mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ea9229ad76
commit
4312300601
@ -178,6 +178,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
|
||||
"url": "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2020-10",
|
||||
"url": "https://www.tenable.com/security/tns-2020-10"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://docs.cpanel.net/changelogs/90-change-log/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://docs.cpanel.net/changelogs/90-change-log/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://news.cpanel.com/cpanel-tsr-2020-0007-full-disclosure/",
|
||||
"url": "https://news.cpanel.com/cpanel-tsr-2020-0007-full-disclosure/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -10,6 +10,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kubernetes",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -17,15 +18,13 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.19.3"
|
||||
"version_value": "< 1.19.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kubernetes"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -43,7 +42,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log."
|
||||
"value": "In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -10,6 +10,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kubernetes",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -17,23 +18,19 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.19.3"
|
||||
"version_value": "< 1.19.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.18.10"
|
||||
"version_value": "< 1.18.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.17.13"
|
||||
"version_value": "< 1.17.13"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kubernetes"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -51,7 +48,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials."
|
||||
"value": "In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -88,15 +85,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95622",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
|
||||
},
|
||||
{
|
||||
"name": "Multiple secret leaks when verbose logging is enabled",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95622",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -10,6 +10,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kubernetes",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -17,27 +18,22 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "1.19.3"
|
||||
"version_value": "<= 1.19.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "1.18.10"
|
||||
"version_value": "<= 1.18.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "1.17.13"
|
||||
"version_value": "<= 1.17.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.20.0-alpha2"
|
||||
"version_value": "< 1.20.0-alpha2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kubernetes"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,7 +51,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl."
|
||||
"value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -92,15 +88,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95623",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95623"
|
||||
},
|
||||
{
|
||||
"name": "Multiple secret leaks when verbose logging is enabled",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95623",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95623"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -10,6 +10,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kubernetes",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -17,23 +18,19 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.19.3"
|
||||
"version_value": "< 1.19.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.18.10"
|
||||
"version_value": "< 1.18.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "1.17.13"
|
||||
"version_value": "< 1.17.13"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kubernetes"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -51,7 +48,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims."
|
||||
"value": "In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -88,15 +85,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95624",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95624"
|
||||
},
|
||||
{
|
||||
"name": "Multiple secret leaks when verbose logging is enabled",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kubernetes/kubernetes/issues/95624",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/95624"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user