" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-14661", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-14661" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636880", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1636880" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661", "refsource": "MISC", @@ -165,12 +91,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2018/16xxx/CVE-2018-16862.json b/2018/16xxx/CVE-2018-16862.json index 330d00b7137..0e6b9ca1db4 100644 --- a/2018/16xxx/CVE-2018-16862.json +++ b/2018/16xxx/CVE-2018-16862.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16862", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "kernel:", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "[UNKNOWN]" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -38,84 +15,117 @@ } ] }, - "impact": { - "cvss": [ - [ - { - "vectorString": "5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", - "version": "3.0" - } - ] - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-200" + "value": "CWE-200", + "cweId": "CWE-200" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "[UNKNOWN]", + "product": { + "product_data": [ + { + "product_name": "kernel:", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "106009", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/106009" + "url": "https://usn.ubuntu.com/3879-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3879-1/" }, { - "name": "USN-3879-2", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3879-2/" + "url": "https://usn.ubuntu.com/3879-2/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3879-2/" }, { - "name": "[oss-security] 20181123 CVE-2018-16862: Linux kernel: cleancache: deleted files infoleak", - "refsource": "MLIST", - "url": "https://seclists.org/oss-sec/2018/q4/169" + "url": "http://www.securityfocus.com/bid/106009", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/106009" }, { - "name": "USN-3879-1", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3879-1/" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862" }, { - "name": "https://lore.kernel.org/patchwork/patch/1011367/", - "refsource": "CONFIRM", - "url": "https://lore.kernel.org/patchwork/patch/1011367/" + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862" + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", - "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" + "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", - "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" + "url": "https://lore.kernel.org/patchwork/patch/1011367/", + "refsource": "MISC", + "name": "https://lore.kernel.org/patchwork/patch/1011367/" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", - "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" + "url": "https://seclists.org/oss-sec/2018/q4/169", + "refsource": "MISC", + "name": "https://seclists.org/oss-sec/2018/q4/169" }, { - "refsource": "UBUNTU", - "name": "USN-4094-1", - "url": "https://usn.ubuntu.com/4094-1/" + "url": "https://usn.ubuntu.com/4094-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/4094-1/" }, { - "refsource": "UBUNTU", - "name": "USN-4118-1", - "url": "https://usn.ubuntu.com/4118-1/" + "url": "https://usn.ubuntu.com/4118-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/4118-1/" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", + "version": "3.0" } ] } diff --git a/2018/16xxx/CVE-2018-16863.json b/2018/16xxx/CVE-2018-16863.json index 9503ed83bf9..e841f0105a2 100644 --- a/2018/16xxx/CVE-2018-16863.json +++ b/2018/16xxx/CVE-2018-16863.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document." + "value": "It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Incomplete List of Disallowed Inputs", + "value": "CWE-184", "cweId": "CWE-184" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "Artifex", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "ghostscript", "version": { "version_data": [ { - "version_value": "0:9.07-31.el7_6.3", - "version_affected": "!" + "version_affected": "=", + "version_value": "9.07" } ] } @@ -79,16 +79,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3761" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-16863", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-16863" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652893", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1652893" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863", "refsource": "MISC", diff --git a/2018/16xxx/CVE-2018-16871.json b/2018/16xxx/CVE-2018-16871.json index d67a935e87d..a394455bbac 100644 --- a/2018/16xxx/CVE-2018-16871.json +++ b/2018/16xxx/CVE-2018-16871.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel's NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." + "value": "A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", + "value": "CWE-476", "cweId": "CWE-476" } ] @@ -36,57 +36,12 @@ "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel:", "version": { "version_data": [ { - "version_value": "0:3.10.0-957.27.2.rt56.940.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-957.27.2.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.18.1.el7a", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-693.58.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-193.rt13.51.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-193.el8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise MRG 2", - "version": { - "version_data": [ - { - "version_value": "1:3.10.0-693.58.1.rt56.652.el6rt", - "version_affected": "!" + "version_affected": "=", + "version_value": "all 3.x, all 4.x up to 4.20" } ] } @@ -99,16 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2019:1873", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1873" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:1891", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1891" - }, { "url": "https://access.redhat.com/errata/RHSA-2019:2696", "refsource": "MISC", @@ -124,26 +69,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2020:0740" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:1567", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:1567" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:1769", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:1769" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-16871", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-16871" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871", "refsource": "MISC", @@ -166,12 +91,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Hangbin Liu (Red Hat) and Jasu Liedes (Synopsys SIG)." - } - ], "impact": { "cvss": [ { diff --git a/2018/16xxx/CVE-2018-16872.json b/2018/16xxx/CVE-2018-16872.json index 9a42b5b24f7..bca0761641f 100644 --- a/2018/16xxx/CVE-2018-16872.json +++ b/2018/16xxx/CVE-2018-16872.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16872", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "QEMU:", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "[UNKNOWN]" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -38,74 +15,107 @@ } ] }, - "impact": { - "cvss": [ - [ - { - "vectorString": "5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", - "version": "3.0" - } - ] - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-367" + "value": "CWE-367", + "cweId": "CWE-367" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "[UNKNOWN]", + "product": { + "product_data": [ + { + "product_name": "QEMU:", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[debian-lts-announce] 20190228 [SECURITY] [DLA 1694-1] qemu security update", - "refsource": "MLIST", - "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00041.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" }, { - "name": "106212", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/106212" + "url": "http://www.securityfocus.com/bid/106212", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/106212" }, { - "refsource": "FEDORA", - "name": "FEDORA-2019-88a98ce795", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16872", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16872" }, { - "refsource": "UBUNTU", - "name": "USN-3923-1", - "url": "https://usn.ubuntu.com/3923-1/" + "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00041.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2019/02/msg00041.html" }, { - "refsource": "FEDORA", - "name": "FEDORA-2019-0664c7724d", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2019:1074", - "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" }, { - "refsource": "DEBIAN", - "name": "DSA-4454", - "url": "https://www.debian.org/security/2019/dsa-4454" + "url": "https://seclists.org/bugtraq/2019/May/76", + "refsource": "MISC", + "name": "https://seclists.org/bugtraq/2019/May/76" }, { - "refsource": "BUGTRAQ", - "name": "20190531 [SECURITY] [DSA 4454-1] qemu security update", - "url": "https://seclists.org/bugtraq/2019/May/76" + "url": "https://usn.ubuntu.com/3923-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3923-1/" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16872", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16872" + "url": "https://www.debian.org/security/2019/dsa-4454", + "refsource": "MISC", + "name": "https://www.debian.org/security/2019/dsa-4454" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" } ] } diff --git a/2018/16xxx/CVE-2018-16882.json b/2018/16xxx/CVE-2018-16882.json index e359c8d5d6b..46712cd3fae 100644 --- a/2018/16xxx/CVE-2018-16882.json +++ b/2018/16xxx/CVE-2018-16882.json @@ -1,38 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16882", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "kernel:", - "version": { - "version_data": [ - { - "version_value": "before 4.14.91" - }, - { - "version_value": "before 4.19.13" - } - ] - } - } - ] - }, - "vendor_name": "The Linux Foundation" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -41,94 +15,131 @@ } ] }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", - "version": "3.0" - } - ] - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-416" + "value": "CWE-416", + "cweId": "CWE-416" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The Linux Foundation", + "product": { + "product_data": [ + { + "product_name": "kernel:", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "before 4.14.91" + }, + { + "version_affected": "=", + "version_value": "before 4.19.13" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://marc.info/?l=kvm&m=154514994222809&w=2", + "url": "https://usn.ubuntu.com/3871-1/", "refsource": "MISC", - "url": "https://marc.info/?l=kvm&m=154514994222809&w=2" + "name": "https://usn.ubuntu.com/3871-1/" }, { - "name": "USN-3872-1", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3872-1/" + "url": "https://usn.ubuntu.com/3871-3/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3871-3/" }, { - "name": "USN-3878-1", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3878-1/" + "url": "https://usn.ubuntu.com/3871-4/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3871-4/" }, { - "name": "USN-3871-5", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3871-5/" + "url": "https://usn.ubuntu.com/3871-5/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3871-5/" }, { - "name": "USN-3878-2", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3878-2/" + "url": "https://usn.ubuntu.com/3872-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3872-1/" }, { - "name": "USN-3871-4", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3871-4/" + "url": "https://usn.ubuntu.com/3878-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3878-1/" }, { - "name": "106254", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/106254" + "url": "https://usn.ubuntu.com/3878-2/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3878-2/" }, { - "name": "https://lwn.net/Articles/775720/", - "refsource": "CONFIRM", - "url": "https://lwn.net/Articles/775720/" + "url": "http://www.securityfocus.com/bid/106254", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/106254" }, { - "name": "USN-3871-1", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3871-1/" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882" }, { - "name": "https://lwn.net/Articles/775721/", - "refsource": "CONFIRM", - "url": "https://lwn.net/Articles/775721/" + "url": "https://lwn.net/Articles/775720/", + "refsource": "MISC", + "name": "https://lwn.net/Articles/775720/" }, { - "name": "USN-3871-3", - "refsource": "UBUNTU", - "url": "https://usn.ubuntu.com/3871-3/" + "url": "https://lwn.net/Articles/775721/", + "refsource": "MISC", + "name": "https://lwn.net/Articles/775721/" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882" + "url": "https://marc.info/?l=kvm&m=154514994222809&w=2", + "refsource": "MISC", + "name": "https://marc.info/?l=kvm&m=154514994222809&w=2" }, { - "refsource": "CONFIRM", - "name": "https://support.f5.com/csp/article/K80557033", - "url": "https://support.f5.com/csp/article/K80557033" + "url": "https://support.f5.com/csp/article/K80557033", + "refsource": "MISC", + "name": "https://support.f5.com/csp/article/K80557033" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", + "version": "3.0" } ] } diff --git a/2019/10xxx/CVE-2019-10126.json b/2019/10xxx/CVE-2019-10126.json index 38d23c5732b..2f684f28f16 100644 --- a/2019/10xxx/CVE-2019-10126.json +++ b/2019/10xxx/CVE-2019-10126.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation." + "value": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", + "value": "CWE-122", "cweId": "CWE-122" } ] @@ -32,61 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1062.4.1.rt56.1027.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1062.4.1.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.17.1.el7a", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-957.54.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-147.rt24.93.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-147.el8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-80.15.1.el8_0", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -174,21 +129,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:3089" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:2289", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:2289" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10126", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10126" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126", "refsource": "MISC", @@ -251,26 +191,20 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank huangwen (ADLab of Venustech) for reporting this issue." - } - ], "impact": { "cvss": [ { - "attackComplexity": "LOW", - "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "attackVector": "NETWORK", "availabilityImpact": "HIGH", - "baseScore": 8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] diff --git a/2019/10xxx/CVE-2019-10132.json b/2019/10xxx/CVE-2019-10132.json index 46555b0874c..efe62c625e2 100644 --- a/2019/10xxx/CVE-2019-10132.json +++ b/2019/10xxx/CVE-2019-10132.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in libvirt in version 4.1.0 and earlier. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." + "value": "A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Incorrect Permission Assignment for Critical Resource", + "value": "CWE-732", "cweId": "CWE-732" } ] @@ -32,38 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "libvirt", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "libvirt", "version": { "version_data": [ { - "version_value": "0:4.5.0-10.el7_6.10", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "8000020190516125745.55190bc5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8 Advanced Virtualization", - "version": { - "version_data": [ - { - "version_value": "8000020190530233731.55190bc5", - "version_affected": "!" + "version_affected": "=", + "version_value": "affects >= 4.1.0" } ] } @@ -91,16 +69,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:1455" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10132", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10132" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706067", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1706067" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10132", "refsource": "MISC", @@ -128,12 +96,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Daniel P. Berrange (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10136.json b/2019/10xxx/CVE-2019-10136.json index 8a78e05ad7f..26a9163d0b2 100644 --- a/2019/10xxx/CVE-2019-10136.json +++ b/2019/10xxx/CVE-2019-10136.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that Spacewalk did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum." + "value": "It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Verification of Cryptographic Signature", + "value": "CWE-347", "cweId": "CWE-347" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "spacewalkproject", "product": { "product_data": [ { - "product_name": "Red Hat Satellite 5.8", + "product_name": "spacewalk", "version": { "version_data": [ { - "version_value": "0:2.5.3-177.el6sat", - "version_affected": "!" + "version_affected": "=", + "version_value": "spacewalk all through 2.9" } ] } @@ -59,21 +59,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/109029" }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:1661", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1661" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10136", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10136" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708696", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1708696" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10136", "refsource": "MISC", @@ -81,12 +66,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Malte Kraus (SUSE) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10140.json b/2019/10xxx/CVE-2019-10140.json index eac6e44c842..c1d563a99fa 100644 --- a/2019/10xxx/CVE-2019-10140.json +++ b/2019/10xxx/CVE-2019-10140.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Linux kernel's implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS)." + "value": "A vulnerability was found in Linux kernel's, versions up to 3.10, implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS)." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "NULL Pointer Dereference", + "value": "CWE-476", "cweId": "CWE-476" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "OpenSource", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel:", "version": { "version_data": [ { - "version_value": "0:3.10.0-1062.rt56.1022.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1062.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "up to kernel-3.10" } ] } @@ -58,26 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2019:2029", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:2029" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:2043", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:2043" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10140", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10140" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677778", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1677778" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10140", "refsource": "MISC", @@ -90,18 +66,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Some systems may wish to use device-mapper as an alternative to overlayfs. This does not remove the flaw if overlayfs module is still in use." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Vasily Averin (Virtuozzo) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10142.json b/2019/10xxx/CVE-2019-10142.json index 161a54cdbd3..db9162fc0be 100644 --- a/2019/10xxx/CVE-2019-10142.json +++ b/2019/10xxx/CVE-2019-10142.json @@ -1,12 +1,42 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10142", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190", + "cweId": "CWE-190" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-119", + "cweId": "CWE-119" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +49,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "5.0.x up to, excluding 5.0.17" } ] @@ -30,51 +61,31 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-190" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-119" - } - ] - } - ] - }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10142", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10142", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects." + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10142" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10144.json b/2019/10xxx/CVE-2019-10144.json index 071623b064a..2ff25c92568 100644 --- a/2019/10xxx/CVE-2019-10144.json +++ b/2019/10xxx/CVE-2019-10144.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10144", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250", + "cweId": "CWE-250" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "1.30.0" } ] @@ -30,48 +52,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-250" - } - ] - } - ] - }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144" + }, { "url": "https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/", "refsource": "MISC", "name": "https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources." } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ] + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10145.json b/2019/10xxx/CVE-2019-10145.json index 9d6f64e0be8..eadab3d1dc5 100644 --- a/2019/10xxx/CVE-2019-10145.json +++ b/2019/10xxx/CVE-2019-10145.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10145", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250", + "cweId": "CWE-250" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "1.30.0" } ] @@ -30,48 +52,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-250" - } - ] - } - ] - }, "references": { "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145", - "refsource": "CONFIRM" - }, { "url": "https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/", "refsource": "MISC", "name": "https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/" - } - ] - }, - "description": { - "description_data": [ + }, { - "lang": "eng", - "value": "rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources." + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "7.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ] + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10146.json b/2019/10xxx/CVE-2019-10146.json index b606bb89ba6..99d3d42447a 100644 --- a/2019/10xxx/CVE-2019-10146.json +++ b/2019/10xxx/CVE-2019-10146.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A Reflected Cross Site Scripting flaw was found in the pki-ca module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser." + "value": "A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "value": "CWE-79", "cweId": "CWE-79" } ] @@ -36,49 +36,12 @@ "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "pki-core", "version": { "version_data": [ { - "version_value": "0:10.5.18-12.el7_9", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:10.5.9-15.el7_6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.7 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:10.5.16-7.el7_7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "8030020200911215836.5ff1562f", - "version_affected": "!" - }, - { - "version_value": "8030020200527165326.30b713e6", - "version_affected": "!" + "version_affected": "=", + "version_value": "all pki-core 10.x.x versions" } ] } @@ -91,36 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2020:4847", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4847" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:0819", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:0819" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:0851", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:0851" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:0975", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:0975" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10146", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10146" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146", "refsource": "MISC", @@ -128,12 +61,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Pritam Singh (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10150.json b/2019/10xxx/CVE-2019-10150.json index f5f4930adc5..eec97ae6ac8 100644 --- a/2019/10xxx/CVE-2019-10150.json +++ b/2019/10xxx/CVE-2019-10150.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that OpenShift Container Platform does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output." + "value": "It was found that OpenShift Container Platform versions 3.6.x - 4.6.0 does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Authentication", + "value": "CWE-287", "cweId": "CWE-287" } ] @@ -32,53 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "redhat", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Container Platform 3.10", + "product_name": "atomic-openshift", "version": { "version_data": [ { - "version_value": "0:3.10.175-1.git.0.f9f0e81.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.10.6-2.rhaos3.10.git56d7d9a.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 3.11", - "version": { - "version_data": [ - { - "version_value": "0:3.11.153-1.git.0.aaf3f71.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 3.9", - "version": { - "version_data": [ - { - "version_value": "0:3.9.102-1.git.0.6411f52.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 4.1", - "version": { - "version_data": [ - { - "version_value": "v4.1.20-201910102034", - "version_affected": "!" + "version_affected": "=", + "version_value": "3.6.x - 4.0.0" } ] } @@ -111,16 +74,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:3811" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10150", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10150" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713433", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1713433" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10150", "refsource": "MISC", @@ -133,18 +86,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Use only methods (such as HTTPS with TLS verification) that enable the identity of the remote repository to be validated." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank @l14n_uk for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10160.json b/2019/10xxx/CVE-2019-10160.json index d0a49ac7e19..5122f92b46e 100644 --- a/2019/10xxx/CVE-2019-10160.json +++ b/2019/10xxx/CVE-2019-10160.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application." + "value": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Encoding Error", + "value": "CWE-172", "cweId": "CWE-172" } ] @@ -32,94 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "Python", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "python", "version": { "version_data": [ { - "version_value": "0:2.7.5-80.el7_6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.7.16-6.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:2.7.16-6.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS", - "version": { - "version_data": [ - { - "version_value": "0:2.7.16-6.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS", - "version": { - "version_data": [ - { - "version_value": "0:2.7.16-6.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS", - "version": { - "version_data": [ - { - "version_value": "0:2.7.16-6.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:1.1.9-0.1.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.3.5-0.20190717.0.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.3.5-2.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.3.5-20190722.0.el7_7", - "version_affected": "!" + "version_affected": "=", + "version_value": "affects 2.7, 3.5, 3.6, 3.7, >= v3.8.0a4 and < v3.8.0b1" } ] } @@ -157,16 +79,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:1700" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10160", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10160" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718388", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1718388" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160", "refsource": "MISC", @@ -284,12 +196,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Riccardo Schirone (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10172.json b/2019/10xxx/CVE-2019-10172.json index 47b1d25a168..de6a1f38dda 100644 --- a/2019/10xxx/CVE-2019-10172.json +++ b/2019/10xxx/CVE-2019-10172.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10172", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611", + "cweId": "CWE-611" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "1.9.x" } ] @@ -30,223 +52,211 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-611" - } - ] - } - ] - }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172", - "refsource": "CONFIRM" + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update", - "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html" + "url": "https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200407 [jira] [Created] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200413 [jira] [Commented] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200420 [jira] [Updated] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200420 [jira] [Commented] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200420 [jira] [Commented] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200818 [jira] [Updated] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d%40%3Cissues.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d%40%3Cissues.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200818 [jira] [Created] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200819 [jira] [Updated] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update", - "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html" + "url": "https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20200824 [jira] [Created] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-dev] 20200824 [jira] [Created] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a%40%3Cissues.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a%40%3Cissues.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20200825 [jira] [Updated] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20200825 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200901 [jira] [Commented] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20200901 [jira] [Commented] (CASSANDRA-15701) Does Cassandra 3.11.3/3.11.5 is affected by CVE-2019-10712 or not ?", - "url": "https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[spark-issues] 20210223 [jira] [Created] (SPARK-34511) Current Security vulnerabilities in spark libraries", - "url": "https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe%40%3Cuser.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe%40%3Cuser.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-user] 20210317 jackson-mapper-asl vulnerability at Hadoop", - "url": "https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-issues] 20210318 [jira] [Updated] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-issues] 20210318 [jira] [Assigned] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb%40%3Cissues.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb%40%3Cissues.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-dev] 20210318 [jira] [Created] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581%40%3Cdev.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581%40%3Cdev.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-issues] 20210318 [jira] [Commented] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-dev] 20210318 CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-issues] 20210318 [jira] [Comment Edited] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0%40%3Cissues.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0%40%3Cissues.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210320 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hive-issues] 20210729 [jira] [Resolved] (HIVE-24904) CVE-2019-10172,CVE-2019-10202 vulnerabilities in jackson-mapper-asl-1.9.13.jar", - "url": "https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E" + "url": "https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210906 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210907 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210920 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210921 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9%40%3Cdev.hive.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9%40%3Cdev.hive.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210924 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c%40%3Ccommon-issues.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c%40%3Ccommon-issues.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210924 [jira] [Updated] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e%40%3Ccommon-dev.hadoop.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e%40%3Ccommon-dev.hadoop.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20210926 [jira] [Commented] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[hadoop-common-issues] 20210927 [jira] [Commented] (HADOOP-17225) Update jackson-mapper-asl-1.9.13 to atlassian version to mitigate: CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E" + "url": "https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b%40%3Ccommits.cassandra.apache.org%3E", + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b%40%3Ccommits.cassandra.apache.org%3E" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20210927 [jira] [Updated] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E" + "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html" }, { - "refsource": "MLIST", - "name": "[cassandra-commits] 20210927 [jira] [Assigned] (CASSANDRA-16056) Remove jackson-mapper-asl-1.9.13 to mitigate CVE-2019-10172", - "url": "https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes." + "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", - "version": "3.0" - } - ] + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10175.json b/2019/10xxx/CVE-2019-10175.json index 3ffe89e82cc..e07181e84c7 100644 --- a/2019/10xxx/CVE-2019-10175.json +++ b/2019/10xxx/CVE-2019-10175.json @@ -1,12 +1,42 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10175", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user's data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284", + "cweId": "CWE-284" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-200", + "cweId": "CWE-200" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +49,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "virt-cdi-cloner 1.4" } ] @@ -30,51 +61,31 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-284" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-200" - } - ] - } - ] - }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10175", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10175", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user's data." + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10175" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10176.json b/2019/10xxx/CVE-2019-10176.json index 1be63dbf89d..cbdc2c19a38 100644 --- a/2019/10xxx/CVE-2019-10176.json +++ b/2019/10xxx/CVE-2019-10176.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF)", + "value": "CWE-352", "cweId": "CWE-352" } ] @@ -32,38 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "RedHat", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Container Platform 3.11", + "product_name": "atomic-openshift", "version": { "version_data": [ { - "version_value": "v3.11.157-1", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 4.1", - "version": { - "version_data": [ - { - "version_value": "v4.1.16-201909100604", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 4.2", - "version": { - "version_data": [ - { - "version_value": "v4.2.0-201910101614", - "version_affected": "!" + "version_affected": "=", + "version_value": "all versions fixed" } ] } @@ -76,11 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHBA-2019:2922", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHBA-2019:2922" - }, { "url": "https://access.redhat.com/errata/RHSA-2019:2792", "refsource": "MISC", @@ -91,16 +64,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:4053" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10176", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10176" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712569", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1712569" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176", "refsource": "MISC", @@ -108,12 +71,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Jeremy Choi (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10180.json b/2019/10xxx/CVE-2019-10180.json index 107b564634a..1266d2e4248 100644 --- a/2019/10xxx/CVE-2019-10180.json +++ b/2019/10xxx/CVE-2019-10180.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code." + "value": "A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "value": "CWE-79", "cweId": "CWE-79" } ] @@ -32,43 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Certificate System 9.4 EUS", + "product_name": "pki-core", "version": { "version_data": [ { - "version_value": "0:1.1.17-4.el7dsrv", - "version_affected": "!" - }, - { - "version_value": "0:10.5.9-2.el7pki", - "version_affected": "!" - }, - { - "version_value": "0:10.5.9-15.el7pki", - "version_affected": "!" - }, - { - "version_value": "0:10.5.9-5.el7pki", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Certificate System 9.7", - "version": { - "version_data": [ - { - "version_value": "0:10.5.18-12.el7pki", - "version_affected": "!" - }, - { - "version_value": "0:10.5.18-5.el7pki", - "version_affected": "!" + "version_affected": "=", + "version_value": "all pki-core 10.x.x versions" } ] } @@ -81,26 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2021:0947", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:0947" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:0948", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:0948" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10180", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10180" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721137", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1721137" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180", "refsource": "MISC", @@ -108,12 +61,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Pritam Singh (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/10xxx/CVE-2019-10181.json b/2019/10xxx/CVE-2019-10181.json index 6847746639b..b5eb1198e91 100644 --- a/2019/10xxx/CVE-2019-10181.json +++ b/2019/10xxx/CVE-2019-10181.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox." + "value": "It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Insufficient Verification of Data Authenticity", + "value": "CWE-345", "cweId": "CWE-345" } ] @@ -32,27 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "IcedTea", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "icedtea-web", "version": { "version_data": [ { - "version_value": "0:1.7.1-2.el7_6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:1.7.1-17.el8_0", - "version_affected": "!" + "version_affected": "=", + "version_value": "affects up to and including 1.7.2 and 1.8.2" } ] } @@ -75,26 +64,6 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:2003", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:2003" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:2004", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:2004" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-10181", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-10181" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725928", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1725928" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10181", "refsource": "MISC", @@ -127,12 +96,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Imre Rad for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3812.json b/2019/3xxx/CVE-2019-3812.json index 0ed4d43a66a..6fcf9705f8e 100644 --- a/2019/3xxx/CVE-2019-3812.json +++ b/2019/3xxx/CVE-2019-3812.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3812", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "qemu", - "version": { - "version_data": [ - { - "version_value": "through version 2.10 and through to 3.1.0" - } - ] - } - } - ] - }, - "vendor_name": "The QEMU Project" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -38,74 +15,107 @@ } ] }, - "impact": { - "cvss": [ - [ - { - "vectorString": "4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" - } - ] - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-119" + "value": "CWE-119", + "cweId": "CWE-119" } ] } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "The QEMU Project", + "product": { + "product_data": [ + { + "product_name": "qemu", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "through version 2.10 and through to 3.1.0" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/" }, { - "name": "107059", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/107059" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2019-88a98ce795", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/" + "url": "https://seclists.org/bugtraq/2019/May/76", + "refsource": "MISC", + "name": "https://seclists.org/bugtraq/2019/May/76" }, { - "refsource": "UBUNTU", - "name": "USN-3923-1", - "url": "https://usn.ubuntu.com/3923-1/" + "url": "https://usn.ubuntu.com/3923-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/3923-1/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2019-0664c7724d", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" + "url": "https://www.debian.org/security/2019/dsa-4454", + "refsource": "MISC", + "name": "https://www.debian.org/security/2019/dsa-4454" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2019:1274", - "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" }, { - "refsource": "SUSE", - "name": "openSUSE-SU-2019:1405", - "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" }, { - "refsource": "DEBIAN", - "name": "DSA-4454", - "url": "https://www.debian.org/security/2019/dsa-4454" + "url": "http://www.securityfocus.com/bid/107059", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/107059" }, { - "refsource": "BUGTRAQ", - "name": "20190531 [SECURITY] [DSA 4454-1] qemu security update", - "url": "https://seclists.org/bugtraq/2019/May/76" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812" + } + ] + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" } ] } diff --git a/2019/3xxx/CVE-2019-3815.json b/2019/3xxx/CVE-2019-3815.json index dc54d162460..f2878342fba 100644 --- a/2019/3xxx/CVE-2019-3815.json +++ b/2019/3xxx/CVE-2019-3815.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash." + "value": "A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Release of Memory after Effective Lifetime", + "value": "CWE-401", "cweId": "CWE-401" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The systemd Project", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "systemd", "version": { "version_data": [ { - "version_value": "0:219-62.el7_6.3", - "version_affected": "!" + "version_affected": "=", + "version_value": "v219-62.2 and newer" } ] } @@ -69,16 +69,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:0201" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3815", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3815" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666690", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1666690" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3815", "refsource": "MISC", diff --git a/2019/3xxx/CVE-2019-3816.json b/2019/3xxx/CVE-2019-3816.json index b3b4f7b3802..dc1bef9523d 100644 --- a/2019/3xxx/CVE-2019-3816.json +++ b/2019/3xxx/CVE-2019-3816.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "value": "CWE-22", "cweId": "CWE-22" } ] @@ -32,27 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "openwsman", "version": { "version_data": [ { - "version_value": "0:2.6.3-6.git4391e5c.el7_6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:2.6.5-5.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "versions up to and including 2.6.9" } ] } @@ -100,16 +89,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:0972" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3816", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3816" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667070", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1667070" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816", "refsource": "MISC", @@ -132,27 +111,21 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank NEC Corporation for reporting this issue." - } - ], "impact": { "cvss": [ { - "attackComplexity": "LOW", + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.0" + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2019/3xxx/CVE-2019-3821.json b/2019/3xxx/CVE-2019-3821.json index 3e529eae286..99e9c45956d 100644 --- a/2019/3xxx/CVE-2019-3821.json +++ b/2019/3xxx/CVE-2019-3821.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3821", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-772", + "cweId": "CWE-772" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "n/a" } ] @@ -30,53 +52,41 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-772" - } - ] - } - ] - }, "references": { "reference_data": [ - { - "refsource": "UBUNTU", - "name": "USN-4035-1", - "url": "https://usn.ubuntu.com/4035-1/" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821", - "refsource": "CONFIRM" - }, { "url": "https://github.com/ceph/civetweb/pull/33", "refsource": "MISC", "name": "https://github.com/ceph/civetweb/pull/33" - } - ] - }, - "description": { - "description_data": [ + }, { - "lang": "eng", - "value": "A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service." + "url": "https://usn.ubuntu.com/4035-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/4035-1/" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3832.json b/2019/3xxx/CVE-2019-3832.json index 2023a3b1488..53fff93f18e 100644 --- a/2019/3xxx/CVE-2019-3832.json +++ b/2019/3xxx/CVE-2019-3832.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3832", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125", + "cweId": "CWE-125" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "NA" } ] @@ -30,68 +52,56 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-125" - } - ] - } - ] - }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832", - "refsource": "CONFIRM" + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832" }, { "url": "https://github.com/erikd/libsndfile/issues/456", - "name": "https://github.com/erikd/libsndfile/issues/456", - "refsource": "CONFIRM" + "refsource": "MISC", + "name": "https://github.com/erikd/libsndfile/issues/456" }, { "url": "https://github.com/erikd/libsndfile/pull/460", - "name": "https://github.com/erikd/libsndfile/pull/460", - "refsource": "CONFIRM" + "refsource": "MISC", + "name": "https://github.com/erikd/libsndfile/pull/460" }, { - "refsource": "UBUNTU", - "name": "USN-4013-1", - "url": "https://usn.ubuntu.com/4013-1/" + "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html" }, { - "refsource": "GENTOO", - "name": "GLSA-202007-65", - "url": "https://security.gentoo.org/glsa/202007-65" + "url": "https://security.gentoo.org/glsa/202007-65", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202007-65" }, { - "refsource": "MLIST", - "name": "[debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update", - "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash." + "url": "https://usn.ubuntu.com/4013-1/", + "refsource": "MISC", + "name": "https://usn.ubuntu.com/4013-1/" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3833.json b/2019/3xxx/CVE-2019-3833.json index 1234e42f9cd..dcf30142f88 100644 --- a/2019/3xxx/CVE-2019-3833.json +++ b/2019/3xxx/CVE-2019-3833.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", + "value": "CWE-835", "cweId": "CWE-835" } ] @@ -32,27 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "openwsman", "version": { "version_data": [ { - "version_value": "0:2.6.3-7.git4391e5c.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:2.6.5-7.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "versions up to and including 2.6.9" } ] } @@ -100,26 +89,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/107367" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:3940", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:3940" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4689", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4689" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3833", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3833" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1674478", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1674478" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833", "refsource": "MISC", @@ -127,12 +96,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Adam Mari\u0161 (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3845.json b/2019/3xxx/CVE-2019-3845.json index 066c99d021b..310bcd217b3 100644 --- a/2019/3xxx/CVE-2019-3845.json +++ b/2019/3xxx/CVE-2019-3845.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3845", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284", + "cweId": "CWE-284" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,12 +40,15 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "fixed in Satellite >= 6.2" }, { + "version_affected": "=", "version_value": "fixed in Satellite 6.1 - Optional" }, { + "version_affected": "=", "version_value": "fixed in Satellite Capsule 6.1" } ] @@ -36,48 +60,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-284" - } - ] - } - ] - }, "references": { "reference_data": [ { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3845", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3845", - "refsource": "CONFIRM" + "url": "https://access.redhat.com/errata/RHSA-2019:1223", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2019:1223" }, { - "refsource": "REDHAT", - "name": "RHSA-2019:1223", - "url": "https://access.redhat.com/errata/RHSA-2019:1223" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands." + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3845", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3845" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3846.json b/2019/3xxx/CVE-2019-3846.json index add77ee20c7..5ef333b28ce 100644 --- a/2019/3xxx/CVE-2019-3846.json +++ b/2019/3xxx/CVE-2019-3846.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel's Marvell wifi chip driver. A heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c allows remote attackers to cause a denial of service(system crash) or execute arbitrary code." + "value": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow", + "value": "CWE-122", "cweId": "CWE-122" } ] @@ -32,50 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1062.4.1.rt56.1027.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1062.4.1.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.17.1.el7a", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-957.54.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-80.11.1.rt9.156.el8_0", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-80.11.1.el8_0", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -143,11 +109,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:3089" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:2289", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:2289" - }, { "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html", "refsource": "MISC", @@ -213,16 +174,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:2741" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3846", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3846" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713059", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1713059" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846", "refsource": "MISC", @@ -245,18 +196,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "This flaw requires a system with marvell wifi network card to be attempting to connect to a attacker controlled wifi network. A temporary mitigation may be to only connect to known-good networks via wifi, or connect to a network via ethernet. Alternatively if wireless networking is not used the mwifiex kernel module can be blacklisted to prevent misuse of the vulnerable code." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank huangwen (ADLab of Venustech) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3865.json b/2019/3xxx/CVE-2019-3865.json index 7b76bfd12b5..61a9f576fdd 100644 --- a/2019/3xxx/CVE-2019-3865.json +++ b/2019/3xxx/CVE-2019-3865.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3865", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79", + "cweId": "CWE-79" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "quay 2" } ] @@ -30,43 +52,31 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3865", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3865", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name." + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3865" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", - "version": "3.0" - } - ] + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3872.json b/2019/3xxx/CVE-2019-3872.json index 847740a273c..ed4c09373e8 100644 --- a/2019/3xxx/CVE-2019-3872.json +++ b/2019/3xxx/CVE-2019-3872.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3872", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was found that a SAMLRequest containing a script could be processed by Picketlink versions shipped in Jboss Application Platform 7.2.x and 7.1.x. An attacker could use this to send a malicious script to achieve cross-site scripting and obtain unauthorized information or conduct further attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79", + "cweId": "CWE-79" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "as shipped with Jboss Enterprise Application Platform 7.2.x and 7.1.x" } ] @@ -30,48 +52,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, "references": { "reference_data": [ { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3872", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3872", - "refsource": "CONFIRM" + "url": "http://www.securityfocus.com/bid/108732", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/108732" }, { - "refsource": "BID", - "name": "108732", - "url": "http://www.securityfocus.com/bid/108732" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was found that a SAMLRequest containing a script could be processed by Picketlink versions shipped in Jboss Application Platform 7.2.x and 7.1.x. An attacker could use this to send a malicious script to achieve cross-site scripting and obtain unauthorized information or conduct further attacks." + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3872", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3872" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3873.json b/2019/3xxx/CVE-2019-3873.json index 24ad69d2225..74c24e8a2fb 100644 --- a/2019/3xxx/CVE-2019-3873.json +++ b/2019/3xxx/CVE-2019-3873.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3873", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79", + "cweId": "CWE-79" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "as shipped with Jboss Enterprise Application Server 7.2" } ] @@ -30,48 +52,36 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, "references": { "reference_data": [ { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3873", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3873", - "refsource": "CONFIRM" + "url": "http://www.securityfocus.com/bid/108739", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/108739" }, { - "refsource": "BID", - "name": "108739", - "url": "http://www.securityfocus.com/bid/108739" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks." + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3873", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3873" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3874.json b/2019/3xxx/CVE-2019-3874.json index c9aca90ed3f..2ccd4d0926a 100644 --- a/2019/3xxx/CVE-2019-3874.json +++ b/2019/3xxx/CVE-2019-3874.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack." + "value": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", + "value": "CWE-400", "cweId": "CWE-400" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Linux Foundation", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.18.0-147.rt24.93.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-147.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "3.10.x and 4.18.x" } ] } @@ -93,36 +89,16 @@ "refsource": "MISC", "name": "https://usn.ubuntu.com/3981-2/" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3874", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3874" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874" }, - { - "url": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594", - "refsource": "MISC", - "name": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594" - }, { "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, - { - "url": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u", - "refsource": "MISC", - "name": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u" - }, { "url": "https://security.netapp.com/advisory/ntap-20190411-0003/", "refsource": "MISC", @@ -145,18 +121,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "SELinux prevents a bind of the SCTP socket by a non-root user. \n\nTo mitigate this issue if not using SELinux, or if a Security Context Constraint allows running pods as the root user the 'sctp' module should be blacklisted. Please this this Knowledge Base article for more information on how to blacklist a kernel module. https://access.redhat.com/solutions/41278" - } - ], - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Andrea Spagnolo (Red Hat), Matteo Croce (Red Hat), and Natale Vinto (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3876.json b/2019/3xxx/CVE-2019-3876.json index 2cd28b98a6c..b08e481a2f1 100644 --- a/2019/3xxx/CVE-2019-3876.json +++ b/2019/3xxx/CVE-2019-3876.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF)", + "value": "CWE-352", "cweId": "CWE-352" } ] @@ -36,16 +36,12 @@ "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Container Platform 3.11", + "product_name": "web-console", "version": { "version_data": [ { - "version_value": "0:3.11.129-1.git.0.bd4f2d5.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.11.1560870549-1.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "affects OpenShift Container Platform version v3.0 through v3.11" } ] } @@ -68,16 +64,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:1851" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3876", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3876" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691107", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1691107" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3876", "refsource": "MISC", @@ -85,18 +71,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Since at least v3.4, the OpenShift documentation [1] has specified the format for corsAllowedOrigins to accurately match intended hostnames. Since at least v3.7, installs will default to use the correct regular expression formatted variables. Earlier versions may be configured with plain strings, a configuration which will persist across cluster upgrades, opening them to cross origin vulnerabilities such as this.\n\n\nAt a minimum, you should ensure that the corsAllowedOrigin definition within master-config.yaml contains elements in the form \n\n~~~\ncorsAllowedOrigins:\n- (?i)//my\\.subdomain\\.domain\\.com(:|\\z)\n~~~\n\nand not the form\n\n~~~\ncorsAllowedOrigins:\n- domain.com\n~~~\n\nas the first will permit cross origin requests only if the host matches exactly, whereas the second will permit from any host that merely contains the string (such as ABCDdomain.com or even domain.comABCD.com).\n\n\n\nFootnotes:\n\n[1] https://docs.openshift.com/container-platform/3.4/architecture/infrastructure_components/web_console.html#corsAllowedOrigins" - } - ], - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Mo Khan (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3882.json b/2019/3xxx/CVE-2019-3882.json index 33d79ab6b7b..845783c0bd6 100644 --- a/2019/3xxx/CVE-2019-3882.json +++ b/2019/3xxx/CVE-2019-3882.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS)." + "value": "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable." } ] }, @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", - "cweId": "CWE-400" + "value": "CWE-770", + "cweId": "CWE-770" } ] } @@ -32,35 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Linux Foundation", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1062.rt56.1022.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1062.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-147.rt24.93.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-147.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "3.10, 4.14, 4.18" } ] } @@ -143,16 +124,6 @@ "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3882", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3882" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882", "refsource": "MISC", @@ -190,12 +161,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Alex Williamson (Red Hat Inc.)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3884.json b/2019/3xxx/CVE-2019-3884.json index 050fa03a1b2..48f81fb4e02 100644 --- a/2019/3xxx/CVE-2019-3884.json +++ b/2019/3xxx/CVE-2019-3884.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects." + "value": "A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Authentication Bypass by Spoofing", + "value": "CWE-290", "cweId": "CWE-290" } ] @@ -36,12 +36,12 @@ "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Container Platform 4.7", + "product_name": "atomic-openshift", "version": { "version_data": [ { - "version_value": "0:4.7.0-202102060108.p0.git.97095.7271b90.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 4.1" } ] } @@ -54,21 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2020:5634", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:5634" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3884", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3884" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693905", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1693905" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3884", "refsource": "MISC", @@ -76,12 +61,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Jessica Forrester (Red Hat)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3886.json b/2019/3xxx/CVE-2019-3886.json index 8c65336ad42..9df810a0ac0 100644 --- a/2019/3xxx/CVE-2019-3886.json +++ b/2019/3xxx/CVE-2019-3886.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block." + "value": "An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Authorization", + "value": "CWE-862", "cweId": "CWE-862" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The libvirt Project", "product": { "product_data": [ { - "product_name": "Advanced Virtualization for RHEL 8.1.0", + "product_name": "libvirt", "version": { "version_data": [ { - "version_value": "8010020190927171011.cdc1202b", - "version_affected": "!" + "version_affected": "=", + "version_value": "4.8.0 and above" } ] } @@ -79,16 +79,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHBA-2019:3723" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3886", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3886" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694880", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1694880" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886", "refsource": "MISC", @@ -104,18 +94,18 @@ "impact": { "cvss": [ { - "attackComplexity": "LOW", + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "LOW", - "baseScore": 5.4, - "baseSeverity": "MEDIUM", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", - "version": "3.0" + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2019/3xxx/CVE-2019-3894.json b/2019/3xxx/CVE-2019-3894.json index 3f06ed850af..2c84a804419 100644 --- a/2019/3xxx/CVE-2019-3894.json +++ b/2019/3xxx/CVE-2019-3894.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3894", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wrong security identity when executing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-358", + "cweId": "CWE-358" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "affects from 11 to 16" } ] @@ -30,68 +52,56 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-358" - } - ] - } - ] - }, "references": { "reference_data": [ + { + "url": "https://access.redhat.com/errata/RHSA-2019:1106", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2019:1106" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2019:1107", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2019:1107" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2019:1108", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2019:1108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2019:1140", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2019:1140" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20190517-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20190517-0004/" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3894", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3894", - "refsource": "CONFIRM" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:1107", - "url": "https://access.redhat.com/errata/RHSA-2019:1107" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:1108", - "url": "https://access.redhat.com/errata/RHSA-2019:1108" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:1106", - "url": "https://access.redhat.com/errata/RHSA-2019:1106" - }, - { - "refsource": "REDHAT", - "name": "RHSA-2019:1140", - "url": "https://access.redhat.com/errata/RHSA-2019:1140" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20190517-0004/", - "url": "https://security.netapp.com/advisory/ntap-20190517-0004/" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wrong security identity when executing." + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3894" } ] }, "impact": { "cvss": [ - [ - { - "vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "version": "3.0" - } - ] + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } ] } } \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3896.json b/2019/3xxx/CVE-2019-3896.json index 53904de5ec3..61dbd6e6774 100644 --- a/2019/3xxx/CVE-2019-3896.json +++ b/2019/3xxx/CVE-2019-3896.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS)." + "value": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS)." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", + "value": "CWE-416", "cweId": "CWE-416" } ] @@ -32,38 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Linux Foundation", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:2.6.32-754.15.3.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-431.95.3.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6.6 Advanced Update Support", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-504.79.3.el6", - "version_affected": "!" + "version_affected": "=", + "version_value": "2.6.32" } ] } @@ -86,31 +64,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/108814" }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:1488", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1488" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:1489", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1489" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2019:1490", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2019:1490" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3896", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3896" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3896", "refsource": "MISC", @@ -123,12 +76,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Eiichi Tsukata for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3900.json b/2019/3xxx/CVE-2019-3900.json index 4b5088ddb91..41ded66fbc9 100644 --- a/2019/3xxx/CVE-2019-3900.json +++ b/2019/3xxx/CVE-2019-3900.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario." + "value": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Loop with Unreachable Exit Condition ('Infinite Loop')", + "value": "CWE-835", "cweId": "CWE-835" } ] @@ -36,112 +36,12 @@ "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "Kernel", "version": { "version_data": [ { - "version_value": "0:2.6.32-754.24.2.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-1062.rt56.1022.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.10.1.el7a", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1062.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.4 Advanced Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-693.61.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.4 Telco Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-693.61.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-693.61.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-862.44.2.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-957.38.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-147.rt24.93.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-147.el8", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-80.15.1.el8_0", - "version_affected": "!" + "version_affected": "=", + "version_value": "affects up to and including v5.1-rc6" } ] } @@ -259,16 +159,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:4058" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3900", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3900" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900", "refsource": "MISC", @@ -311,12 +201,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Jason Wang (Red Hat Inc.)." - } - ], "impact": { "cvss": [ { diff --git a/2019/3xxx/CVE-2019-3901.json b/2019/3xxx/CVE-2019-3901.json index 3fc82103b46..c2cdd42abc6 100644 --- a/2019/3xxx/CVE-2019-3901.json +++ b/2019/3xxx/CVE-2019-3901.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls." + "value": "A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Locking", + "value": "CWE-667", "cweId": "CWE-667" } ] @@ -32,53 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Linux Foundation", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1127.rt56.1093.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1127.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-957.56.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7.7 Extended Update Support", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-1062.26.1.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-957.56.1.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "older then 4.8" } ] } @@ -91,21 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2020:1016", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:1016" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:1070", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:1070" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:2851", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:2851" - }, { "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html", "refsource": "MISC", @@ -126,21 +74,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/89937" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:2522", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:2522" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2019-3901", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2019-3901" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701245", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1701245" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3901", "refsource": "MISC", diff --git a/2020/10xxx/CVE-2020-10732.json b/2020/10xxx/CVE-2020-10732.json index d49d5d9237d..1303d3a5e4f 100644 --- a/2020/10xxx/CVE-2020-10732.json +++ b/2020/10xxx/CVE-2020-10732.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data." + "value": "A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use of Uninitialized Resource", + "value": "CWE-908", "cweId": "CWE-908" } ] @@ -32,35 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "Linux kernel", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1160.rt56.1131.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1160.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-240.rt7.54.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-240.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "introduced in commit 4206d3aa1978e44f58bfa4e1c9d8d35cbf19c187" } ] } @@ -103,36 +84,6 @@ "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4060", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4060" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4062", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4062" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4431", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4431" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4609", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4609" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2020-10732", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2020-10732" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732", "refsource": "MISC", @@ -175,27 +126,21 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system. This disables core dumps which may not be a suitable workaround in your environment." - } - ], "impact": { "cvss": [ { - "attackComplexity": "LOW", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 3.3, - "baseSeverity": "LOW", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "version": "3.1" + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" } ] } diff --git a/2020/10xxx/CVE-2020-10742.json b/2020/10xxx/CVE-2020-10742.json index 85a1e2ee6d7..470445ccd2b 100644 --- a/2020/10xxx/CVE-2020-10742.json +++ b/2020/10xxx/CVE-2020-10742.json @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Write", - "cweId": "CWE-787" + "value": "Buffer Overflow" } ] } @@ -32,20 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "Kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1160.rt56.1131.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1160.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "kernel 3.10.0" } ] } @@ -58,50 +53,11 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2020:4060", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4060" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4062", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4062" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2020-10742", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2020-10742" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835127", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1835127" } ] - }, - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Jay Shin (Red Hat)." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "privilegesRequired": "HIGH", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10743.json b/2020/10xxx/CVE-2020-10743.json index 0f200a20172..4047e7c38b3 100644 --- a/2020/10xxx/CVE-2020-10743.json +++ b/2020/10xxx/CVE-2020-10743.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improperly Implemented Security Check for Standard", + "value": "CWE-358", "cweId": "CWE-358" } ] @@ -32,27 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat OpenShift Container Platform 3.11", + "product_name": "Kibana", "version": { "version_data": [ { - "version_value": "v3.11.286-1", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenShift Container Platform 4.6", - "version": { - "version_data": [ - { - "version_value": "v4.6.0-202010200139.p0", - "version_affected": "!" + "version_affected": "=", + "version_value": "OpenShift Container Platform 3.11.286 and OpenShift Container Platform 4.6.1" } ] } @@ -65,50 +54,11 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/errata/RHSA-2020:3727", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:3727" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4298", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4298" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2020-10743", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2020-10743" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550" } ] - }, - "work_around": [ - { - "lang": "en", - "value": "Any Kibana version with this commit [1] can add the following configuration option to mitigation the problem:\n\nconfig/kibana.yml:\nserver.customResponseHeaders: {\"x-frame-options\":\"deny\"}\nor\nserver.customResponseHeaders: {\"x-frame-options\":\"sameorigin\"}\n\n[1] https://github.com/elastic/kibana/pull/13045" - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "HIGH", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 3.1, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10751.json b/2020/10xxx/CVE-2020-10751.json index b45d64c616d..c582864b15c 100644 --- a/2020/10xxx/CVE-2020-10751.json +++ b/2020/10xxx/CVE-2020-10751.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw." + "value": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Acceptance of Extraneous Untrusted Data With Trusted Data", + "value": "CWE-349", "cweId": "CWE-349" } ] @@ -32,35 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "The Linux Foundation", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-1160.rt56.1131.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-1160.el7", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 8", - "version": { - "version_data": [ - { - "version_value": "0:4.18.0-240.rt7.54.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-240.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "before 5.7" } ] } @@ -88,41 +69,11 @@ "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4060", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4060" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4062", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4062" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4431", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4431" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2020:4609", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2020:4609" - }, { "url": "http://www.openwall.com/lists/oss-security/2020/05/27/3", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2020/05/27/3" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2020-10751", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2020-10751" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751", "refsource": "MISC", @@ -153,11 +104,6 @@ "refsource": "MISC", "name": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/" }, - { - "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/", - "refsource": "MISC", - "name": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/" - }, { "url": "https://usn.ubuntu.com/4389-1/", "refsource": "MISC", @@ -200,12 +146,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." - } - ], "impact": { "cvss": [ { diff --git a/2020/10xxx/CVE-2020-10752.json b/2020/10xxx/CVE-2020-10752.json index 19ebc5ac73d..2bafcbf6027 100644 --- a/2020/10xxx/CVE-2020-10752.json +++ b/2020/10xxx/CVE-2020-10752.json @@ -1,34 +1,19 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10752", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Openshift", - "product": { - "product_data": [ - { - "product_name": "openshift/openshift-apiserver", - "version": { - "version_data": [ - { - "version_value": "All versions" - } - ] - } - } - ] - } - } - ] - } + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token." + } + ] }, "problemtype": { "problemtype_data": [ @@ -42,25 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Openshift", + "product": { + "product_data": [ + { + "product_name": "openshift/openshift-apiserver", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All versions" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "refsource": "CONFIRM", - "name": "https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39", - "url": "https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39" + "url": "https://github.com/openshift/enhancements/pull/323", + "refsource": "MISC", + "name": "https://github.com/openshift/enhancements/pull/323" }, { - "refsource": "CONFIRM", - "name": "https://github.com/openshift/enhancements/pull/323", - "url": "https://github.com/openshift/enhancements/pull/323" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token." + "url": "https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39", + "refsource": "MISC", + "name": "https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39" } ] } diff --git a/2021/3xxx/CVE-2021-3669.json b/2021/3xxx/CVE-2021-3669.json index f1cdf61f8a7..3d8cae9baaa 100644 --- a/2021/3xxx/CVE-2021-3669.json +++ b/2021/3xxx/CVE-2021-3669.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", + "value": "CWE-400 - Uncontrolled Resource Consumption", "cweId": "CWE-400" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.18.0-372.9.1.rt7.166.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-372.9.1.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "Not Known" } ] } @@ -58,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980619", "refsource": "MISC", @@ -72,45 +73,6 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2021-3669", "refsource": "MISC", "name": "https://security-tracker.debian.org/tracker/CVE-2021-3669" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1975", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1975" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1988", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1988" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" - } - ] - }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "version": "3.1" } ] } diff --git a/2021/3xxx/CVE-2021-3670.json b/2021/3xxx/CVE-2021-3670.json index c7681ac8907..1c54454143e 100644 --- a/2021/3xxx/CVE-2021-3670.json +++ b/2021/3xxx/CVE-2021-3670.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3670", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MaxQueryDuration not honoured in Samba AD DC LDAP" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 - Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Affects Samba 4.1 and newer." } ] @@ -30,72 +52,52 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-400 - Uncontrolled Resource Consumption" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533" }, { + "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694", "refsource": "MISC", - "name": "https://bugzilla.samba.org/show_bug.cgi?id=14694", - "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694" + "name": "https://bugzilla.samba.org/show_bug.cgi?id=14694" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f", - "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f" + "name": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81", - "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81" + "name": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803", - "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803" + "name": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049", - "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049" + "name": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002", - "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002" + "name": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b", - "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b" + "name": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b" }, { + "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393", "refsource": "MISC", - "name": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393", - "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "MaxQueryDuration not honoured in Samba AD DC LDAP" + "name": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393" } ] } diff --git a/2021/3xxx/CVE-2021-3681.json b/2021/3xxx/CVE-2021-3681.json index 5666da55624..03859370df0 100644 --- a/2021/3xxx/CVE-2021-3681.json +++ b/2021/3xxx/CVE-2021-3681.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3681", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in \"galaxy.yml\" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-522->CWE-212", + "cweId": "CWE-522" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "ansible 3.3.0" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-522->CWE-212" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989407", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1989407", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989407" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1989407" }, { + "url": "https://github.com/ansible/galaxy/issues/1977", "refsource": "MISC", - "name": "https://github.com/ansible/galaxy/issues/1977", - "url": "https://github.com/ansible/galaxy/issues/1977" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in \"galaxy.yml\" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets." + "name": "https://github.com/ansible/galaxy/issues/1977" } ] } diff --git a/2021/3xxx/CVE-2021-3688.json b/2021/3xxx/CVE-2021-3688.json index fd9c758a0b8..d6af1c40c04 100644 --- a/2021/3xxx/CVE-2021-3688.json +++ b/2021/3xxx/CVE-2021-3688.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor", + "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor", "cweId": "CWE-200" } ] @@ -32,123 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "JBoss Core Services for RHEL 8", + "product_name": "Red Hat JBCS HTTP Server", "version": { "version_data": [ { - "version_value": "0:1.6.3-107.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-84.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:7.78.0-2.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:2.4.37-78.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.3.16-9.Final_redhat_2.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.15.7-21.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.2.48-20.redhat_1.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "1:2.0.8-40.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:2.9.2-67.GA.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.39.2-39.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "1:1.1.1g-8.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-7.el8jbcs", - "version_affected": "!" - }, - { - "version_value": "0:0.4.10-22.el8jbcs", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "JBoss Core Services on RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:1.6.3-107.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.6.1-84.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:7.78.0-2.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.4.37-78.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.3.16-9.Final_redhat_2.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.15.7-21.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.2.48-20.redhat_1.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "1:2.0.8-40.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:2.9.2-67.GA.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.39.2-39.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "1:1.1.1g-8.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:1.0.0-7.jbcs.el7", - "version_affected": "!" - }, - { - "version_value": "0:0.4.10-22.jbcs.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "Fixed in jbcs-httpd-2.4.37.SP10 GA" } ] } @@ -161,49 +54,15 @@ }, "references": { "reference_data": [ - { - "url": "https://access.redhat.com/security/cve/CVE-2021-3688", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3688" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:4613", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:4613" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2021:4614", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2021:4614" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252" - } - ] - }, - "work_around": [ - { - "lang": "en", - "value": "Manually add LocationMatch directive to deny any possible problem requests in the JBCS httpd configuration. For example:\n~~~\n\n Require all denied\n\n~~~" - } - ], - "impact": { - "cvss": [ + }, { - "attackComplexity": "HIGH", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", - "version": "3.1" + "url": "https://access.redhat.com/security/cve/CVE-2021-3688", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/CVE-2021-3688" } ] } diff --git a/2021/3xxx/CVE-2021-3690.json b/2021/3xxx/CVE-2021-3690.json index 1ee387f4a8f..76940f0343e 100644 --- a/2021/3xxx/CVE-2021-3690.json +++ b/2021/3xxx/CVE-2021-3690.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3690", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 - Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Fixed in 2.2.10.Final, 2.0.40.Final" } ] @@ -30,47 +52,27 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-400 - Uncontrolled Resource Consumption" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://issues.redhat.com/browse/UNDERTOW-1935", "refsource": "MISC", - "name": "https://issues.redhat.com/browse/UNDERTOW-1935", - "url": "https://issues.redhat.com/browse/UNDERTOW-1935" + "name": "https://issues.redhat.com/browse/UNDERTOW-1935" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3690", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3690", - "url": "https://access.redhat.com/security/cve/CVE-2021-3690" + "name": "https://access.redhat.com/security/cve/CVE-2021-3690" }, { + "url": "https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877", "refsource": "MISC", - "name": "https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877", - "url": "https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability." + "name": "https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877" } ] } diff --git a/2021/3xxx/CVE-2021-3701.json b/2021/3xxx/CVE-2021-3701.json index 542c0467355..3299e936970 100644 --- a/2021/3xxx/CVE-2021-3701.json +++ b/2021/3xxx/CVE-2021-3701.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3701", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-276 - Incorrect Default Permissions", + "cweId": "CWE-276" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Affects ansible-runner 2.0" } ] @@ -30,47 +52,27 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-276 - Incorrect Default Permissions" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3701", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3701", - "url": "https://access.redhat.com/security/cve/CVE-2021-3701" + "name": "https://access.redhat.com/security/cve/CVE-2021-3701" }, { + "url": "https://github.com/ansible/ansible-runner/issues/738", "refsource": "MISC", - "name": "https://github.com/ansible/ansible-runner/issues/738", - "url": "https://github.com/ansible/ansible-runner/issues/738" + "name": "https://github.com/ansible/ansible-runner/issues/738" }, { + "url": "https://github.com/ansible/ansible-runner/pull/742/commits", "refsource": "MISC", - "name": "https://github.com/ansible/ansible-runner/pull/742/commits", - "url": "https://github.com/ansible/ansible-runner/pull/742/commits" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity." + "name": "https://github.com/ansible/ansible-runner/pull/742/commits" } ] } diff --git a/2021/3xxx/CVE-2021-3702.json b/2021/3xxx/CVE-2021-3702.json index bdb7745998f..5fa95aae3c7 100644 --- a/2021/3xxx/CVE-2021-3702.json +++ b/2021/3xxx/CVE-2021-3702.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3702", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "cweId": "CWE-362" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Affects ansible-runner 2.0" } ] @@ -30,42 +52,22 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://github.com/ansible/ansible-runner/pull/742/commits", "refsource": "MISC", - "name": "https://github.com/ansible/ansible-runner/pull/742/commits", - "url": "https://github.com/ansible/ansible-runner/pull/742/commits" + "name": "https://github.com/ansible/ansible-runner/pull/742/commits" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977965", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1977965", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977965" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1977965" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3702", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3702", - "url": "https://access.redhat.com/security/cve/CVE-2021-3702" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality." + "name": "https://access.redhat.com/security/cve/CVE-2021-3702" } ] } diff --git a/2021/3xxx/CVE-2021-3714.json b/2021/3xxx/CVE-2021-3714.json index 93d682fcad7..0e7f6336387 100644 --- a/2021/3xxx/CVE-2021-3714.json +++ b/2021/3xxx/CVE-2021-3714.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3714", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Not known" } ] @@ -30,47 +52,27 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://arxiv.org/abs/2111.08553", "refsource": "MISC", - "name": "https://arxiv.org/abs/2111.08553", - "url": "https://arxiv.org/abs/2111.08553" + "name": "https://arxiv.org/abs/2111.08553" }, { + "url": "https://arxiv.org/pdf/2111.08553.pdf", "refsource": "MISC", - "name": "https://arxiv.org/pdf/2111.08553.pdf", - "url": "https://arxiv.org/pdf/2111.08553.pdf" + "name": "https://arxiv.org/pdf/2111.08553.pdf" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931327", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1931327", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931327" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1931327" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3714", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3714", - "url": "https://access.redhat.com/security/cve/CVE-2021-3714" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged." + "name": "https://access.redhat.com/security/cve/CVE-2021-3714" } ] } diff --git a/2021/3xxx/CVE-2021-3735.json b/2021/3xxx/CVE-2021-3735.json index 37700919a5c..3e54fa78577 100644 --- a/2021/3xxx/CVE-2021-3735.json +++ b/2021/3xxx/CVE-2021-3735.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3735", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-667 - Improper Locking -> CWE-400 - Uncontrolled Resource Consumption", + "cweId": "CWE-667" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Not Known" } ] @@ -30,42 +52,22 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-667 - Improper Locking -> CWE-400 - Uncontrolled Resource Consumption" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997184", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997184", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997184" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997184" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3735", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3735", - "url": "https://access.redhat.com/security/cve/CVE-2021-3735" + "name": "https://access.redhat.com/security/cve/CVE-2021-3735" }, { + "url": "https://security-tracker.debian.org/tracker/CVE-2021-3735", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2021-3735", - "url": "https://security-tracker.debian.org/tracker/CVE-2021-3735" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability." + "name": "https://security-tracker.debian.org/tracker/CVE-2021-3735" } ] } diff --git a/2021/3xxx/CVE-2021-3736.json b/2021/3xxx/CVE-2021-3736.json index f4e1eaa99d3..3954eb4da56 100644 --- a/2021/3xxx/CVE-2021-3736.json +++ b/2021/3xxx/CVE-2021-3736.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3736", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Fixed in v5.15-rc1" } ] @@ -30,42 +52,22 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995570", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1995570", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995570" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1995570" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3736", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3736", - "url": "https://access.redhat.com/security/cve/CVE-2021-3736" + "name": "https://access.redhat.com/security/cve/CVE-2021-3736" }, { + "url": "https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f", "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f", - "url": "https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information." + "name": "https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f" } ] } diff --git a/2021/3xxx/CVE-2021-3739.json b/2021/3xxx/CVE-2021-3739.json index dd8db59788d..5a9c23cf1ca 100644 --- a/2021/3xxx/CVE-2021-3739.json +++ b/2021/3xxx/CVE-2021-3739.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3739", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires \u2018CAP_SYS_ADMIN\u2019. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 - NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Fixed in v5.15-rc1 and above." } ] @@ -30,57 +52,37 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-476 - NULL Pointer Dereference" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958" }, { + "url": "https://ubuntu.com/security/CVE-2021-3739", "refsource": "MISC", - "name": "https://ubuntu.com/security/CVE-2021-3739", - "url": "https://ubuntu.com/security/CVE-2021-3739" + "name": "https://ubuntu.com/security/CVE-2021-3739" }, { + "url": "https://www.openwall.com/lists/oss-security/2021/08/25/3", "refsource": "MISC", - "name": "https://www.openwall.com/lists/oss-security/2021/08/25/3", - "url": "https://www.openwall.com/lists/oss-security/2021/08/25/3" + "name": "https://www.openwall.com/lists/oss-security/2021/08/25/3" }, { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", "refsource": "MISC", - "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" }, { + "url": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", - "url": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" + "name": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" }, { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20220407-0006/", - "url": "https://security.netapp.com/advisory/ntap-20220407-0006/" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires \u2018CAP_SYS_ADMIN\u2019. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability." + "url": "https://security.netapp.com/advisory/ntap-20220407-0006/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20220407-0006/" } ] } diff --git a/2021/3xxx/CVE-2021-3743.json b/2021/3xxx/CVE-2021-3743.json index c5e4f8370b8..946d80fedbb 100644 --- a/2021/3xxx/CVE-2021-3743.json +++ b/2021/3xxx/CVE-2021-3743.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Read", + "value": "CWE-125 - Out-of-bounds Read", "cweId": "CWE-125" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "Kernel", "version": { "version_data": [ { - "version_value": "0:4.18.0-372.9.1.rt7.166.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-372.9.1.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "Affects linux kernel v5.14.0-rc6 and above." } ] } @@ -58,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" + }, { "url": "https://lists.openwall.net/netdev/2021/08/17/124", "refsource": "MISC", @@ -88,61 +89,11 @@ "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1975", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1975" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1988", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1988" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2021-3743", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3743" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" - }, { "url": "https://security.netapp.com/advisory/ntap-20220407-0007/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20220407-0007/" } ] - }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Active Defense Lab (Venustech) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.2, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3744.json b/2021/3xxx/CVE-2021-3744.json index dc590ea8fc9..711814f7309 100644 --- a/2021/3xxx/CVE-2021-3744.json +++ b/2021/3xxx/CVE-2021-3744.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability." + "value": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Missing Release of Memory after Effective Lifetime", + "value": "CWE-401", "cweId": "CWE-401" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.18.0-372.9.1.rt7.166.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-372.9.1.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "Fixed in v5.15-rc4 and above." } ] } @@ -58,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" + }, { "url": "https://seclists.org/oss-sec/2021/q3/164", "refsource": "MISC", @@ -78,16 +79,6 @@ "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1975", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1975" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1988", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1988" - }, { "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", "refsource": "MISC", @@ -103,16 +94,6 @@ "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2021/09/14/1" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2021-3744", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3744" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/", "refsource": "MISC", @@ -129,29 +110,5 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/" } ] - }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3750.json b/2021/3xxx/CVE-2021-3750.json index e6b2aa56138..6f4455e0985 100644 --- a/2021/3xxx/CVE-2021-3750.json +++ b/2021/3xxx/CVE-2021-3750.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host." + "value": "A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", + "value": "CWE-416", "cweId": "CWE-416" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 9", + "product_name": "QEMU", "version": { "version_data": [ { - "version_value": "17:7.0.0-13.el9", - "version_affected": "!" + "version_affected": "=", + "version_value": "QEMU before version 7.0.0" } ] } @@ -54,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999073", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1999073" + }, { "url": "https://gitlab.com/qemu-project/qemu/-/issues/541", "refsource": "MISC", @@ -69,56 +74,11 @@ "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202208-27" }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:7967", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:7967" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2021-3750", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3750" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999073", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1999073" - }, { "url": "https://security.netapp.com/advisory/ntap-20220624-0003/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20220624-0003/" } ] - }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." - } - ], - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Alexander Bulekov, Gaoning Pan (Zhejiang University), Haoran Qin (Sangfor), Qiuhao Li, Xiao Wei, Xingwei Lin (Ant Security Light-Year Lab), and Zhiniang Peng (Sangfor) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "HIGH", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3754.json b/2021/3xxx/CVE-2021-3754.json index 07ebf9f1f92..aa1918a89b6 100644 --- a/2021/3xxx/CVE-2021-3754.json +++ b/2021/3xxx/CVE-2021-3754.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3754", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 - Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Not-Known" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-20 - Improper Input Validation" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999196", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1999196", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999196" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1999196" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3754", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3754", - "url": "https://access.redhat.com/security/cve/CVE-2021-3754" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password." + "name": "https://access.redhat.com/security/cve/CVE-2021-3754" } ] } diff --git a/2021/3xxx/CVE-2021-3772.json b/2021/3xxx/CVE-2021-3772.json index 5ccaca75b3f..7cc75b3c128 100644 --- a/2021/3xxx/CVE-2021-3772.json +++ b/2021/3xxx/CVE-2021-3772.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Validation of Integrity Check Value", + "value": "CWE-354 - Improper Validation of Integrity Check Value", "cweId": "CWE-354" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.18.0-372.9.1.rt7.166.el8", - "version_affected": "!" - }, - { - "version_value": "0:4.18.0-372.9.1.el8", - "version_affected": "!" + "version_affected": "=", + "version_value": "Fixed in linux kernel v5.15 and above" } ] } @@ -58,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" + }, { "url": "https://ubuntu.com/security/CVE-2021-3772", "refsource": "MISC", @@ -78,16 +79,6 @@ "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1975", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1975" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1988", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1988" - }, { "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", "refsource": "MISC", @@ -98,45 +89,11 @@ "refsource": "MISC", "name": "https://www.debian.org/security/2022/dsa-5096" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2021-3772", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3772" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" - }, { "url": "https://security.netapp.com/advisory/ntap-20221007-0001/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20221007-0001/" } ] - }, - "work_around": [ - { - "lang": "en", - "value": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" >> /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "HIGH", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.1" - } - ] } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3798.json b/2021/3xxx/CVE-2021-3798.json index d48e72ac810..bcdf62b2d02 100644 --- a/2021/3xxx/CVE-2021-3798.json +++ b/2021/3xxx/CVE-2021-3798.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor", + "value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor", "cweId": "CWE-200" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 8", + "product_name": "opencryptoki", "version": { "version_data": [ { - "version_value": "0:3.15.1-6.el8_4", - "version_affected": "!" + "version_affected": "=", + "version_value": "Fixed in v3.17.0" } ] } @@ -54,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990591", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1990591" + }, { "url": "https://access.redhat.com/security/cve/CVE-2021-3798", "refsource": "MISC", @@ -68,40 +73,6 @@ "url": "https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0", "refsource": "MISC", "name": "https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0" - }, - { - "url": "https://access.redhat.com/errata/RHBA-2021:3054", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHBA-2021:3054" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990591", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1990591" - } - ] - }, - "work_around": [ - { - "lang": "en", - "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 5.1, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", - "version": "3.1" } ] } diff --git a/2021/3xxx/CVE-2021-3816.json b/2021/3xxx/CVE-2021-3816.json index 7faf55e55b5..c52e243c036 100644 --- a/2021/3xxx/CVE-2021-3816.json +++ b/2021/3xxx/CVE-2021-3816.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3816", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via \"Copy\" method at user_group_admin.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79", + "cweId": "CWE-79" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "1.1.38" } ] @@ -30,32 +52,12 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://www.cacti.net/info/changelog", "refsource": "MISC", - "name": "https://www.cacti.net/info/changelog", - "url": "https://www.cacti.net/info/changelog" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via \"Copy\" method at user_group_admin.php." + "name": "https://www.cacti.net/info/changelog" } ] } diff --git a/2021/3xxx/CVE-2021-3826.json b/2021/3xxx/CVE-2021-3826.json index cff45dde774..cbef73f7b61 100644 --- a/2021/3xxx/CVE-2021-3826.json +++ b/2021/3xxx/CVE-2021-3826.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3826", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119", + "cweId": "CWE-119" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "gcc 11.2.0" } ] @@ -30,62 +52,42 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-119" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987", "refsource": "MISC", - "name": "https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987", - "url": "https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987" + "name": "https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987" }, { + "url": "https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505", "refsource": "MISC", - "name": "https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505", - "url": "https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505" + "name": "https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-8e1df11a7a", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-affcf9eea6", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-19538a3732", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-c9a1fd5370", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/" + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/" }, { - "refsource": "FEDORA", - "name": "FEDORA-2022-667ee398b1", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol." + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/" } ] } diff --git a/2021/3xxx/CVE-2021-3847.json b/2021/3xxx/CVE-2021-3847.json index 6e3a037e7dd..0d303dc1805 100644 --- a/2021/3xxx/CVE-2021-3847.json +++ b/2021/3xxx/CVE-2021-3847.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3847", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-281", + "cweId": "CWE-281" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "all versions up to, including, kernel 5.17" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-281" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009704", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2009704", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009704" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2009704" }, { + "url": "https://www.openwall.com/lists/oss-security/2021/10/14/3", "refsource": "MISC", - "name": "https://www.openwall.com/lists/oss-security/2021/10/14/3", - "url": "https://www.openwall.com/lists/oss-security/2021/10/14/3" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system." + "name": "https://www.openwall.com/lists/oss-security/2021/10/14/3" } ] } diff --git a/2021/3xxx/CVE-2021-3856.json b/2021/3xxx/CVE-2021-3856.json index db1a01be9d3..04311c4331a 100644 --- a/2021/3xxx/CVE-2021-3856.json +++ b/2021/3xxx/CVE-2021-3856.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3856", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552 - Files or Directories Accessible to External Parties", + "cweId": "CWE-552" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Fixed in 15.1.0" } ] @@ -30,52 +52,32 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-552 - Files or Directories Accessible to External Parties" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://issues.redhat.com/browse/KEYCLOAK-19422", "refsource": "MISC", - "name": "https://issues.redhat.com/browse/KEYCLOAK-19422", - "url": "https://issues.redhat.com/browse/KEYCLOAK-19422" + "name": "https://issues.redhat.com/browse/KEYCLOAK-19422" }, { + "url": "https://github.com/keycloak/keycloak/pull/8588", "refsource": "MISC", - "name": "https://github.com/keycloak/keycloak/pull/8588", - "url": "https://github.com/keycloak/keycloak/pull/8588" + "name": "https://github.com/keycloak/keycloak/pull/8588" }, { + "url": "https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743", "refsource": "MISC", - "name": "https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743", - "url": "https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743" + "name": "https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010164", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2010164", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010164" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2010164" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3856", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3856", - "url": "https://access.redhat.com/security/cve/CVE-2021-3856" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available." + "name": "https://access.redhat.com/security/cve/CVE-2021-3856" } ] } diff --git a/2021/3xxx/CVE-2021-3859.json b/2021/3xxx/CVE-2021-3859.json index 7647925359f..c09873a6902 100644 --- a/2021/3xxx/CVE-2021-3859.json +++ b/2021/3xxx/CVE-2021-3859.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3859", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-214 - Invocation of Process Using Visible Sensitive Information", + "cweId": "CWE-214" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Fixed in 2.2.15.Final" } ] @@ -30,57 +52,37 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-214 - Invocation of Process Using Visible Sensitive Information" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { + "url": "https://issues.redhat.com/browse/UNDERTOW-1979", "refsource": "MISC", - "name": "https://issues.redhat.com/browse/UNDERTOW-1979", - "url": "https://issues.redhat.com/browse/UNDERTOW-1979" + "name": "https://issues.redhat.com/browse/UNDERTOW-1979" }, { + "url": "https://github.com/undertow-io/undertow/pull/1296", "refsource": "MISC", - "name": "https://github.com/undertow-io/undertow/pull/1296", - "url": "https://github.com/undertow-io/undertow/pull/1296" + "name": "https://github.com/undertow-io/undertow/pull/1296" }, { + "url": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2", "refsource": "MISC", - "name": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2", - "url": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2" + "name": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3859", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3859", - "url": "https://access.redhat.com/security/cve/CVE-2021-3859" + "name": "https://access.redhat.com/security/cve/CVE-2021-3859" }, { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20221201-0004/", - "url": "https://security.netapp.com/advisory/ntap-20221201-0004/" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks." + "url": "https://security.netapp.com/advisory/ntap-20221201-0004/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20221201-0004/" } ] } diff --git a/2021/3xxx/CVE-2021-3864.json b/2021/3xxx/CVE-2021-3864.json index a3c74aaf054..4f34a3ad30a 100644 --- a/2021/3xxx/CVE-2021-3864.json +++ b/2021/3xxx/CVE-2021-3864.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3864", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 - Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Not Known" } ] @@ -30,62 +52,42 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-284 - Improper Access Control" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://www.openwall.com/lists/oss-security/2021/10/20/2", "refsource": "MISC", - "name": "https://www.openwall.com/lists/oss-security/2021/10/20/2", - "url": "https://www.openwall.com/lists/oss-security/2021/10/20/2" + "name": "https://www.openwall.com/lists/oss-security/2021/10/20/2" }, { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015046", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2015046", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015046" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2015046" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3864", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3864", - "url": "https://access.redhat.com/security/cve/CVE-2021-3864" + "name": "https://access.redhat.com/security/cve/CVE-2021-3864" }, { + "url": "https://security-tracker.debian.org/tracker/CVE-2021-3864", "refsource": "MISC", - "name": "https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com/", - "url": "https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com/" + "name": "https://security-tracker.debian.org/tracker/CVE-2021-3864" }, { + "url": "https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/", "refsource": "MISC", - "name": "https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com/", - "url": "https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com/" + "name": "https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/" }, { + "url": "https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/", "refsource": "MISC", - "name": "https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/", - "url": "https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/" + "name": "https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/" }, { + "url": "https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/", "refsource": "MISC", - "name": "https://security-tracker.debian.org/tracker/CVE-2021-3864", - "url": "https://security-tracker.debian.org/tracker/CVE-2021-3864" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges." + "name": "https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/" } ] } diff --git a/2021/3xxx/CVE-2021-3914.json b/2021/3xxx/CVE-2021-3914.json index 838ede5a7f9..1dbd42dc44a 100644 --- a/2021/3xxx/CVE-2021-3914.json +++ b/2021/3xxx/CVE-2021-3914.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3914", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "Not-Known" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018015", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2018015", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018015" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2018015" }, { + "url": "https://access.redhat.com/security/cve/CVE-2021-3914", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2021-3914", - "url": "https://access.redhat.com/security/cve/CVE-2021-3914" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks." + "name": "https://access.redhat.com/security/cve/CVE-2021-3914" } ] } diff --git a/2021/3xxx/CVE-2021-3979.json b/2021/3xxx/CVE-2021-3979.json index 7dbe782bc41..f1121af0b2f 100644 --- a/2021/3xxx/CVE-2021-3979.json +++ b/2021/3xxx/CVE-2021-3979.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "Use of a Cryptographic Primitive with a Risky Implementation", - "cweId": "CWE-1240" + "value": "CWE-327 - Use of a Broken or Risky Cryptographic Algorithm", + "cweId": "CWE-327" } ] } @@ -32,27 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Ceph Storage 4.3", + "product_name": "ceph", "version": { "version_data": [ { - "version_value": "2:14.2.22-110.el8cp", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Ceph Storage 5.1", - "version": { - "version_data": [ - { - "version_value": "2:16.2.7-98.el8cp", - "version_affected": "!" + "version_affected": "=", + "version_value": "Not-Known" } ] } @@ -65,6 +54,11 @@ }, "references": { "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788" + }, { "url": "https://access.redhat.com/security/cve/CVE-2021-3979", "refsource": "MISC", @@ -85,50 +79,11 @@ "refsource": "MISC", "name": "https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656" }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1716", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1716" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2022:1174", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2022:1174" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788" - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/" } ] - }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Mark Kirkwood (Catalyst Cloud) for reporting this issue." - } - ], - "impact": { - "cvss": [ - { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "version": "3.1" - } - ] } } \ No newline at end of file