mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4d8a87abfe
commit
4c00973e31
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel."
|
"value": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Loop with Unreachable Exit Condition ('Infinite Loop')",
|
"value": "n/a"
|
||||||
"cweId": "CWE-835"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,82 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.6.32-573.12.1.el6",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.2 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-220.65.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-358.69.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-431.68.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.6 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-504.40.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.3.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.1 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-229.24.2.ael7b",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -301,79 +234,14 @@
|
|||||||
"name": "http://xenbits.xen.org/xsa/advisory-156.html"
|
"name": "http://xenbits.xen.org/xsa/advisory-156.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2552",
|
"url": "https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2552"
|
"name": "https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2587",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2587"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2636",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2636"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2645",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2645"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:0004",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:0004"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:0024",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:0024"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:0046",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:0046"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2015-5307",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2015-5307"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277172",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277172",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1277172"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1277172"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "ADJACENT_NETWORK",
|
|
||||||
"authentication": "SINGLE",
|
|
||||||
"availabilityImpact": "COMPLETE",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 5.2,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2015-5327",
|
"ID": "CVE-2015-5327",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,22 +27,46 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20151127 CVE-2015-5327 kernel: User triggerable out-of-bounds read",
|
"url": "http://www.openwall.com/lists/oss-security/2015/11/27/1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/11/27/1"
|
"name": "http://www.openwall.com/lists/oss-security/2015/11/27/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1278978",
|
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278978"
|
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278978",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc25b994acfbc901429da682d0f73c190e960206"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1278978"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2015-6496",
|
"ID": "CVE-2015-6496",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,47 +27,71 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-5eb2131441",
|
"url": "http://bugzilla.netfilter.org/show_bug.cgi?id=910",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174875.html"
|
"name": "http://bugzilla.netfilter.org/show_bug.cgi?id=910"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150817 Re: CVE request: conntrackd denial of service with unusual network traffic",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174875.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/08/18/1"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174875.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://git.netfilter.org/conntrack-tools/commit/?id=c392c159605956c7bd4a264ab4490e2b2704c0cd",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174883.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://git.netfilter.org/conntrack-tools/commit/?id=c392c159605956c7bd4a264ab4490e2b2704c0cd"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174883.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-1aee5e6f0b",
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00015.html",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174883.html"
|
"name": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00015.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150814 CVE request: conntrackd denial of service with unusual network traffic",
|
"url": "http://www.debian.org/security/2015/dsa-3341",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/08/14/4"
|
"name": "http://www.debian.org/security/2015/dsa-3341"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1688",
|
"url": "http://www.openwall.com/lists/oss-security/2015/08/14/4",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00015.html"
|
"name": "http://www.openwall.com/lists/oss-security/2015/08/14/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugzilla.netfilter.org/show_bug.cgi?id=910",
|
"url": "http://www.openwall.com/lists/oss-security/2015/08/18/1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://bugzilla.netfilter.org/show_bug.cgi?id=910"
|
"name": "http://www.openwall.com/lists/oss-security/2015/08/18/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3341",
|
"url": "https://git.netfilter.org/conntrack-tools/commit/?id=c392c159605956c7bd4a264ab4490e2b2704c0cd",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2015/dsa-3341"
|
"name": "https://git.netfilter.org/conntrack-tools/commit/?id=c392c159605956c7bd4a264ab4490e2b2704c0cd"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to crash."
|
"value": "Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Heap-based Buffer Overflow",
|
"value": "n/a"
|
||||||
"cweId": "CWE-122"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,27 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.7.6-20.el6_7.1",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.9.1-6.el7_2.2",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -120,21 +108,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://www.ubuntu.com/usn/USN-2834-1"
|
"name": "http://www.ubuntu.com/usn/USN-2834-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2549",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2549"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2015:2550",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2015:2550"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1089",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1089"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -151,50 +124,14 @@
|
|||||||
"name": "http://www.securityfocus.com/bid/79508"
|
"name": "http://www.securityfocus.com/bid/79508"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2015-7497",
|
"url": "https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2015-7497"
|
"name": "https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281862",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281862",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1281862"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1281862"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "Red Hat would like to thank the GNOME project for reporting this issue. Upstream acknowledges Kostya Serebryany as the original reporter."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 4.3,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and escalate their privileges."
|
"value": "Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Improper Access Control",
|
"value": "n/a"
|
||||||
"cweId": "CWE-284"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,20 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat OpenShift Container Platform 3.2",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:3.2.0.44-1.git.0.a4463d9.el7",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.4.7-1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -62,47 +57,6 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1094",
|
"url": "https://access.redhat.com/errata/RHSA-2016:1094",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1094"
|
"name": "https://access.redhat.com/errata/RHSA-2016:1094"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2016-3738",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2016-3738"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333461",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333461"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "This issue was discovered by David Eads (Red Hat)."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "LOW",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "SINGLE",
|
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 6.5,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "PARTIAL",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "PARTIAL",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-4037",
|
"ID": "CVE-2016-4037",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,62 +27,86 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160418 Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/3"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=1ae3f2f178087711f9591350abad133525ba93f2",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=1ae3f2f178087711f9591350abad133525ba93f2"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2016-48e72b7bc5",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2016-35d7b09908",
|
"url": "http://www.ubuntu.com/usn/USN-2974-1",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"
|
"name": "http://www.ubuntu.com/usn/USN-2974-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[qemu-devel] 20160418 [PATCH 1/2] ehci: apply limit to itd/sidt descriptors",
|
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02691.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2016-75063477ca",
|
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1ae3f2f178087711f9591350abad133525ba93f2",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"
|
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1ae3f2f178087711f9591350abad133525ba93f2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2974-1",
|
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/3",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2974-1"
|
"name": "http://www.openwall.com/lists/oss-security/2016/04/18/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "86283",
|
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/6",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/86283"
|
"name": "http://www.openwall.com/lists/oss-security/2016/04/18/6"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[qemu-devel] 20160418 Re: [PATCH 1/2] ehci: apply limit to itd/sidt descriptors",
|
"url": "http://www.securityfocus.com/bid/86283",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02734.html"
|
"name": "http://www.securityfocus.com/bid/86283"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02691.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02691.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160418 Re: Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process",
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02734.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/18/6"
|
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02734.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CVE-2016-4447 libxml2: Heap-based buffer underreads due to xmlParseName"
|
"value": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Heap-based Buffer Overflow",
|
"value": "n/a"
|
||||||
"cweId": "CWE-122"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,27 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.7.6-21.el6_8.1",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.9.1-6.el7_2.3",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -140,11 +128,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
|
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2957",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2957"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -200,46 +183,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://www.securityfocus.com/bid/90864"
|
"name": "http://www.securityfocus.com/bid/90864"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2016-4447",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2016-4447"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83",
|
"url": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83"
|
"name": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 4.3,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CloudForms includes a default SSL/TLS certificate for the web server. This certificate is replaced at install time. However if an attacker were able to man-in-the-middle an administrator while installing the new certificate, the attacker could get a copy of the uploaded private key allowing for future attacks."
|
"value": "CloudForms Management Engine before 5.8 includes a default SSL/TLS certificate."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Use of Hard-coded Credentials",
|
"value": "n/a"
|
||||||
"cweId": "CWE-798"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,215 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "CloudForms Management Engine 5.7",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:5.7.3.2-1.el7cf",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.7.2-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.1.5-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "CloudForms Management Engine 5.8",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.2.1.0-2.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.1.2-1.el7at",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.1.7-1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:5.8.0.17-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:19.0.4-1.el7at",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.5.1-2.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.0.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.17-23.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.42.0-4.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:1.10.2-1.el7at",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:9.4.11-2PGDG.el7at",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:9.0r2-10.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.1-7.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.11-4.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.9.1-2.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.71c-2.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.6.10-1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.15.2-3.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.6.5-1.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.6.5-1.el7at",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.2.1-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.1.3-2.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.1.10-3.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.0.7-6.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.9.8-4.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.7.2-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.6.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.0.2-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.2.1-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.1.0-2.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.1.0-3.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.6.8-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.1.5-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.18.2-5.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.1.7-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.3.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.1.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.1.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.25.0-b10.2.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.7.0-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.0.7.1-3.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.6.3-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.4-1.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.06-1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.1.3-3.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.3.14-7.el7cf",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -268,61 +68,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2017:1601"
|
"name": "https://access.redhat.com/errata/RHSA-2017:1601"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2016-4457",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2016-4457"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341308",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341308",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341308"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341308"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "This issue was discovered by Simon Lukasik (Red Hat)."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 5.8,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "PARTIAL",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "PARTIAL",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
||||||
"version": "2.0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 6.1,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation."
|
"value": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Incorrect Check of Function Return Value",
|
"value": "n/a"
|
||||||
"cweId": "CWE-253"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,97 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.6.32-642.6.1.el6",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-358.75.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-431.74.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.6 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-504.54.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.7 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-573.35.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.28.2.rt56.234.el7_2",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.28.2.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.1 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-229.40.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise MRG 2",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "1:3.10.0-327.rt56.194.el6rt",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -170,21 +88,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://rhn.redhat.com/errata/RHSA-2016-1541.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-1541.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1532",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1532"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1539",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1539"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1541",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1541"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -381,94 +284,14 @@
|
|||||||
"name": "http://www.ubuntu.com/usn/USN-3057-1"
|
"name": "http://www.ubuntu.com/usn/USN-3057-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1657",
|
"url": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:1657"
|
"name": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2006",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2006"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2074",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2074"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2076",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2076"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2128",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2128"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:2133",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2016:2133"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2016-4470",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2016-4470"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "This issue was discovered by David Howells (Red Hat)."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "LOCAL",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "COMPLETE",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 6.9,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "COMPLETE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "COMPLETE",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
||||||
"version": "2.0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 7.8,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-4471",
|
"ID": "CVE-2016-4471",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,17 +27,41 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://github.com/ManageIQ/manageiq/pull/7856",
|
"url": "https://github.com/ManageIQ/manageiq/pull/7856",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/ManageIQ/manageiq/pull/7856"
|
"name": "https://github.com/ManageIQ/manageiq/pull/7856"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1340763",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340763",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340763"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1340763"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-4472",
|
"ID": "CVE-2016-4472",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716."
|
"value": "The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -50,42 +27,66 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
"url": "https://security.gentoo.org/glsa/201701-21",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
"name": "https://security.gentoo.org/glsa/201701-21"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344251",
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344251"
|
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3013-1",
|
"url": "https://www.tenable.com/security/tns-2016-20",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3013-1"
|
"name": "https://www.tenable.com/security/tns-2016-20"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "91528",
|
"url": "http://www.securityfocus.com/bid/91528",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/91528"
|
"name": "http://www.securityfocus.com/bid/91528"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde",
|
"url": "http://www.ubuntu.com/usn/USN-3013-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde"
|
"name": "http://www.ubuntu.com/usn/USN-3013-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201701-21",
|
"url": "https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201701-21"
|
"name": "https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344251",
|
||||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
"refsource": "MISC",
|
||||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344251"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -21,8 +21,8 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Use After Free",
|
"value": "CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'), CWE-416 - Use After Free.",
|
||||||
"cweId": "CWE-416"
|
"cweId": "CWE-362"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,35 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 8",
|
"product_name": "kernel",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:4.18.0-425.3.1.rt7.213.el8",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "Affects kernel v5.15.3 and prior, Fixed in v5.16-rc1 and above."
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.18.0-425.3.1.el8",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:5.14.0-162.6.1.rt21.168.el9_1",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:5.14.0-162.6.1.el9_1",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -73,6 +54,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://ubuntu.com/security/CVE-2021-3640",
|
"url": "https://ubuntu.com/security/CVE-2021-3640",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -93,36 +79,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951"
|
"name": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2022:7444",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2022:7444"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2022:7683",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2022:7683"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2022:7933",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2022:7933"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2022:8267",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2022:8267"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2021-3640",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2021-3640"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -133,11 +89,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lkml.org/lkml/2021/8/28/238",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lkml.org/lkml/2021/8/28/238"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20220419-0003/",
|
"url": "https://security.netapp.com/advisory/ntap-20220419-0003/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -149,29 +100,5 @@
|
|||||||
"name": "https://www.debian.org/security/2022/dsa-5096"
|
"name": "https://www.debian.org/security/2022/dsa-5096"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"work_around": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 6.7,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"version": "3.1"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,12 +1,33 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2021-3643",
|
"ID": "CVE-2021-3643",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-125",
|
||||||
|
"cweId": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
@ -19,6 +40,7 @@
|
|||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
|
"version_affected": "=",
|
||||||
"version_value": "sox 14.4.1"
|
"version_value": "sox 14.4.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -30,57 +52,12 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-125"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980626",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980626",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980626"
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980626"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[oss-security] 20230203 sox: patches for old vulnerabilities",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/02/03/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[oss-security] 20230204 Re: sox: patches for old vulnerabilities",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/02/04/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[oss-security] 20230205 Re: sox: patches for old vulnerabilities",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/02/05/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[oss-security] 20230206 Re: sox: patches for old vulnerabilities",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/02/06/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[debian-lts-announce] 20230210 [SECURITY] [DLA 3315-1] sox security update",
|
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,33 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2021-3644",
|
"ID": "CVE-2021-3644",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor",
|
||||||
|
"cweId": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
@ -19,6 +40,7 @@
|
|||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
|
"version_affected": "=",
|
||||||
"version_value": "Fixed in 16.0.1.Final, 17.0.0.Final and later."
|
"version_value": "Fixed in 16.0.1.Final, 17.0.0.Final and later."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -30,57 +52,37 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052"
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2021-3644",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2021-3644",
|
"name": "https://access.redhat.com/security/cve/CVE-2021-3644"
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2021-3644"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://issues.redhat.com/browse/WFCORE-5511",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://issues.redhat.com/browse/WFCORE-5511",
|
"name": "https://issues.redhat.com/browse/WFCORE-5511"
|
||||||
"url": "https://issues.redhat.com/browse/WFCORE-5511"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://github.com/wildfly/wildfly-core/pull/4668",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/wildfly/wildfly-core/pull/4668",
|
"name": "https://github.com/wildfly/wildfly-core/pull/4668"
|
||||||
"url": "https://github.com/wildfly/wildfly-core/pull/4668"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b",
|
"name": "https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b"
|
||||||
"url": "https://github.com/wildfly/wildfly-core/commit/6d8db43cd43b5994b7a14003db978064e086090b"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714",
|
"name": "https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714"
|
||||||
"url": "https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,33 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2021-3658",
|
"ID": "CVE-2021-3658",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-863",
|
||||||
|
"cweId": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
@ -19,6 +40,7 @@
|
|||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
|
"version_affected": "=",
|
||||||
"version_value": "Fixedin - 5.61 and above."
|
"version_value": "Fixedin - 5.61 and above."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -30,52 +52,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-863"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
|
"url": "https://gitlab.gnome.org/GNOME/gnome-bluetooth/-/issues/89",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://gitlab.gnome.org/GNOME/gnome-bluetooth/-/issues/89",
|
"name": "https://gitlab.gnome.org/GNOME/gnome-bluetooth/-/issues/89"
|
||||||
"url": "https://gitlab.gnome.org/GNOME/gnome-bluetooth/-/issues/89"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055",
|
"name": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055"
|
||||||
"url": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://github.com/bluez/bluez/commit/b497b5942a8beb8f89ca1c359c54ad67ec843055",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/bluez/bluez/commit/b497b5942a8beb8f89ca1c359c54ad67ec843055",
|
"name": "https://github.com/bluez/bluez/commit/b497b5942a8beb8f89ca1c359c54ad67ec843055"
|
||||||
"url": "https://github.com/bluez/bluez/commit/b497b5942a8beb8f89ca1c359c54ad67ec843055"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984728",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1984728",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1984728"
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984728"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"url": "https://security.netapp.com/advisory/ntap-20220407-0002/",
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20220407-0002/",
|
"refsource": "MISC",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20220407-0002/"
|
"name": "https://security.netapp.com/advisory/ntap-20220407-0002/"
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Improper Restriction of Rendered UI Layers or Frames",
|
"value": "CWE-1021 - Improper Restriction of Rendered UI Layers or Frames",
|
||||||
"cweId": "CWE-1021"
|
"cweId": "CWE-1021"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,16 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 8",
|
"product_name": "cockpit",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:264.1-1.el8",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "Fixed in cockpit v254 and later."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -54,6 +54,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/cockpit-project/cockpit/issues/16122",
|
"url": "https://github.com/cockpit-project/cockpit/issues/16122",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -63,39 +68,6 @@
|
|||||||
"url": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10",
|
"url": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10"
|
"name": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2022:2008",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2022:2008"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2021-3660",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2021-3660"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 4.3,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
||||||
"version": "3.1"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Improper Locking",
|
"value": "CWE-667 (improper Locking)",
|
||||||
"cweId": "CWE-667"
|
"cweId": "CWE-667"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,38 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Advanced Virtualization for RHEL 8.2.1",
|
"product_name": "libvirt",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "8020120210917153657.863bb0db",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "Fixedin - libvert v7.6.0-rc1 and above"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Advanced Virtualization for RHEL 8.4.0.Z",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "8040020210922084349.522a0ee4",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 8",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "8050020211001230723.b4937e53",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -76,36 +54,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"url": "https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2021:3703",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2021:3703"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2021:3704",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2021:3704"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2021:4191",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2021:4191"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2021-3667",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2021-3667"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87",
|
"url": "https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -122,29 +80,5 @@
|
|||||||
"name": "https://security.netapp.com/advisory/ntap-20220331-0005/"
|
"name": "https://security.netapp.com/advisory/ntap-20220331-0005/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"work_around": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 6.5,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"version": "3.1"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
Loading…
x
Reference in New Issue
Block a user