"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:05:00 +00:00
parent 949015dd7a
commit 43fb1b7a80
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
70 changed files with 3212 additions and 8769 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2063 samba: memory corruption vulnerability"
"value": "Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,75 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 3",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.0.9-1.3E.17",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-0.19.el4_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4.7 Z Stream",
"version": {
"version_data": [
{
"version_value": "0:3.0.28-0.10.el4_7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.29.el5_5",
"version_affected": "!"
},
{
"version_value": "0:3.3.8-0.52.el5_5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.3.Z - Server Only",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.7.el5_3.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.4.Z - Server Only",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.15.el5_4.2",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -263,21 +203,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3063"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0488",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0488"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2063",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2063"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601419",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601419"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59481",
"refsource": "MISC",
@ -299,30 +224,5 @@
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2064",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "rpcbind",
"product": {
"product_data": [
{
"product_name": "rpcbind",
"version": {
"version_data": [
{
"version_value": "0.2.0"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "rpcbind",
"product": {
"product_data": [
{
"product_name": "rpcbind",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.2.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2064",
"url": "https://access.redhat.com/security/cve/cve-2010-2064",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2064"
"name": "https://access.redhat.com/security/cve/cve-2010-2064"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2064",
@ -63,14 +64,14 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2064"
},
{
"url": "https://access.redhat.com/security/cve/cve-2010-2064",
"url": "https://security-tracker.debian.org/tracker/CVE-2010-2064",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2010-2064"
"name": "https://security-tracker.debian.org/tracker/CVE-2010-2064"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20100608 CVE Request -- rpcbind -- Insecure (predictable) temporary file use",
"url": "https://www.openwall.com/lists/oss-security/2010/06/08/3"
"url": "https://www.openwall.com/lists/oss-security/2010/06/08/3",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2010/06/08/3"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2065",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "40181",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40181"
},
{
"name": "http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010"
},
{
"name": "[oss-security] 20100623 CVE requests: LibTIFF",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=127731610612908&w=2"
},
{
"name": "ADV-2010-1638",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1638"
},
{
"name": "SSA:2010-180-02",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424"
},
{
"name": "ADV-2011-0621",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0621"
},
{
"name": "USN-954-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-954-1"
},
{
"name": "GLSA-201209-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-02.xml"
},
{
"name": "ADV-2011-0204",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0204"
},
{
"name": "http://www.remotesensing.org/libtiff/v3.9.3.html",
"url": "http://secunia.com/advisories/50726",
"refsource": "MISC",
"url": "http://www.remotesensing.org/libtiff/v3.9.3.html"
"name": "http://secunia.com/advisories/50726"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601274",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601274"
"url": "http://security.gentoo.org/glsa/glsa-201209-02.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201209-02.xml"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565"
"url": "http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010",
"refsource": "MISC",
"name": "http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010"
},
{
"name": "MDVSA-2011:043",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:043"
"url": "http://marc.info/?l=oss-security&m=127731610612908&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=oss-security&m=127731610612908&w=2"
},
{
"name": "40381",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40381"
"url": "http://secunia.com/advisories/40181",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40181"
},
{
"name": "50726",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50726"
"url": "http://secunia.com/advisories/40381",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40381"
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424",
"refsource": "MISC",
"name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:043",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:043"
},
{
"url": "http://www.remotesensing.org/libtiff/v3.9.3.html",
"refsource": "MISC",
"name": "http://www.remotesensing.org/libtiff/v3.9.3.html"
},
{
"url": "http://www.ubuntu.com/usn/USN-954-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-954-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1638",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1638"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0204",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0204"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0621",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0621"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601274",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601274"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2066",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0610",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43315"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "SUSE-SA:2010:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name": "[oss-security] 20100607 CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/07/1"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72"
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "43315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43315"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html"
},
{
"name": "[oss-security] 20100609 Re: CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/09/1"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601006",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601006"
"url": "http://www.openwall.com/lists/oss-security/2010/06/07/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/07/1"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
"url": "http://www.openwall.com/lists/oss-security/2010/06/09/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/09/1"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601006",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601006"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2067 libtiff: SubjectDistance EXIF tag reading stack based buffer overflow"
"value": "Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -119,41 +118,11 @@
"refsource": "MISC",
"name": "http://www.remotesensing.org/libtiff/v3.9.4.html"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2067",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2067"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=599576",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=599576"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2068",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,217 +27,236 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2010-1436",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1436"
"url": "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource": "MISC",
"name": "http://httpd.apache.org/security/vulnerabilities_22.html"
},
{
"name": "[httpd-announce] 20100611 [advisory] httpd Timeout detection flaw (mod_proxy_http) CVE-2010-2068",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201006.mbox/%3C4C12933D.4060400@apache.org%3E"
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:6931",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6931"
"url": "http://marc.info/?l=apache-announce&m=128009718610929&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=apache-announce&m=128009718610929&w=2"
},
{
"name": "40824",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40824"
"url": "http://support.apple.com/kb/HT4581",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4581"
},
{
"name": "oval:org.mitre.oval:def:11491",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11491"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
},
{
"name": "20100611 [advisory] httpd Timeout detection flaw (mod_proxy_http) CVE-2010-2068",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/511809/100/0/threaded"
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "41722",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41722"
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "SI4053",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=nas352ca0ac9460f9b8886257777005dd0e4"
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "41490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41490"
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[apache-announce] 20100725 [ANNOUNCEMENT] Apache HTTP Server 2.2.16 Released",
"refsource": "MLIST",
"url": "http://marc.info/?l=apache-announce&m=128009718610929&w=2"
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "HPSBMA02568",
"refsource": "HP",
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"
"url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "PM16366",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM16366"
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "1024096",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024096"
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://httpd.apache.org/security/vulnerabilities_22.html",
"refsource": "CONFIRM",
"url": "http://httpd.apache.org/security/vulnerabilities_22.html"
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "40206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40206"
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name": "apache-modproxyhttp-timeout-info-disc(59413)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59413"
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "RHSA-2011:0896",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "SSRT100219",
"refsource": "HP",
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
},
{
"name": "41480",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41480"
"url": "http://secunia.com/advisories/41480",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41480"
},
{
"name": "http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch"
"url": "http://secunia.com/advisories/41490",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41490"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"refsource": "MISC",
"name": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"
},
{
"name": "40827",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40827"
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201006.mbox/%3C4C12933D.4060400%40apache.org%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201006.mbox/%3C4C12933D.4060400%40apache.org%3E"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
"url": "http://secunia.com/advisories/40206",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40206"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
"url": "http://secunia.com/advisories/40824",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40824"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
"url": "http://secunia.com/advisories/41722",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41722"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
"url": "http://securitytracker.com/id?1024096",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024096"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
"url": "http://www-01.ibm.com/support/docview.wss?uid=nas352ca0ac9460f9b8886257777005dd0e4",
"refsource": "MISC",
"name": "http://www-01.ibm.com/support/docview.wss?uid=nas352ca0ac9460f9b8886257777005dd0e4"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch",
"refsource": "MISC",
"name": "http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch",
"refsource": "MISC",
"name": "http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM16366",
"refsource": "MISC",
"name": "http://www.ibm.com/support/docview.wss?uid=swg1PM16366"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.securityfocus.com/archive/1/511809/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/511809/100/0/threaded"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.securityfocus.com/bid/40827",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40827"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
"url": "http://www.vupen.com/english/advisories/2010/1436",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1436"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59413",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59413"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json",
"url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E"
"url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11491",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11491"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6931",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6931"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2070",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2010:0610",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
},
{
"name": "http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb",
"url": "http://secunia.com/advisories/43315",
"refsource": "MISC",
"url": "http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb"
"name": "http://secunia.com/advisories/43315"
},
{
"name": "[oss-security] 20100611 CVE-2010-2070 kernel-xen: ia64-xen: unset be from the task psr",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/10/2"
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
},
{
"name": "65541",
"refsource": "OSVDB",
"url": "http://osvdb.org/65541"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
},
{
"name": "40776",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40776"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
},
{
"name": "43315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43315"
"url": "http://osvdb.org/65541",
"refsource": "MISC",
"name": "http://osvdb.org/65541"
},
{
"name": "xen-faults-dos(59373)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59373"
"url": "http://www.openwall.com/lists/oss-security/2010/06/10/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/10/2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
"url": "http://www.securityfocus.com/bid/40776",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40776"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=586415",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=586415"
"url": "http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb",
"refsource": "MISC",
"name": "http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb"
},
{
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59373",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59373"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=586415",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=586415"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2071",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=2f26afba",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=2f26afba"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=2f26afba",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=2f26afba"
},
{
"name": "[linux-kernel] 20100518 [PATCH] btrfs: should add a permission check for setfacl",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/5/17/544"
"url": "http://lkml.org/lkml/2010/5/17/544",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/5/17/544"
},
{
"name": "[oss-security] 20100614 Re: CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/14/2"
"url": "http://www.openwall.com/lists/oss-security/2010/06/11/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/11/3"
},
{
"name": "[oss-security] 20100611 CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/11/3"
"url": "http://www.openwall.com/lists/oss-security/2010/06/14/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/14/2"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2074",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100614 CVE Request: w3m does not check null bytes CN/subjAltName",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/14/4"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "40134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40134"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044401.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044401.html"
},
{
"name": "65538",
"refsource": "OSVDB",
"url": "http://osvdb.org/65538"
"url": "http://osvdb.org/65538",
"refsource": "MISC",
"name": "http://osvdb.org/65538"
},
{
"name": "1024252",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024252"
"url": "http://secunia.com/advisories/40134",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40134"
},
{
"name": "ADV-2010-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1467"
"url": "http://secunia.com/advisories/40733",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40733"
},
{
"name": "ADV-2010-1879",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1879"
"url": "http://www.openwall.com/lists/oss-security/2010/06/14/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/06/14/4"
},
{
"name": "ADV-2010-1928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1928"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0565.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0565.html"
},
{
"name": "SUSE-SR:2010:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
"url": "http://www.securityfocus.com/bid/40837",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/40837"
},
{
"name": "RHSA-2010:0565",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0565.html"
"url": "http://www.securitytracker.com/id?1024252",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024252"
},
{
"name": "40837",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/40837"
"url": "http://www.vupen.com/english/advisories/2010/1467",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1467"
},
{
"name": "40733",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40733"
"url": "http://www.vupen.com/english/advisories/2010/1879",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1879"
},
{
"name": "FEDORA-2010-10369",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044401.html"
"url": "http://www.vupen.com/english/advisories/2010/1928",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/1928"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2076",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42492"
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E"
},
{
"name": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html"
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E"
},
{
"name": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf"
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E"
},
{
"name": "41025",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41025"
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E"
},
{
"name": "http://geronimo.apache.org/22x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/22x-security-report.html"
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E"
},
{
"name": "41016",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41016"
"url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html",
"refsource": "MISC",
"name": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html"
},
{
"name": "https://issues.apache.org/jira/browse/GERONIMO-5383",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/GERONIMO-5383"
"url": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "MISC",
"name": "http://geronimo.apache.org/21x-security-report.html"
},
{
"name": "[cxf-users] 20100616 Important - Apache CXF security advisory CVE-2010-2076",
"refsource": "MLIST",
"url": "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html"
"url": "http://geronimo.apache.org/22x-security-report.html",
"refsource": "MISC",
"name": "http://geronimo.apache.org/22x-security-report.html"
},
{
"name": "http://geronimo.apache.org/21x-security-report.html",
"refsource": "CONFIRM",
"url": "http://geronimo.apache.org/21x-security-report.html"
"url": "http://secunia.com/advisories/40969",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40969"
},
{
"name": "40969",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40969"
"url": "http://secunia.com/advisories/41016",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41016"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E"
"url": "http://secunia.com/advisories/41025",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41025"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E"
"url": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf",
"refsource": "MISC",
"name": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E"
"url": "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html",
"refsource": "MISC",
"name": "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E"
"url": "http://www.securityfocus.com/bid/42492",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42492"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
"url": "https://issues.apache.org/jira/browse/GERONIMO-5383",
"refsource": "MISC",
"name": "https://issues.apache.org/jira/browse/GERONIMO-5383"
},
{
"refsource": "MLIST",
"name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4180",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,282 +27,281 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "SUSE-SR:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"
},
{
"name": "1024822",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024822"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"
},
{
"name": "42473",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42473"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
},
{
"name": "42571",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42571"
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
},
{
"name": "43170",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43170"
"url": "http://support.apple.com/kb/HT4723",
"refsource": "MISC",
"name": "http://support.apple.com/kb/HT4723"
},
{
"name": "SSA:2010-340-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "ADV-2011-0268",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0268"
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777",
"refsource": "MISC",
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"
},
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
"url": "http://marc.info/?l=bugtraq&m=130497251507577&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=130497251507577&w=2"
},
{
"name": "http://support.apple.com/kb/HT4723",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4723"
"url": "http://secunia.com/advisories/44269",
"refsource": "MISC",
"name": "http://secunia.com/advisories/44269"
},
{
"name": "SUSE-SU-2011:0847",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"
"url": "http://www.kb.cert.org/vuls/id/737740",
"refsource": "MISC",
"name": "http://www.kb.cert.org/vuls/id/737740"
},
{
"name": "42493",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42493"
"url": "http://marc.info/?l=bugtraq&m=129916880600544&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=129916880600544&w=2"
},
{
"name": "43173",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43173"
"url": "http://openssl.org/news/secadv_20101202.txt",
"refsource": "MISC",
"name": "http://openssl.org/news/secadv_20101202.txt"
},
{
"name": "FEDORA-2010-18765",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html"
"url": "http://secunia.com/advisories/42469",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42469"
},
{
"name": "ADV-2011-0032",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0032"
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471",
"refsource": "MISC",
"name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471"
},
{
"name": "openSUSE-SU-2011:0845",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"
"url": "http://www.vupen.com/english/advisories/2010/3120",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3120"
},
{
"name": "43171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43171"
"url": "http://www.vupen.com/english/advisories/2010/3122",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3122"
},
{
"name": "42620",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42620"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
},
{
"name": "SSRT100817",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/522176"
"url": "http://secunia.com/advisories/42877",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42877"
},
{
"name": "APPLE-SA-2011-06-23-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
"url": "http://www.vupen.com/english/advisories/2011/0076",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0076"
},
{
"name": "USN-1029-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1029-1"
"url": "http://marc.info/?l=bugtraq&m=132077688910227&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=132077688910227&w=2"
},
{
"name": "ADV-2010-3120",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3120"
"url": "http://secunia.com/advisories/42811",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42811"
},
{
"name": "FEDORA-2010-18736",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html"
"url": "http://www.debian.org/security/2011/dsa-2141",
"refsource": "MISC",
"name": "http://www.debian.org/security/2011/dsa-2141"
},
{
"name": "ADV-2010-3122",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3122"
"url": "http://www.securityfocus.com/archive/1/522176",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/522176"
},
{
"name": "43169",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43169"
"url": "http://www.vupen.com/english/advisories/2011/0032",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0032"
},
{
"name": "43172",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43172"
"url": "http://cvs.openssl.org/chngview?cn=20131",
"refsource": "MISC",
"name": "http://cvs.openssl.org/chngview?cn=20131"
},
{
"name": "HPSBHF02706",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132077688910227&w=2"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html"
},
{
"name": "45164",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45164"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html"
},
{
"name": "69565",
"refsource": "OSVDB",
"url": "http://osvdb.org/69565"
"url": "http://osvdb.org/69565",
"refsource": "MISC",
"name": "http://osvdb.org/69565"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659462",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
"url": "http://secunia.com/advisories/42473",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42473"
},
{
"name": "VU#737740",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/737740"
"url": "http://secunia.com/advisories/42493",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42493"
},
{
"name": "42469",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42469"
"url": "http://secunia.com/advisories/42571",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42571"
},
{
"name": "HPSBMU02759",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/522176"
"url": "http://secunia.com/advisories/42620",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42620"
},
{
"name": "SSRT100475",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130497251507577&w=2"
"url": "http://secunia.com/advisories/43169",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43169"
},
{
"name": "42877",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42877"
"url": "http://secunia.com/advisories/43170",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43170"
},
{
"name": "http://cvs.openssl.org/chngview?cn=20131",
"refsource": "CONFIRM",
"url": "http://cvs.openssl.org/chngview?cn=20131"
"url": "http://secunia.com/advisories/43171",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43171"
},
{
"name": "RHSA-2010:0977",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
"url": "http://secunia.com/advisories/43172",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43172"
},
{
"name": "HPSBMA02658",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"
"url": "http://secunia.com/advisories/43173",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43173"
},
{
"name": "SSRT100413",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"
"url": "http://ubuntu.com/usn/usn-1029-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1029-1"
},
{
"name": "ADV-2010-3134",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3134"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:248",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:248"
},
{
"name": "ADV-2010-3188",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3188"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
},
{
"name": "oval:org.mitre.oval:def:18910",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0978.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0978.html"
},
{
"name": "HPSBUX02638",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129916880600544&w=2"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0979.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0979.html"
},
{
"name": "ADV-2011-0076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0076"
"url": "http://www.securityfocus.com/bid/45164",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45164"
},
{
"name": "http://openssl.org/news/secadv_20101202.txt",
"refsource": "CONFIRM",
"url": "http://openssl.org/news/secadv_20101202.txt"
"url": "http://www.securitytracker.com/id?1024822",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024822"
},
{
"name": "RHSA-2010:0978",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0978.html"
"url": "http://www.vupen.com/english/advisories/2010/3134",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3134"
},
{
"name": "44269",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44269"
"url": "http://www.vupen.com/english/advisories/2010/3188",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3188"
},
{
"name": "RHSA-2011:0896",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
"url": "http://www.vupen.com/english/advisories/2011/0268",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0268"
},
{
"name": "DSA-2141",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2141"
"url": "https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST",
"refsource": "MISC",
"name": "https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST"
},
{
"name": "HPSBOV02670",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130497251507577&w=2"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910"
},
{
"name": "SSRT100613",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132077688910227&w=2"
},
{
"name": "SSRT100339",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=129916880600544&w=2"
},
{
"name": "MDVSA-2010:248",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:248"
},
{
"name": "RHSA-2010:0979",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0979.html"
},
{
"name": "https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST",
"refsource": "CONFIRM",
"url": "https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST"
},
{
"name": "42811",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42811"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4238",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information."
"value": "The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517",
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"url": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517"
"name": "http://secunia.com/advisories/46397"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=655623",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "RHSA-2011:0017",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
"url": "http://secunia.com/advisories/42884",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42884"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517",
"refsource": "MISC",
"name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517"
},
{
"name": "42884",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42884"
"url": "http://www.securityfocus.com/bid/45795",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45795"
},
{
"name": "45795",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45795"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64698",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64698"
},
{
"name": "xen-vdbcreate-dos(64698)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64698"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=655623"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4242",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,131 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42789"
},
{
"name": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773"
},
{
"name": "ADV-2011-0024",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"name": "RHSA-2011:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "kernel-hciuartttyopen-dos(64617)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64617"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "45014",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45014"
},
{
"name": "42963",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42963"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=641410",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "42890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42890"
},
{
"name": "RHSA-2011:0162",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
},
{
"name": "[linux-kernel] 20101007 Peculiar stuff in hci_ath3k/badness in hci_uart",
"refsource": "MLIST",
"url": "https://lkml.org/lkml/2010/10/7/255"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "ADV-2011-0168",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0168"
},
{
"name": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/",
"url": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"url": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/"
"name": "http://secunia.com/advisories/42890"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"url": "http://secunia.com/advisories/42789",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42789"
},
{
"url": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43291"
},
{
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0024",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"url": "http://secunia.com/advisories/42963",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42963"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0168",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0168"
},
{
"url": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773",
"refsource": "MISC",
"name": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773"
},
{
"url": "http://www.securityfocus.com/bid/45014",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45014"
},
{
"url": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/",
"refsource": "MISC",
"name": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64617",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64617"
},
{
"url": "https://lkml.org/lkml/2010/10/7/255",
"refsource": "MISC",
"name": "https://lkml.org/lkml/2010/10/7/255"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=641410"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4243",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,102 +27,126 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20101122 CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/22/6"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "RHSA-2011:0017",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625688",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688"
},
{
"name": "linux-kernel-execve-dos(64700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64700"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/378"
},
{
"name": "15619",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15619"
},
{
"name": "[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer",
"refsource": "MLIST",
"url": "http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html"
},
{
"name": "[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2010/11/22/15"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "42884",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42884"
},
{
"name": "[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/27/429"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/138"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c77f845722158206a7209c45ccddc264d19319c"
},
{
"name": "http://grsecurity.net/~spender/64bit_dos.c",
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"url": "http://grsecurity.net/~spender/64bit_dos.c"
"name": "http://secunia.com/advisories/46397"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/29/206"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "45004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45004"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"url": "http://secunia.com/advisories/42884",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42884"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c"
},
{
"url": "http://grsecurity.net/~spender/64bit_dos.c",
"refsource": "MISC",
"name": "http://grsecurity.net/~spender/64bit_dos.c"
},
{
"url": "http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html",
"refsource": "MISC",
"name": "http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html"
},
{
"url": "http://lkml.org/lkml/2010/8/27/429",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/27/429"
},
{
"url": "http://lkml.org/lkml/2010/8/29/206",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/29/206"
},
{
"url": "http://lkml.org/lkml/2010/8/30/138",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/30/138"
},
{
"url": "http://lkml.org/lkml/2010/8/30/378",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/30/378"
},
{
"url": "http://openwall.com/lists/oss-security/2010/11/22/15",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/22/15"
},
{
"url": "http://openwall.com/lists/oss-security/2010/11/22/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2010/11/22/6"
},
{
"url": "http://www.exploit-db.com/exploits/15619",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15619"
},
{
"url": "http://www.securityfocus.com/bid/45004",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45004"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64700",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64700"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625688"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4247",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The do_block_io_op function in (1) drivers/xen/blkback/blkback.c and (2) drivers/xen/blktap/blktap.c in Xen before 3.4.0 for the Linux kernel 2.6.18, and possibly other versions, allows guest OS users to cause a denial of service (infinite loop and CPU consumption) via a large production request index to the blkback or blktap back-end drivers. NOTE: some of these details are obtained from third party information."
"value": "The do_block_io_op function in (1) drivers/xen/blkback/blkback.c and (2) drivers/xen/blktap/blktap.c in Xen before 3.4.0 for the Linux kernel 2.6.18, and possibly other versions, allows guest OS users to cause a denial of service (infinite loop and CPU consumption) via a large production request index to the blkback or blktap back-end drivers. NOTE: some of these details are obtained from third party information."
}
]
},
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42789"
},
{
"name": "ADV-2011-0024",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"name": "RHSA-2011:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "45029",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45029"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
},
{
"name": "35093",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35093"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656206",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656206"
},
{
"name": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d",
"url": "http://secunia.com/advisories/42789",
"refsource": "MISC",
"url": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d"
"name": "http://secunia.com/advisories/42789"
},
{
"name": "[oss-security] 20101123 CVE request: xen: request-processing loop is unbounded in blkback",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/23/1"
},
{
"name": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c",
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"url": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c"
"name": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "[oss-security] 20101124 Re: CVE request: xen: request-processing loop is unbounded in blkback",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/8"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0024",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"url": "http://secunia.com/advisories/35093",
"refsource": "MISC",
"name": "http://secunia.com/advisories/35093"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/11/23/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/23/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/24/8"
},
{
"url": "http://www.securityfocus.com/bid/45029",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45029"
},
{
"url": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c",
"refsource": "MISC",
"name": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c"
},
{
"url": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d",
"refsource": "MISC",
"name": "http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656206",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656206"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4248",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42789"
"url": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42890"
},
{
"name": "ADV-2011-0024",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0024"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "RHSA-2011:0004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://secunia.com/advisories/42789",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42789"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0004.html"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "45028",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45028"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/9"
"url": "http://www.vupen.com/english/advisories/2011/0024",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0024"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2"
},
{
"name": "42890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42890"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0a70217107e6f9844628120412cb27bb4cea194",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0a70217107e6f9844628120412cb27bb4cea194"
"url": "http://www.openwall.com/lists/oss-security/2010/11/23/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/23/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656264",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264"
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/24/9"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
"url": "http://www.securityfocus.com/bid/45028",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45028"
},
{
"name": "[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/23/2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656264"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4249",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,122 +27,146 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42354"
"url": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42890"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
},
{
"name": "[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/10"
"url": "http://secunia.com/advisories/42745",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42745"
},
{
"name": "FEDORA-2010-18983",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "45037",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45037"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "[oss-security] 20101124 CVE request: kernel: unix socket local dos",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/2"
"url": "http://www.vupen.com/english/advisories/2010/3321",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3321"
},
{
"name": "[linux-kernel] 20101123 Unix socket local DOS (OOM)",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/11/23/395"
"url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656756",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756"
"url": "http://lkml.org/lkml/2010/11/23/395",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/11/23/395"
},
{
"name": "ADV-2010-3321",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3321"
"url": "http://lkml.org/lkml/2010/11/23/450",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/11/23/450"
},
{
"name": "42963",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42963"
"url": "http://lkml.org/lkml/2010/11/25/8",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/11/25/8"
},
{
"name": "[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :(",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/11/25/8"
"url": "http://marc.info/?l=linux-netdev&m=129059035929046&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-netdev&m=129059035929046&w=2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://secunia.com/advisories/42354",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42354"
},
{
"name": "[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-netdev&m=129059035929046&w=2"
"url": "http://secunia.com/advisories/42963",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42963"
},
{
"name": "42890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42890"
"url": "http://www.exploit-db.com/exploits/15622/",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/15622/"
},
{
"name": "RHSA-2011:0162",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=9915672d41273f5b77f1b3c29b391ffb7732b84b",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=9915672d41273f5b77f1b3c29b391ffb7732b84b"
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/24/10"
},
{
"name": "15622",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15622/"
"url": "http://www.openwall.com/lists/oss-security/2010/11/24/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/11/24/2"
},
{
"name": "ADV-2011-0168",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0168"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0162.html"
},
{
"name": "42745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42745"
"url": "http://www.securityfocus.com/bid/45037",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/45037"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2"
"url": "http://www.vupen.com/english/advisories/2011/0168",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0168"
},
{
"name": "[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/11/23/450"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656756"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4250 kernel: inotify memory leak"
"value": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Missing Release of Memory after Effective Lifetime",
"cweId": "CWE-401"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.33.7-rt29.55.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-71.29.1.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -65,21 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2011:0330",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0330"
},
{
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0498",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0498"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab",
"refsource": "MISC",
@ -91,44 +69,14 @@
"name": "http://www.openwall.com/lists/oss-security/2010/11/24/11"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4250",
"url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4250"
"name": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=656830"
},
{
"url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-4251",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "[netdev] 20100302 [PATCH 1/8] net: add limit for socket backlog",
"refsource": "MLIST",
"url": "http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46637",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46637"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8eae939f1400326b06d0c9afe53d2a484a326871",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8eae939f1400326b06d0c9afe53d2a484a326871"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34"
"url": "http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread",
"refsource": "MISC",
"name": "http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=657303",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=657303"
"url": "http://www.securityfocus.com/bid/46637",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46637"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8eae939f1400326b06d0c9afe53d2a484a326871",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8eae939f1400326b06d0c9afe53d2a484a326871"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=657303",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=657303"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-4252 openssl: session key retrieval flaw in J-PAKE implementation"
"value": "OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Access Control",
"cweId": "CWE-284"
"value": "n/a"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -119,16 +118,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3122"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-4252",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-4252"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659297",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659297"
},
{
"url": "https://github.com/seb-m/jpake",
"refsource": "MISC",
@ -138,31 +127,11 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659297",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659297"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3598",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2011-13805",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067843.html"
"url": "http://freshmeat.net/projects/phppgadmin/releases/336969",
"refsource": "MISC",
"name": "http://freshmeat.net/projects/phppgadmin/releases/336969"
},
{
"name": "46426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46426"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067843.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067843.html"
},
{
"name": "[phppgadmin-news] 20111003 [ppa-news] phpPgAdmin 5.0.3 released",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067846.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067846.html"
},
{
"name": "openSUSE-SU-2012:0493",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068009.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068009.html"
},
{
"name": "https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842",
"refsource": "CONFIRM",
"url": "https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842"
"url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html"
},
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=385505",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=385505"
"url": "http://osvdb.org/75997",
"refsource": "MISC",
"name": "http://osvdb.org/75997"
},
{
"name": "46248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46248"
"url": "http://osvdb.org/75998",
"refsource": "MISC",
"name": "http://osvdb.org/75998"
},
{
"name": "75998",
"refsource": "OSVDB",
"url": "http://osvdb.org/75998"
"url": "http://secunia.com/advisories/46248",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46248"
},
{
"name": "FEDORA-2011-13801",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/067846.html"
"url": "http://secunia.com/advisories/46426",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46426"
},
{
"name": "[oss-security] 20111004 Re: CVE Request -- phpPgAdmin -- Multiple XSS flaws fixed in v5.0.3",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/04/10"
"url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news",
"refsource": "MISC",
"name": "http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news"
},
{
"name": "http://freshmeat.net/projects/phppgadmin/releases/336969",
"refsource": "CONFIRM",
"url": "http://freshmeat.net/projects/phppgadmin/releases/336969"
"url": "http://www.openwall.com/lists/oss-security/2011/10/04/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/04/1"
},
{
"name": "[oss-security] 20111004 CVE Request -- phpPgAdmin -- Multiple XSS flaws fixed in v5.0.3",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/04/1"
"url": "http://www.openwall.com/lists/oss-security/2011/10/04/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/04/10"
},
{
"name": "49914",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49914"
"url": "http://www.securityfocus.com/bid/49914",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/49914"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=743205",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743205"
"url": "https://bugs.gentoo.org/show_bug.cgi?id=385505",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/show_bug.cgi?id=385505"
},
{
"name": "75997",
"refsource": "OSVDB",
"url": "http://osvdb.org/75997"
"url": "https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842",
"refsource": "MISC",
"name": "https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842"
},
{
"name": "FEDORA-2011-13748",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068009.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743205",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=743205"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3600",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "OFBiz",
"product": {
"product_data": [
{
"product_name": "OFBiz",
"version": {
"version_data": [
{
"version_value": "16.11.01 to 16.11.04"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "OFBiz",
"product": {
"product_data": [
{
"product_name": "OFBiz",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "16.11.01 to 16.11.04"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3600",
"url": "http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30%40apache.org%3E",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3600"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600"
"name": "http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30%40apache.org%3E"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-3600",
@ -68,14 +64,19 @@
"name": "https://access.redhat.com/security/cve/cve-2011-3600"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550@<commits.ofbiz.apache.org>",
"url": "https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550@<commits.ofbiz.apache.org>"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600"
},
{
"refsource": "CONFIRM",
"name": "http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30@apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30@apache.org%3E"
"url": "https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550%40%3Ccommits.ofbiz.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550%40%3Ccommits.ofbiz.apache.org%3E"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3600",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3600"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3601",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20111007 radvd 1.8.2 released with security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
"url": "http://www.litech.org/radvd/CHANGES",
"refsource": "MISC",
"name": "http://www.litech.org/radvd/CHANGES"
},
{
"name": "http://www.litech.org/radvd/CHANGES",
"refsource": "CONFIRM",
"url": "http://www.litech.org/radvd/CHANGES"
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
},
{
"name": "USN-1257-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1257-1"
"url": "http://www.ubuntu.com/usn/USN-1257-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1257-1"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-3609 JBoss AS: CSRF in the administration console & HTTP management API"
"value": "A CSRF issue was found in JBoss Application Server 7 before 7.1.0. JBoss did not properly restrict access to the management console information (for example via the \"Access-Control-Allow-Origin\" HTTP access control flag). This can lead to unauthorized information leak if a user with admin privileges visits a specially-crafted web page provided by a remote attacker."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
"value": "Cross-Site Request Forgery "
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "7 before 7.1.0",
"version_affected": "="
"version_affected": "=",
"version_value": "7 before 7.1.0"
}
]
}
@ -54,21 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2011-3609",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-3609"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-3609",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2011-3609"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743006",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=743006"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3609",
"refsource": "MISC",
@ -85,30 +74,5 @@
"name": "https://www.securityfocus.com/bid/50888"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3618",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "atop",
"product": {
"product_data": [
{
"product_name": "atop",
"version": {
"version_data": [
{
"version_value": "through 1.26"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "atop",
"product": {
"product_data": [
{
"product_name": "atop",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 1.26"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/cve-2011-3618",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2011-3618"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3618",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3618"
},
{
"refsource": "DEBIAN",
"name": "Debian",
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3618"
},
{
"refsource": "REDHAT",
"name": "Red Hat",
"url": "https://access.redhat.com/security/cve/cve-2011-3618"
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3618",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3618"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3619",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/a5b2c5b2ad5853591a6cac6134cd0f599a720865",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/a5b2c5b2ad5853591a6cac6134cd0f599a720865"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5b2c5b2ad5853591a6cac6134cd0f599a720865",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5b2c5b2ad5853591a6cac6134cd0f599a720865"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a5b2c5b2ad5853591a6cac6134cd0f599a720865",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a5b2c5b2ad5853591a6cac6134cd0f599a720865"
"url": "http://www.openwall.com/lists/oss-security/2011/10/17/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/17/6"
},
{
"name": "[oss-security] 20111017 Re: CVE request: kernel/AppArmor local denial of service",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/17/6"
"url": "https://github.com/torvalds/linux/commit/a5b2c5b2ad5853591a6cac6134cd0f599a720865",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/a5b2c5b2ad5853591a6cac6134cd0f599a720865"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3620",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "49000",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49000"
"url": "http://secunia.com/advisories/49000",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49000"
},
{
"name": "https://issues.apache.org/jira/browse/QPID-3652",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/QPID-3652"
"url": "http://www.securitytracker.com/id?1026990",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1026990"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747078",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078"
"url": "https://issues.apache.org/jira/browse/QPID-3652",
"refsource": "MISC",
"name": "https://issues.apache.org/jira/browse/QPID-3652"
},
{
"name": "https://reviews.apache.org/r/2988/",
"refsource": "CONFIRM",
"url": "https://reviews.apache.org/r/2988/"
"url": "https://reviews.apache.org/r/2988/",
"refsource": "MISC",
"name": "https://reviews.apache.org/r/2988/"
},
{
"name": "1026990",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026990"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747078"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3630",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "hardlink",
"product": {
"product_data": [
{
"product_name": "hardlink",
"version": {
"version_data": [
{
"version_value": "before 0.1.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "hardlink",
"product": {
"product_data": [
{
"product_name": "hardlink",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 0.1.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3630",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3630"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630",
"url": "https://www.openwall.com/lists/oss-security/2011/10/20/6",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630"
"name": "https://www.openwall.com/lists/oss-security/2011/10/20/6"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-3630",
@ -68,14 +69,14 @@
"name": "https://access.redhat.com/security/cve/cve-2011-3630"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2011/10/20/6",
"url": "https://www.openwall.com/lists/oss-security/2011/10/20/6"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3630",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516"
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3630"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3631",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "hardlink",
"version": {
"version_data": [
{
"version_value": "0.3.0"
}
]
}
}
]
},
"vendor_name": "hardlink"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,36 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "hardlink",
"product": {
"product_data": [
{
"product_name": "hardlink",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.3.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3631",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3631"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516"
},
{
"url": "https://access.redhat.com/security/cve/cve-2011-3631",
@ -68,9 +64,14 @@
"name": "https://access.redhat.com/security/cve/cve-2011-3631"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631",
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-3631",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-3631"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3638",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"
},
{
"name": "[oss-security] 20111024 Re: CVE Request -- kernel: ext4: ext4_ext_insert_extent() kernel oops",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/24/2"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3"
"url": "http://www.openwall.com/lists/oss-security/2011/10/24/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/10/24/2"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"
"url": "https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747942",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747942"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747942",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747942"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-2744 kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm()"
"value": "net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel before 2.6.34, when the nf_conntrack_ipv6 module is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via certain types of fragmented IPv6 packets."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -32,49 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-279.1.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.0 EUS - Server Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-71.40.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.1 EUS - Server Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-131.30.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.2 EUS - Server and Compute Node Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-220.24.1.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -92,16 +58,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1064.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1064",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1064"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1129",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1129"
},
{
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34",
"refsource": "MISC",
@ -133,54 +89,14 @@
"name": "http://www.securitytracker.com/id?1027235"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1114",
"url": "https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1114"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1148",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1148"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-2744",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-2744"
"name": "https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833402",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833402"
},
{
"url": "https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2745",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33"
},
{
"name": "USN-1606-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1606-1"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1064.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1064.html"
},
{
"name": "https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33"
"url": "http://secunia.com/advisories/50633",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50633"
},
{
"name": "USN-1567-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1567-1"
"url": "http://secunia.com/advisories/50853",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50853"
},
{
"name": "USN-1597-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1597-1"
"url": "http://secunia.com/advisories/50961",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50961"
},
{
"name": "50853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50853"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833428",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833428"
"url": "http://www.securityfocus.com/bid/54365",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54365"
},
{
"name": "50961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50961"
"url": "http://www.securitytracker.com/id?1027236",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027236"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=79549c6dfda0603dba9a70a53467ce62d9335c33",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=79549c6dfda0603dba9a70a53467ce62d9335c33"
"url": "http://www.ubuntu.com/usn/USN-1567-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1567-1"
},
{
"name": "1027236",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027236"
"url": "http://www.ubuntu.com/usn/USN-1597-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1597-1"
},
{
"name": "54365",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54365"
"url": "http://www.ubuntu.com/usn/USN-1606-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1606-1"
},
{
"name": "RHSA-2012:1064",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1064.html"
"url": "https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33"
},
{
"name": "50633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50633"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833428",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833428"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2750",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "DSA-2780",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2780"
"url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"refsource": "MISC",
"name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html"
},
{
"name": "MDVSA-2013:250",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250"
"url": "http://www.debian.org/security/2013/dsa-2780",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2780"
},
{
"name": "63125",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63125"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250"
},
{
"name": "1029184",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029184"
"url": "http://www.securityfocus.com/bid/63125",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/63125"
},
{
"name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html"
"url": "http://www.securitytracker.com/id/1029184",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1029184"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833742",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833742"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833742",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833742"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3354",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120624 Re: CVE request: Full path disclosure in DokuWiki",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835145",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835145"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html"
},
{
"name": "MDVSA-2013:073",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:073"
},
{
"name": "[oss-security] 20120624 CVE request: Full path disclosure in DokuWiki",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/24/2"
},
{
"name": "FEDORA-2012-16550",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html"
},
{
"name": "FEDORA-2012-16605",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html"
},
{
"name": "FEDORA-2012-16614",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html"
},
{
"name": "http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html",
"refsource": "MISC",
"url": "http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html"
},
{
"url": "http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure",
"refsource": "MISC",
"name": "http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:073",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:073"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/06/24/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/06/24/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/06/25/2"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835145",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835145"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3355",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678661",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673",
"refsource": "MISC",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678661"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673"
},
{
"name": "[oss-security] 20120625 CVE 2011-* Request -- rhythmbox (context plug-in): Insecure temporary directory use by loading template files for 'Album', 'Lyrics', and 'Artist' tabs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/5"
},
{
"name": "openSUSE-SU-2012:0954",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/15351848"
},
{
"name": "[oss-security] 20120625 Re: CVE 2011-* Request -- rhythmbox (context plug-in): Insecure temporary directory use by loading template files for 'Album', 'Lyrics', and 'Artist' tabs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/7"
},
{
"name": "54186",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54186"
},
{
"name": "http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html",
"url": "http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html",
"refsource": "MISC",
"url": "http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html"
"name": "http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/5",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673"
"name": "http://www.openwall.com/lists/oss-security/2012/06/25/5"
},
{
"name": "USN-1503-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1503-1"
},
{
"name": "rhythmbox-template-symlink(76538)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76538"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835076",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/7",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835076"
"name": "http://www.openwall.com/lists/oss-security/2012/06/25/7"
},
{
"url": "http://www.securityfocus.com/bid/54186",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54186"
},
{
"url": "http://www.ubuntu.com/usn/USN-1503-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1503-1"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678661",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678661"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76538",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76538"
},
{
"url": "https://hermes.opensuse.org/messages/15351848",
"refsource": "MISC",
"name": "https://hermes.opensuse.org/messages/15351848"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835076",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835076"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3356",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120625 Re: CVE Request: viewvc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/8"
"url": "http://www.debian.org/security/2012/dsa-2563",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2563"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134"
},
{
"name": "54197",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54197"
"url": "http://osvdb.org/83225",
"refsource": "MISC",
"name": "http://osvdb.org/83225"
},
{
"name": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.15/CHANGES",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.15/CHANGES"
"url": "http://viewvc.tigris.org/issues/show_bug.cgi?id=353",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/issues/show_bug.cgi?id=353"
},
{
"name": "viewvc-svnra-security-bypass(76614)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76614"
"url": "http://viewvc.tigris.org/source/browse/%2Acheckout%2A/viewvc/tags/1.1.15/CHANGES",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/%2Acheckout%2A/viewvc/tags/1.1.15/CHANGES"
},
{
"name": "83225",
"refsource": "OSVDB",
"url": "http://osvdb.org/83225"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756"
},
{
"name": "openSUSE-SU-2012:0831",
"refsource": "SUSE",
"url": "https://lwn.net/Articles/505096/"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175"
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/06/25/8"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756"
"url": "http://www.securityfocus.com/bid/54197",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54197"
},
{
"name": "MDVSA-2013:134",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76614",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76614"
},
{
"name": "DSA-2563",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2563"
"url": "https://lwn.net/Articles/505096/",
"refsource": "MISC",
"name": "https://lwn.net/Articles/505096/"
},
{
"name": "http://viewvc.tigris.org/issues/show_bug.cgi?id=353",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/issues/show_bug.cgi?id=353"
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175",
"refsource": "MISC",
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3357",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120625 Re: CVE Request: viewvc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/8"
"url": "http://www.debian.org/security/2012/dsa-2563",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2563"
},
{
"name": "viewvc-svnra-info-disclosure(76615)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76615"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134"
},
{
"name": "54199",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54199"
"url": "http://www.openwall.com/lists/oss-security/2012/06/25/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/06/25/8"
},
{
"name": "openSUSE-SU-2012:0831",
"refsource": "SUSE",
"url": "https://lwn.net/Articles/505096/"
"url": "https://lwn.net/Articles/505096/",
"refsource": "MISC",
"name": "https://lwn.net/Articles/505096/"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175"
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175",
"refsource": "MISC",
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175"
},
{
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2758",
"refsource": "CONFIRM",
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2758"
"url": "http://osvdb.org/83227",
"refsource": "MISC",
"name": "http://osvdb.org/83227"
},
{
"name": "83227",
"refsource": "OSVDB",
"url": "http://osvdb.org/83227"
"url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2758",
"refsource": "MISC",
"name": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2758"
},
{
"name": "MDVSA-2013:134",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134"
"url": "http://www.securityfocus.com/bid/54199",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54199"
},
{
"name": "DSA-2563",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2563"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76615",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76615"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-3358 openjpeg: heap-based buffer overflow when processing JPEG2000 image files"
"value": "Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.3-8.el6_3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -69,11 +68,6 @@
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:104"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1068",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1068"
},
{
"url": "http://code.google.com/p/openjpeg/source/detail?r=1727",
"refsource": "MISC",
@ -94,46 +88,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54373"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3358",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3358"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=835767",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=835767"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76850",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76850"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3360",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "54277",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54277"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html"
},
{
"name": "49763",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49763"
"url": "http://secunia.com/advisories/49763",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49763"
},
{
"name": "https://bugs.launchpad.net/nova/+bug/1015531",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1015531"
"url": "http://secunia.com/advisories/49802",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49802"
},
{
"name": "49802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49802"
"url": "http://www.securityfocus.com/bid/54277",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/54277"
},
{
"name": "[openstack] 20120603 [OSSA 2012-008] Arbitrary file injection/corruption through directory traversal issues (CVE-2012-3360, CVE-2012-3361)",
"refsource": "MLIST",
"url": "https://lists.launchpad.net/openstack/msg14089.html"
"url": "http://www.ubuntu.com/usn/USN-1497-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1497-1"
},
{
"name": "FEDORA-2012-10420",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html"
"url": "https://bugs.launchpad.net/nova/+bug/1015531",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/nova/+bug/1015531"
},
{
"name": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7"
"url": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7"
},
{
"name": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9",
"refsource": "CONFIRM",
"url": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9"
"url": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9",
"refsource": "MISC",
"name": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9"
},
{
"name": "USN-1497-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1497-1"
"url": "https://lists.launchpad.net/openstack/msg14089.html",
"refsource": "MISC",
"name": "https://lists.launchpad.net/openstack/msg14089.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3364",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67de956ff5dc1d4f321e16cfbd63f5be3b691b43",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67de956ff5dc1d4f321e16cfbd63f5be3b691b43"
},
{
"name": "[oss-security] 20120627 Re: CVE Request: Kernel [PATCH] NFC: prevent multiple buffer overflows in NCI",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/27/9"
"url": "http://marc.info/?l=linux-kernel&m=134030878917784&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-kernel&m=134030878917784&w=2"
},
{
"name": "https://github.com/torvalds/linux/commit/67de956ff5dc1d4f321e16cfbd63f5be3b691b43",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/67de956ff5dc1d4f321e16cfbd63f5be3b691b43"
"url": "http://ubuntu.com/usn/usn-1529-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1529-1"
},
{
"name": "USN-1529-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1529-1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=67de956ff5dc1d4f321e16cfbd63f5be3b691b43",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=67de956ff5dc1d4f321e16cfbd63f5be3b691b43"
"url": "http://www.openwall.com/lists/oss-security/2012/06/27/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/06/27/9"
},
{
"name": "[linux-kernel] 20120612 [PATCH] NFC: prevent multiple buffer overflows in NCI",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=134030878917784&w=2"
"url": "https://github.com/torvalds/linux/commit/67de956ff5dc1d4f321e16cfbd63f5be3b691b43",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/67de956ff5dc1d4f321e16cfbd63f5be3b691b43"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0218",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0206",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0206.html"
},
{
"name": "89698",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89698"
},
{
"name": "52041",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52041"
},
{
"name": "RHSA-2013:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html"
},
{
"name": "RHSA-2013:0207",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0207.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903073",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=903073"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0833.html"
},
{
"name": "jboss-eap-info-disc(81725)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81725"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0206.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0206.html"
},
{
"name": "57652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57652"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0207.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0207.html"
},
{
"url": "http://secunia.com/advisories/52041",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52041"
},
{
"url": "http://www.osvdb.org/89698",
"refsource": "MISC",
"name": "http://www.osvdb.org/89698"
},
{
"url": "http://www.securityfocus.com/bid/57652",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57652"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81725",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81725"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=903073",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903073"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0219 sssd: TOCTOU race conditions by copying and removing directory trees"
"value": "System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"cweId": "CWE-367"
"value": "n/a"
}
]
}
@ -32,27 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.5.1-70.el5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.9.2-82.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -120,26 +108,6 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57539"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0508",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0508"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1319",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1319"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0219",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0219"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=884254",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=884254"
},
{
"url": "https://fedorahosted.org/sssd/ticket/1782",
"refsource": "MISC",
@ -149,31 +117,11 @@
"url": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.4",
"refsource": "MISC",
"name": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.4"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.7,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=884254",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=884254"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0220 sssd: Out-of-bounds read flaws in autofs and ssh services responders"
"value": "The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Read",
"cweId": "CWE-125"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.9.2-82.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -84,11 +83,6 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57539"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0508",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0508"
},
{
"url": "https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.4",
"refsource": "MISC",
@ -105,44 +99,14 @@
"name": "http://git.fedorahosted.org/cgit/sssd.git/commit/?id=30e2585dd46b62aa3a4abdf6de3f40a20e1743ab"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0220",
"url": "https://fedorahosted.org/sssd/ticket/1781",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0220"
"name": "https://fedorahosted.org/sssd/ticket/1781"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=884601",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=884601"
},
{
"url": "https://fedorahosted.org/sssd/ticket/1781",
"refsource": "MISC",
"name": "https://fedorahosted.org/sssd/ticket/1781"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0221 coreutils: segfault in \"sort -d\" and \"sort -M\" with long line input"
"value": "The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Initialization",
"cweId": "CWE-665"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:8.4-31.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,55 +58,20 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1652.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1652",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1652"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0221",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0221"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=798538",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=798538"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=903464",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903464"
},
{
"url": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19",
"refsource": "MISC",
"name": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=903464",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903464"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0222 coreutils: segfault in uniq with long line input"
"value": "The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Initialization",
"cweId": "CWE-665"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:8.4-31.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,21 +58,11 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1652.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1652",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1652"
},
{
"url": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19",
"refsource": "MISC",
"name": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0222",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0222"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=796243",
"refsource": "MISC",
@ -85,30 +74,5 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903465"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-0223 coreutils: segfault in \"join -i\" with long line input"
"value": "The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Initialization",
"cweId": "CWE-665"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:8.4-31.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,21 +58,11 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1652.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1652",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1652"
},
{
"url": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19",
"refsource": "MISC",
"name": "https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-0223",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-0223"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=798541",
"refsource": "MISC",
@ -85,30 +74,5 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=903466"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0228",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1796-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1796-1"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.9",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.9"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc"
},
{
"name": "USN-1805-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1805-1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.9",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.9"
},
{
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
"url": "http://www.openwall.com/lists/oss-security/2013/02/13/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/13/10"
},
{
"name": "USN-1797-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1797-1"
"url": "http://www.ubuntu.com/usn/USN-1795-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1795-1"
},
{
"name": "USN-1808-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1808-1"
"url": "http://www.ubuntu.com/usn/USN-1796-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1796-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc"
"url": "http://www.ubuntu.com/usn/USN-1797-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1797-1"
},
{
"name": "https://github.com/torvalds/linux/commit/13d2b4d11d69a92574a55bfd985cfb0ca77aebdc",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/13d2b4d11d69a92574a55bfd985cfb0ca77aebdc"
"url": "http://www.ubuntu.com/usn/USN-1805-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1805-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906309",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906309"
"url": "http://www.ubuntu.com/usn/USN-1808-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1808-1"
},
{
"name": "[oss-security] 20130213 Xen Security Advisory 42 (CVE-2013-0228) - Linux kernel hits general protection if %ds is corrupt for 32-bit PVOPS.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/13/10"
"url": "https://github.com/torvalds/linux/commit/13d2b4d11d69a92574a55bfd985cfb0ca77aebdc",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/13d2b4d11d69a92574a55bfd985cfb0ca77aebdc"
},
{
"name": "USN-1795-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1795-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906309",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=906309"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0231",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130205 Xen Security Advisory 43 (CVE-2013-0231) - Linux pciback DoS via not rate limited log messages.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/9"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "57740",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57740"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"name": "xen-pcibackenablemsi-dos(81923)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81923"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"name": "openSUSE-SU-2013:0395",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
"url": "http://osvdb.org/89903",
"refsource": "MISC",
"name": "http://osvdb.org/89903"
},
{
"name": "52059",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52059"
"url": "http://secunia.com/advisories/52059",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52059"
},
{
"name": "SUSE-SU-2013:0674",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
"url": "http://www.debian.org/security/2013/dsa-2632",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2632"
},
{
"name": "openSUSE-SU-2013:0925",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/05/9"
},
{
"name": "DSA-2632",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2632"
"url": "http://www.securityfocus.com/bid/57740",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57740"
},
{
"name": "89903",
"refsource": "OSVDB",
"url": "http://osvdb.org/89903"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81923",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81923"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0232",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910",
"refsource": "MISC",
"url": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910"
},
{
"name": "[oss-security] 20130128 Re: CVE Request: zoneminder: arbitrary command execution vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/28/2"
},
{
"name": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771",
"url": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/",
"refsource": "MISC",
"url": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771"
"name": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/"
},
{
"name": "DSA-2640",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2640"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910",
"url": "http://www.debian.org/security/2013/dsa-2640",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910"
"name": "http://www.debian.org/security/2013/dsa-2640"
},
{
"name": "24310",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24310"
"url": "http://www.exploit-db.com/exploits/24310",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24310"
},
{
"name": "89529",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/89529"
"url": "http://www.openwall.com/lists/oss-security/2013/01/28/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/28/2"
},
{
"url": "http://www.osvdb.org/89529",
"refsource": "MISC",
"name": "http://www.osvdb.org/89529"
},
{
"url": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771",
"refsource": "MISC",
"name": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0238",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "DSA-2618",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2618"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267"
},
{
"name": "52106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52106"
"url": "http://osvdb.org/89623",
"refsource": "MISC",
"name": "http://osvdb.org/89623"
},
{
"name": "[oss-security] 20130129 ircd-hybrid: Denial of service vulnerability in hostmask.c:try_parse_v4_netmask()",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/29/8"
"url": "http://secunia.com/advisories/51948",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51948"
},
{
"name": "MDVSA-2013:093",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:093"
"url": "http://secunia.com/advisories/52106",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52106"
},
{
"name": "57610",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57610"
"url": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786",
"refsource": "MISC",
"name": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786"
},
{
"name": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786",
"refsource": "CONFIRM",
"url": "http://svn.ircd-hybrid.org:8000/viewcvs.cgi/ircd-hybrid/trunk/src/hostmask.c?r1=1786&r2=1785&pathrev=1786"
"url": "http://www.debian.org/security/2013/dsa-2618",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2618"
},
{
"name": "51948",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51948"
"url": "http://www.exploit-db.com/exploits/24951",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24951"
},
{
"name": "ircdhybrid-tryparsev4netmask-dos(81695)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81695"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:093",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:093"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055"
"url": "http://www.openwall.com/lists/oss-security/2013/01/29/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/01/29/8"
},
{
"name": "89623",
"refsource": "OSVDB",
"url": "http://osvdb.org/89623"
"url": "http://www.securityfocus.com/bid/57610",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57610"
},
{
"name": "24951",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24951"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81695",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81695"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699267"
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055",
"refsource": "MISC",
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0055"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4162",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1436",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html"
"url": "http://secunia.com/advisories/55055",
"refsource": "MISC",
"name": "http://secunia.com/advisories/55055"
},
{
"name": "USN-1943-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1943-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
},
{
"name": "[oss-security] 20130723 Re: CVE Request: Linux kernel: panic while pushing pending data out of an IPv6 socket with UDP_CORK enabled.",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/9"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
},
{
"name": "61411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61411"
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"
},
{
"name": "SUSE-SU-2013:1473",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1"
},
{
"name": "USN-1938-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1938-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1436.html"
},
{
"name": "USN-1944-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1944-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
},
{
"name": "USN-1945-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1945-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1520.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1"
"url": "http://secunia.com/advisories/54148",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54148"
},
{
"name": "RHSA-2013:1520",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html"
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/07/23/9"
},
{
"name": "openSUSE-SU-2013:1971",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"
"url": "http://www.securityfocus.com/bid/61411",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/61411"
},
{
"name": "https://github.com/torvalds/linux/commit/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1"
"url": "http://www.ubuntu.com/usn/USN-1938-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1938-1"
},
{
"name": "USN-1939-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1939-1"
"url": "http://www.ubuntu.com/usn/USN-1939-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1939-1"
},
{
"name": "SUSE-SU-2013:1474",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
"url": "http://www.ubuntu.com/usn/USN-1941-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1941-1"
},
{
"name": "USN-1947-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1947-1"
"url": "http://www.ubuntu.com/usn/USN-1942-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1942-1"
},
{
"name": "54148",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54148"
"url": "http://www.ubuntu.com/usn/USN-1943-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1943-1"
},
{
"name": "RHSA-2013:1460",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
"url": "http://www.ubuntu.com/usn/USN-1944-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1944-1"
},
{
"name": "USN-1941-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1941-1"
"url": "http://www.ubuntu.com/usn/USN-1945-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1945-1"
},
{
"name": "55055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55055"
"url": "http://www.ubuntu.com/usn/USN-1946-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1946-1"
},
{
"name": "USN-1942-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1942-1"
"url": "http://www.ubuntu.com/usn/USN-1947-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1947-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987627",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987627"
"url": "https://github.com/torvalds/linux/commit/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1"
},
{
"name": "USN-1946-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1946-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987627",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987627"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4163",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,87 +27,111 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1943-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1943-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
},
{
"name": "[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/10"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
},
{
"name": "SUSE-SU-2013:1473",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
"url": "http://secunia.com/advisories/54148",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54148"
},
{
"name": "USN-1938-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1938-1"
"url": "http://www.ubuntu.com/usn/USN-1938-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1938-1"
},
{
"name": "61412",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61412"
"url": "http://www.ubuntu.com/usn/USN-1941-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1941-1"
},
{
"name": "USN-1944-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1944-1"
"url": "http://www.ubuntu.com/usn/USN-1942-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1942-1"
},
{
"name": "USN-1945-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1945-1"
"url": "http://www.ubuntu.com/usn/USN-1943-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1943-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
"url": "http://www.ubuntu.com/usn/USN-1944-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1944-1"
},
{
"name": "SUSE-SU-2013:1474",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
"url": "http://www.ubuntu.com/usn/USN-1945-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1945-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
"url": "http://www.ubuntu.com/usn/USN-1946-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1946-1"
},
{
"name": "USN-1947-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1947-1"
"url": "http://www.ubuntu.com/usn/USN-1947-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1947-1"
},
{
"name": "54148",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54148"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{
"name": "USN-1941-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1941-1"
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/07/23/10"
},
{
"name": "USN-1942-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1942-1"
"url": "http://www.securityfocus.com/bid/61412",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/61412"
},
{
"name": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
"url": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{
"name": "USN-1946-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1946-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4168",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SmokePing",
"product": {
"product_data": [
{
"product_name": "SmokePing",
"version": {
"version_data": [
{
"version_value": "2.6.9"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SmokePing",
"product": {
"product_data": [
{
"product_name": "SmokePing",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.6.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4168",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113987.html",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4168"
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113987.html"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114008.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114008.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/07/25/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/07/25/8"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4168",
@ -63,24 +74,14 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4168"
},
{
"url": "https://github.com/oetiker/SmokePing/commit/bad9f9c28f0939b269f90072aa4cf41f20f15563",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113987.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113987.html"
"name": "https://github.com/oetiker/SmokePing/commit/bad9f9c28f0939b269f90072aa4cf41f20f15563"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4168",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114008.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114008.html"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/07/25/8",
"url": "http://www.openwall.com/lists/oss-security/2013/07/25/8"
},
{
"refsource": "MISC",
"name": "https://github.com/oetiker/SmokePing/commit/bad9f9c28f0939b269f90072aa4cf41f20f15563",
"url": "https://github.com/oetiker/SmokePing/commit/bad9f9c28f0939b269f90072aa4cf41f20f15563"
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4168"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4172 CFME 2.0 web interface: Ruby code injection"
"value": "The Red Hat CloudForms Management Engine 5.1 allow remote administrators to execute arbitrary Ruby code via unspecified vectors."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')",
"cweId": "CWE-96"
"value": "n/a"
}
]
}
@ -32,700 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "CloudForms Management Engine 5.x",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:5.2.0.37-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.12-11.el6cf",
"version_affected": "!"
},
{
"version_value": "0:B.02.16-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:4.0P1-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:9.2.3-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1-12.el6",
"version_affected": "!"
},
{
"version_value": "0:9.2.4-7.el6",
"version_affected": "!"
},
{
"version_value": "0:9.0r2-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.5.3-7.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1-11.el6",
"version_affected": "!"
},
{
"version_value": "0:0.1.4-5.el6",
"version_affected": "!"
},
{
"version_value": "0:1.9.3.448-38.el6",
"version_affected": "!"
},
{
"version_value": "1:3.2.13-3.el6cf",
"version_affected": "!"
},
{
"version_value": "1:3.2.13-4.el6cf",
"version_affected": "!"
},
{
"version_value": "1:3.1.0-3.el6cf",
"version_affected": "!"
},
{
"version_value": "1:3.2.13-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.1.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.2.8-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.5-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-3.el6",
"version_affected": "!"
},
{
"version_value": "0:4.9.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.11.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.0.1-7.el6",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-3.el6",
"version_affected": "!"
},
{
"version_value": "0:4.6.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.5-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.9-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.0.29-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.4.1-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.9-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.2.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.7-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.3-1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.7.0-4.el6",
"version_affected": "!"
},
{
"version_value": "0:0.25.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.7-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:4.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.5.5-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.2.3-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.14.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.2.4-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.4.6-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:4.0.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.4-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.2.5-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.6.19-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.1-3.el6",
"version_affected": "!"
},
{
"version_value": "0:0.7.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.4.0-7.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.12.3-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.10.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.2.7-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.6.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.6-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-2.el6",
"version_affected": "!"
},
{
"version_value": "0:1.8.0-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.8.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.2.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.8-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.6.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.5.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:4.7.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:6.5.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.20.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.2.0-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.7.7-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.5.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.7-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.2.20110317223538-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.5.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.7.7-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.5-7.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.6.5-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.5.6-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.4-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.5.21-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.12.2-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.4.0-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-2.el6",
"version_affected": "!"
},
{
"version_value": "0:0.11.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.2.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.20.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "1:1.4.5-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2-2.el6",
"version_affected": "!"
},
{
"version_value": "0:1.3.2-7.el6",
"version_affected": "!"
},
{
"version_value": "0:0.6.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "1:3.2.13-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.13.8-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:10.1.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.8.3-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.0.17-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.3-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.12.2-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-3.el6",
"version_affected": "!"
},
{
"version_value": "0:1.6.7-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.2.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.12.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.12.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.12.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.6-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.4-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.1.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.4.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.13.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.0.10-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.0-4.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.1.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.9.5-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.0.19-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.7.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:3.1.20-3.el6",
"version_affected": "!"
},
{
"version_value": "0:2.32.1-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.4-7.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.7.1-6.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.7.1-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.2.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.0.2-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.2.3-8.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.9-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-6.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.6.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.4.5-2.el6",
"version_affected": "!"
},
{
"version_value": "0:1.3.6-2.el6",
"version_affected": "!"
},
{
"version_value": "0:1.1.2-8.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-8.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.6.5-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.4.5-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.10.0-7.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.4.5-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.11.0-0.6.beta5.el6",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.18.1-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.3.3-10.el6",
"version_affected": "!"
},
{
"version_value": "0:0.5.3-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.4.0-5.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.4.10-6.el6",
"version_affected": "!"
},
{
"version_value": "0:1.16.2-2.el6cf",
"version_affected": "!"
},
{
"version_value": "0:0.3.33-2.el6",
"version_affected": "!"
},
{
"version_value": "0:2.1.3-3.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.5.1-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.11.0-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:1.0.12-1.el6cf",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-2.el6cf",
"version_affected": "!"
},
{
"version_value": "1:3.14.5.10-1.1.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -738,55 +53,10 @@
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHEA-2013:1487",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHEA-2013:1487"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1157.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1157.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1157",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1157"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4172",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4172"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988644",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=988644"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4179 OpenStack: Nova XML entities DoS"
"value": "The security group extension in OpenStack Compute (Nova) Grizzly 2013.1.3, Havana before havana-3, and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')",
"cweId": "CWE-776"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OpenStack 3 for RHEL 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2013.1.3-3.el6ost",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,55 +58,15 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1199.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1199",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1199"
},
{
"url": "http://www.ubuntu.com/usn/USN-2005-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2005-1"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4179",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4179"
},
{
"url": "https://bugs.launchpad.net/ossa/+bug/1190229",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ossa/+bug/1190229"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=989707",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=989707"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-4181 ovirt-engine: RedirectServlet cross-site scripting flaw"
"value": "Cross-site scripting (XSS) vulnerability in the addAlert function in the RedirectServlet servlet in oVirt Engine and Red Hat Enterprise Virtualization Manager (RHEV-M), as used in Red Hat Enterprise Virtualization 3 and 3.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "RHEV Manager version 3.2",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.2.0-42",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -59,46 +58,11 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1210.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1210",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1210"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4181",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4181"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988774",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=988774"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

File diff suppressed because it is too large Load Diff

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4183",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,22 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1198",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1198.html"
"url": "http://www.ubuntu.com/usn/USN-2005-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2005-1"
},
{
"name": "https://bugs.launchpad.net/cinder/+bug/1198185",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/cinder/+bug/1198185"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1198.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1198.html"
},
{
"name": "USN-2005-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2005-1"
"url": "https://bugs.launchpad.net/cinder/+bug/1198185",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/cinder/+bug/1198185"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4188",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
"url": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "MISC",
"name": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "MISC",
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
"url": "http://seclists.org/oss-sec/2013/q3/261",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978449",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978449"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978449",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978449"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3096",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,72 +27,96 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322925",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322925"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html"
},
{
"name": "FEDORA-2016-cd3cf8e7d0",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html"
},
{
"name": "FEDORA-2016-ab154c56dd",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html"
},
{
"name": "https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4",
"refsource": "CONFIRM",
"url": "https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html"
},
{
"name": "FEDORA-2016-679c4ddd3c",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html"
},
{
"name": "https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away",
"refsource": "CONFIRM",
"url": "https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away"
"url": "https://github.com/ansible/ansible-modules-extras/pull/1941",
"refsource": "MISC",
"name": "https://github.com/ansible/ansible-modules-extras/pull/1941"
},
{
"name": "FEDORA-2016-65519440f5",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html"
"url": "https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4",
"refsource": "MISC",
"name": "https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4"
},
{
"name": "FEDORA-2016-28ff51a3f5",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html"
"url": "https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd",
"refsource": "MISC",
"name": "https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd"
},
{
"name": "[ansible-announce] 20160415 Ansible 1.9.6-1 has been released",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/#!topic/ansible-announce/tqiZbcWxYig"
"url": "https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away",
"refsource": "MISC",
"name": "https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away"
},
{
"name": "GLSA-201607-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-14"
"url": "https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0"
},
{
"name": "[ansible-announce] 20160419 Ansible 2.0.2.0 has been released",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/#!topic/ansible-announce/E80HLZilTU0"
"url": "https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig"
},
{
"name": "https://github.com/ansible/ansible-modules-extras/pull/1941",
"refsource": "CONFIRM",
"url": "https://github.com/ansible/ansible-modules-extras/pull/1941"
"url": "https://security.gentoo.org/glsa/201607-14",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201607-14"
},
{
"name": "https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd",
"refsource": "CONFIRM",
"url": "https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322925",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322925"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the way mod_nss parsed certain OpenSSL-style cipher strings. As a result, mod_nss could potentially use ciphers that were not intended to be enabled."
"value": "mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Missing Report of Error Condition",
"cweId": "CWE-392"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:1.0.14-7.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -74,52 +73,11 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2602.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2602",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2602"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3099",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3099"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Rob Crittenden (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3100",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd",
"refsource": "CONFIRM",
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd"
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html"
},
{
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58",
"refsource": "CONFIRM",
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58"
"url": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php",
"refsource": "MISC",
"name": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php"
},
{
"name": "91769",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91769"
"url": "http://www.securityfocus.com/bid/91769",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/91769"
},
{
"name": "openSUSE-SU-2016:1723",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html"
"url": "https://bugs.kde.org/show_bug.cgi?id=358593",
"refsource": "MISC",
"name": "https://bugs.kde.org/show_bug.cgi?id=358593"
},
{
"name": "https://bugs.kde.org/show_bug.cgi?id=358593",
"refsource": "CONFIRM",
"url": "https://bugs.kde.org/show_bug.cgi?id=358593"
"url": "https://bugs.kde.org/show_bug.cgi?id=363140",
"refsource": "MISC",
"name": "https://bugs.kde.org/show_bug.cgi?id=363140"
},
{
"name": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php",
"refsource": "CONFIRM",
"url": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php"
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58",
"refsource": "MISC",
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58"
},
{
"name": "https://www.kde.org/info/security/advisory-20160621-1.txt",
"refsource": "CONFIRM",
"url": "https://www.kde.org/info/security/advisory-20160621-1.txt"
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd",
"refsource": "MISC",
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd"
},
{
"name": "https://bugs.kde.org/show_bug.cgi?id=363140",
"refsource": "CONFIRM",
"url": "https://bugs.kde.org/show_bug.cgi?id=363140"
"url": "https://www.kde.org/info/security/advisory-20160621-1.txt",
"refsource": "MISC",
"name": "https://www.kde.org/info/security/advisory-20160621-1.txt"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3106",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://pulp.plan.io/issues/1827",
"refsource": "CONFIRM",
"url": "https://pulp.plan.io/issues/1827"
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/04/18/11"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1324926",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324926"
"url": "http://www.openwall.com/lists/oss-security/2016/05/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/20/1"
},
{
"name": "[oss-security] 20160519 Pulp 2.8.3 Released to address multiple CVEs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/20/1"
"url": "https://pulp.plan.io/issues/1827",
"refsource": "MISC",
"name": "https://pulp.plan.io/issues/1827"
},
{
"name": "[oss-security] 20160418 CVE-2013-7450: Pulp < 2.3.0 distributed the same CA key to all users",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/11"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324926",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1324926"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3110",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:2056",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2054.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2054.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2055.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2055.html"
},
{
"name": "RHSA-2016:1648",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1648.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2056.html"
},
{
"name": "92584",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92584"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1648.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1648.html"
},
{
"name": "RHSA-2016:2055",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2055.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1649.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1649.html"
},
{
"name": "RHSA-2016:1649",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1649.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1650.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1650.html"
},
{
"name": "RHSA-2016:1650",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1650.html"
"url": "http://www.securityfocus.com/bid/92584",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/92584"
},
{
"name": "RHSA-2016:2054",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2054.html"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JMA2YLPK6SEUVF5Q3QEANHYEPRZA2RI/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JMA2YLPK6SEUVF5Q3QEANHYEPRZA2RI/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-3877efca99",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CX5QNNIVAUB2VVDV6TR3YMFTL6VRKOBO/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CX5QNNIVAUB2VVDV6TR3YMFTL6VRKOBO/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CX5QNNIVAUB2VVDV6TR3YMFTL6VRKOBO/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7813edd5a2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JMA2YLPK6SEUVF5Q3QEANHYEPRZA2RI/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HE5YZTBZRXCMQFT5LDLZG2HAYBKMYQLL/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HE5YZTBZRXCMQFT5LDLZG2HAYBKMYQLL/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-17556e2ad6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HE5YZTBZRXCMQFT5LDLZG2HAYBKMYQLL/"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that the private RSA key was created in a directory that is world-readable for a small amount of time. A local user could possibly use this flaw to gain access to the private key information in the file."
"value": "pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later modifying the permissions, which might allow local users to read the generated RSA keys via reading the key files while the installation process is running."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
"cweId": "CWE-362"
"value": "n/a"
}
]
}
@ -32,547 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.2 for RHEL 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el6sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el6",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el6_6sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-9.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el6",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.10.0-1.el6_6sat",
"version_affected": "!"
},
{
"version_value": "1:1.3.6-27.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.3-18.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el6sat",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Satellite 6.2 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el7sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8-3.el7",
"version_affected": "!"
},
{
"version_value": "0:2016.5-3.atomic.el7",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -605,21 +73,11 @@
"refsource": "MISC",
"name": "http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n620"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3111",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3111"
},
{
"url": "https://bugzilla.redhat.com/attachment.cgi?id=1146522",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/attachment.cgi?id=1146522"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326251",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326251"
},
{
"url": "https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486",
"refsource": "MISC",
@ -634,37 +92,11 @@
"url": "https://pulp.plan.io/issues/1837",
"refsource": "MISC",
"name": "https://pulp.plan.io/issues/1837"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jeremy Cline (Red Hat)."
}
],
"impact": {
"cvss": [
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326251",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326251"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that the private key for the agent certificate was contained in a world-readable file. A local user could possibly use this flaw to gain access to the private key information in the file."
"value": "client/consumer/cli.py in Pulp before 2.8.3 writes consumer private keys to etc/pki/pulp/consumer/consumer-cert.pem as world-readable, which allows remote authenticated users to obtain the consumer private keys and escalate privileges by reading /etc/pki/pulp/consumer/consumer-cert, and authenticating as a consumer user."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
"value": "n/a"
}
]
}
@ -32,547 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.2 for RHEL 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el6sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el6",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el6_6sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-9.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el6",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.10.0-1.el6_6sat",
"version_affected": "!"
},
{
"version_value": "1:1.3.6-27.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.3-18.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el6sat",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Satellite 6.2 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el7sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8-3.el7",
"version_affected": "!"
},
{
"version_value": "0:2016.5-3.atomic.el7",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -595,56 +63,20 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHBA-2016:1501"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3112",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3112"
},
{
"url": "https://bugzilla.redhat.com/attachment.cgi?id=1146538",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/attachment.cgi?id=1146538"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326242",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326242"
},
{
"url": "https://pulp.plan.io/issues/1834",
"refsource": "MISC",
"name": "https://pulp.plan.io/issues/1834"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jeremy Cline (Red Hat)."
}
],
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326242",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1326242"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3690",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1327037",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327037"
},
{
"name": "https://access.redhat.com/solutions/45530",
"url": "http://www.securityfocus.com/bid/99079",
"refsource": "MISC",
"url": "https://access.redhat.com/solutions/45530"
"name": "http://www.securityfocus.com/bid/99079"
},
{
"name": "99079",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99079"
"url": "https://access.redhat.com/solutions/178393",
"refsource": "MISC",
"name": "https://access.redhat.com/solutions/178393"
},
{
"name": "https://access.redhat.com/solutions/178393",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/solutions/178393"
"url": "https://access.redhat.com/solutions/45530",
"refsource": "MISC",
"name": "https://access.redhat.com/solutions/45530"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327037",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1327037"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that the private CA key was created in a directory that is world-readable for a small amount of time. A local user could possibly use this flaw to gain access to the private key information in the file."
"value": "The pulp-qpid-ssl-cfg script in Pulp before 2.8.5 allows local users to obtain the CA key."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
"value": "n/a"
}
]
}
@ -32,272 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.1.14-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.34-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:201801241201-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.4-1",
"version_affected": "!"
},
{
"version_value": "1:1.15.6.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5-15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.26-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.0.5-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.9-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0-23.0.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0.12-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.14-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.11-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.13-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.8-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.5-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.12-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.58-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.fm1_15.el7sat",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -315,16 +58,6 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3696",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3696"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328930",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1328930"
},
{
"url": "https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5",
"refsource": "MISC",
@ -339,51 +72,11 @@
"url": "https://pulp.plan.io/issues/1854",
"refsource": "MISC",
"name": "https://pulp.plan.io/issues/1854"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Sander Bos for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328930",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1328930"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2016-3699 kernel: ACPI table override allowed when securelevel is enabled"
"value": "The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improperly Implemented Security Check for Standard",
"cweId": "CWE-358"
"value": "n/a"
}
]
}
@ -32,20 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.rt56.420.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-514.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -68,16 +63,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2574",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2574"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2584",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2584"
},
{
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/4",
"refsource": "MISC",
@ -89,50 +74,14 @@
"name": "http://www.securityfocus.com/bid/93114"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3699",
"url": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3699"
"name": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329653",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1329653"
},
{
"url": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76",
"refsource": "MISC",
"name": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Linn Crosetto (HP) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
}
]
}