"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 03:02:14 +00:00
parent a15af619fe
commit 4f598c7ce2
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
46 changed files with 2508 additions and 2832 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2942 kernel: net sched: fix some kernel memory leaks"
"value": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Missing Release of Memory after Effective Lifetime",
"cweId": "CWE-401"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "MRG for RHEL-5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.33.7-rt29.45.el5rt",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.31.1.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.17.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -121,11 +98,6 @@
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0771",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0771"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html",
"refsource": "MISC",
@ -141,11 +113,6 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0723",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0723"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html",
"refsource": "MISC",
@ -196,46 +163,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42529"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0779",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0779"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2942",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2942"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624903",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624903"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2943",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,132 +27,156 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7124fe0a5b619d65b739477b3b55a20bf805b06d",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7124fe0a5b619d65b739477b3b55a20bf805b06d"
"url": "http://secunia.com/advisories/42758",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42758"
},
{
"name": "42527",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42527"
"url": "http://www.ubuntu.com/usn/USN-1041-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1041-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7b6259e7a83647948fa33a736cc832310c8d85aa",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7b6259e7a83647948fa33a736cc832310c8d85aa"
"url": "http://www.vupen.com/english/advisories/2011/0070",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0070"
},
{
"name": "RHSA-2010:0723",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624923",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624923"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768"
"url": "http://support.avaya.com/css/P8/documents/100113326",
"refsource": "MISC",
"name": "http://support.avaya.com/css/P8/documents/100113326"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
},
{
"name": "[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769"
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767",
"refsource": "MISC",
"name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767"
},
{
"name": "[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/18/2"
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768",
"refsource": "MISC",
"name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768"
},
{
"name": "[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767"
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769",
"refsource": "MISC",
"name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769"
},
{
"name": "[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2",
"refsource": "MLIST",
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html"
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771",
"refsource": "MISC",
"name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771"
},
{
"name": "USN-1041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1041-1"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d"
},
{
"name": "[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2",
"refsource": "MLIST",
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa"
},
{
"name": "ADV-2011-0280",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0280"
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html",
"refsource": "MISC",
"name": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html",
"refsource": "MISC",
"name": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html"
},
{
"name": "42758",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42758"
"url": "http://secunia.com/advisories/43161",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43161"
},
{
"name": "http://support.avaya.com/css/P8/documents/100113326",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/css/P8/documents/100113326"
"url": "http://www.openwall.com/lists/oss-security/2010/08/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/18/2"
},
{
"name": "USN-1057-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1057-1"
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/19/5"
},
{
"name": "[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/5"
"url": "http://www.securityfocus.com/bid/42527",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42527"
},
{
"name": "ADV-2011-0070",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0070"
"url": "http://www.ubuntu.com/usn/USN-1057-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1057-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1920779e67cbf5ea8afef317777c5bf2b8096188",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1920779e67cbf5ea8afef317777c5bf2b8096188"
"url": "http://www.vupen.com/english/advisories/2011/0280",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0280"
},
{
"name": "43161",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43161"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624923",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624923"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2945",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100820 Re: CVE Request: SLiM insecure PATH assignment",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/10"
"url": "http://secunia.com/advisories/41005",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41005"
},
{
"name": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171",
"refsource": "CONFIRM",
"url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171"
"url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171",
"refsource": "MISC",
"name": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171"
},
{
"name": "[oss-security] 20100819 CVE Request: SLiM insecure PATH assignment",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/8"
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/19/8"
},
{
"name": "41005",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41005"
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/10"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2946",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "[oss-security] 20100820 Re: CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with others",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/11"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "SUSE-SA:2010:040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6"
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "SUSE-SA:2010:060",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "MDVSA-2011:051",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
"url": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43291"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2"
"url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "42589",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42589"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
"url": "http://secunia.com/advisories/41321",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41321"
},
{
"name": "[oss-security] 20100820 CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with others",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/1"
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/1"
},
{
"name": "41321",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41321"
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/11"
},
{
"name": "SUSE-SA:2010:054",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
"url": "http://www.securityfocus.com/bid/42589",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42589"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2947",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42592",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42592"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"name": "MDVSA-2010:165",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165"
"url": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59",
"refsource": "MISC",
"name": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59"
},
{
"name": "ADV-2010-2232",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2232"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165"
},
{
"name": "[oss-security] 20100820 CVE Request: heap-based buffer overflow in libHX",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/5"
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/12"
},
{
"name": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commit;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59",
"refsource": "CONFIRM",
"url": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commit;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59"
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/5"
},
{
"name": "[oss-security] 20100820 Re: CVE Request: heap-based buffer overflow in libHX",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/12"
"url": "http://www.securityfocus.com/bid/42592",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42592"
},
{
"name": "SUSE-SR:2010:019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
"url": "http://www.vupen.com/english/advisories/2010/2232",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2232"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625866",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625866"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625866",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625866"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2948 Quagga (bgpd): Stack buffer overflow by processing certain Route-Refresh messages"
"value": "Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Stack-based Buffer Overflow",
"cweId": "CWE-121"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:0.98.3-4.el4_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:0.98.6-5.el5_5.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:0.99.15-5.el6_0.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -96,11 +73,6 @@
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0785.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0785",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0785"
},
{
"url": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3",
"refsource": "MISC",
@ -191,46 +163,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3124"
},
{
"url": "https://access.redhat.com/errata/RHSA-2010:0945",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0945"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2948",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2948"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626783",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626783"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2949",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2010-2304",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2304"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
},
{
"name": "42498",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42498"
"url": "http://secunia.com/advisories/42397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42397"
},
{
"name": "[oss-security] 20100824 CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/3"
"url": "http://www.vupen.com/english/advisories/2010/3097",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3097"
},
{
"name": "41238",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41238"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"name": "SUSE-SR:2010:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
"url": "http://secunia.com/advisories/41038",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41038"
},
{
"name": "42642",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42642"
"url": "http://secunia.com/advisories/41238",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41238"
},
{
"name": "41038",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41038"
"url": "http://secunia.com/advisories/42446",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42446"
},
{
"name": "GLSA-201202-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
"url": "http://secunia.com/advisories/42498",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42498"
},
{
"name": "42397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42397"
"url": "http://secunia.com/advisories/48106",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48106"
},
{
"name": "DSA-2104",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2104"
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "USN-1027-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1027-1"
"url": "http://www.debian.org/security/2010/dsa-2104",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2104"
},
{
"name": "42446",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42446"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174"
},
{
"name": "SUSE-SU-2011:1316",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/24/3"
},
{
"name": "http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb",
"refsource": "CONFIRM",
"url": "http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb"
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/4"
},
{
"name": "MDVSA-2010:174",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174"
"url": "http://www.quagga.net/news2.php?y=2010&m=8&d=19",
"refsource": "MISC",
"name": "http://www.quagga.net/news2.php?y=2010&m=8&d=19"
},
{
"name": "48106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48106"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0945.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0945.html"
},
{
"name": "ADV-2010-3097",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3097"
"url": "http://www.ubuntu.com/usn/USN-1027-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1027-1"
},
{
"name": "[oss-security] 20100825 Re: CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/4"
"url": "http://www.vupen.com/english/advisories/2010/2304",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2304"
},
{
"name": "RHSA-2010:0945",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0945.html"
"url": "http://www.vupen.com/english/advisories/2010/3124",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3124"
},
{
"name": "http://www.quagga.net/news2.php?y=2010&m=8&d=19",
"refsource": "CONFIRM",
"url": "http://www.quagga.net/news2.php?y=2010&m=8&d=19"
"url": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb",
"refsource": "MISC",
"name": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb"
},
{
"name": "ADV-2010-3124",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/3124"
"url": "http://www.securityfocus.com/bid/42642",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42642"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626795",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626795"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626795",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626795"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2951",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/6"
"url": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072",
"refsource": "MISC",
"name": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072"
},
{
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/7"
"url": "http://bugs.gentoo.org/show_bug.cgi?id=334263",
"refsource": "MISC",
"name": "http://bugs.gentoo.org/show_bug.cgi?id=334263"
},
{
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3009",
"refsource": "CONFIRM",
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3009"
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3009",
"refsource": "MISC",
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3009"
},
{
"name": "[squid-users] 20100824 Squid 3.1.7 is available",
"refsource": "MLIST",
"url": "http://marc.info/?l=squid-users&m=128263555724981&w=2"
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3021",
"refsource": "MISC",
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3021"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626927",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626927"
"url": "http://marc.info/?l=squid-users&m=128263555724981&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=squid-users&m=128263555724981&w=2"
},
{
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3021",
"refsource": "CONFIRM",
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3021"
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/24/6"
},
{
"name": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072",
"refsource": "CONFIRM",
"url": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072"
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/24/7"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=334263",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=334263"
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/2"
},
{
"name": "[oss-security] 20100824 CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/6"
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/6"
},
{
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/2"
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch",
"refsource": "MISC",
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626927",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626927"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2953",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.nth-dimension.org.uk/blog.php?id=87",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412",
"refsource": "MISC",
"url": "http://www.nth-dimension.org.uk/blog.php?id=87"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412"
},
{
"name": "ADV-2010-2341",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2341"
"url": "http://secunia.com/advisories/41383",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41383"
},
{
"name": "41383",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41383"
"url": "http://www.debian.org/security/2010/dsa-2107",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2107"
},
{
"name": "42758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42758"
"url": "http://www.nth-dimension.org.uk/blog.php?id=87",
"refsource": "MISC",
"name": "http://www.nth-dimension.org.uk/blog.php?id=87"
},
{
"name": "[oss-security] 20100829 Hardening the linker (was Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only))",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/29/4"
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/7"
},
{
"name": "[oss-security] 20100826 Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/5"
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/26/1"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412"
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/26/5"
},
{
"name": "[oss-security] 20100826 Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/1"
"url": "http://www.openwall.com/lists/oss-security/2010/08/29/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/29/4"
},
{
"name": "[oss-security] 20100825 CVE request: CouchDB insecure library loading (Debian/Ubuntu only)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/7"
"url": "http://www.securityfocus.com/bid/42758",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42758"
},
{
"name": "DSA-2107",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2107"
"url": "http://www.vupen.com/english/advisories/2010/2341",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2341"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2010-2954 kernel: NULL deref and panic in irda"
"value": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -40,8 +39,8 @@
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -130,44 +129,14 @@
"name": "http://www.vupen.com/english/advisories/2010/2266"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2954",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2954"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628770",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628770"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2955",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "RHSA-2010:0771",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html"
},
{
"name": "42885",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42885"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git;a=commit;h=42da2f948d949efd0111309f5827bf0298bcc9a4",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git;a=commit;h=42da2f948d949efd0111309f5827bf0298bcc9a4"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/127"
},
{
"name": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"url": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch"
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/351"
},
{
"name": "RHSA-2010:0842",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html"
},
{
"name": "[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/08/31/1"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/27/413"
},
{
"name": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290",
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"url": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290"
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628434",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "41245",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41245"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0842.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
},
{
"name": "[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak",
"refsource": "MLIST",
"url": "http://lkml.org/lkml/2010/8/30/146"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0771.html"
},
{
"name": "SUSE-SA:2010:054",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
"url": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290",
"refsource": "MISC",
"name": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4"
},
{
"url": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch",
"refsource": "MISC",
"name": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch"
},
{
"url": "http://lkml.org/lkml/2010/8/27/413",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/27/413"
},
{
"url": "http://lkml.org/lkml/2010/8/30/127",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/30/127"
},
{
"url": "http://lkml.org/lkml/2010/8/30/146",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/30/146"
},
{
"url": "http://lkml.org/lkml/2010/8/30/351",
"refsource": "MISC",
"name": "http://lkml.org/lkml/2010/8/30/351"
},
{
"url": "http://secunia.com/advisories/41245",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41245"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/31/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/31/1"
},
{
"url": "http://www.securityfocus.com/bid/42885",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42885"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628434"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2956",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "ADV-2010-2312",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2312"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628628",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628628"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
},
{
"name": "ADV-2010-2318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2318"
"url": "http://secunia.com/advisories/40508",
"refsource": "MISC",
"name": "http://secunia.com/advisories/40508"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html"
"url": "http://secunia.com/advisories/41316",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41316"
},
{
"name": "MDVSA-2010:175",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175"
"url": "http://secunia.com/advisories/42787",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42787"
},
{
"name": "ADV-2010-2320",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2320"
"url": "http://security.gentoo.org/glsa/glsa-201009-03.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201009-03.xml"
},
{
"name": "20101027 rPSA-2010-0075-1 sudo",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/514489/100/0/threaded"
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0075",
"refsource": "MISC",
"name": "http://wiki.rpath.com/Advisories:rPSA-2010-0075"
},
{
"name": "ADV-2010-2358",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2358"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175"
},
{
"name": "http://www.sudo.ws/sudo/alerts/runas_group.html",
"refsource": "CONFIRM",
"url": "http://www.sudo.ws/sudo/alerts/runas_group.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0675.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0675.html"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2010-0075",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0075"
"url": "http://www.securityfocus.com/archive/1/514489/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/514489/100/0/threaded"
},
{
"name": "FEDORA-2010-14355",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html"
"url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/515545/100/0/threaded"
},
{
"name": "GLSA-201009-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201009-03.xml"
"url": "http://www.securityfocus.com/bid/43019",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/43019"
},
{
"name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded"
"url": "http://www.securitytracker.com/id?1024392",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1024392"
},
{
"name": "SUSE-SR:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
"url": "http://www.sudo.ws/sudo/alerts/runas_group.html",
"refsource": "MISC",
"name": "http://www.sudo.ws/sudo/alerts/runas_group.html"
},
{
"name": "43019",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43019"
"url": "http://www.ubuntu.com/usn/USN-983-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-983-1"
},
{
"name": "RHSA-2010:0675",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0675.html"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html"
},
{
"name": "40508",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40508"
"url": "http://www.vupen.com/english/advisories/2010/2312",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2312"
},
{
"name": "1024392",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024392"
"url": "http://www.vupen.com/english/advisories/2010/2318",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2318"
},
{
"name": "42787",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42787"
"url": "http://www.vupen.com/english/advisories/2010/2320",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2320"
},
{
"name": "ADV-2011-0025",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0025"
"url": "http://www.vupen.com/english/advisories/2010/2358",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2358"
},
{
"name": "USN-983-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-983-1"
"url": "http://www.vupen.com/english/advisories/2011/0025",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0025"
},
{
"name": "41316",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41316"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628628",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628628"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3066",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "1024708",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024708"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "RHSA-2010:0839",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631716",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716"
"url": "http://securitytracker.com/id?1024708",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024708"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631716"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3067",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,147 +27,171 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "42778",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42778"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
},
{
"name": "42801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42801"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0298"
},
{
"name": "SUSE-SA:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
"url": "http://secunia.com/advisories/42890",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42890"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
},
{
"name": "SUSE-SA:2011:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
},
{
"name": "RHSA-2011:0007",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
"url": "http://secunia.com/advisories/42778",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42778"
},
{
"name": "SUSE-SA:2011:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
"url": "http://secunia.com/advisories/42801",
"refsource": "MISC",
"name": "http://secunia.com/advisories/42801"
},
{
"name": "SUSE-SA:2010:060",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
"url": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "MISC",
"name": "http://www.debian.org/security/2010/dsa-2126"
},
{
"name": "ADV-2011-0298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0298"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
},
{
"name": "MDVSA-2011:051",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
"url": "http://www.vupen.com/english/advisories/2011/0012",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0012"
},
{
"name": "RHSA-2010:0839",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
},
{
"name": "MDVSA-2010:257",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
"url": "http://secunia.com/advisories/43291",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43291"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "ADV-2011-0375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0375"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
},
{
"name": "42890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42890"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "ADV-2011-0012",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0012"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "kernel-doiosubmit-dos(61884)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
"url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0375"
},
{
"name": "SUSE-SA:2011:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
},
{
"name": "MDVSA-2011:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"name": "RHSA-2010:0758",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"name": "43291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43291"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"name": "RHSA-2010:0779",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"name": "DSA-2126",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2126"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1078",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681259",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86"
"url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "RHSA-2012:1156",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1156.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4c896e1471aec3b004a693c689f60be3b17ac86"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1156.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1156.html"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1079",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681260",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"name": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html",
"url": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html"
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"url": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html"
},
{
"url": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1080",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
"url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a"
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681262",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
"url": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d846f71195d57b0bbb143382647c2c6638b04c5a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1081",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,107 +27,131 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "GLSA-201406-36",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-36.xml"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "openldap-modrdnc-dos(66239)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239"
"url": "http://secunia.com/advisories/43331",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43331"
},
{
"name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/01/15"
"url": "http://secunia.com/advisories/43718",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43718"
},
{
"name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/01/11"
"url": "http://security.gentoo.org/glsa/glsa-201406-36.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201406-36.xml"
},
{
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768",
"refsource": "CONFIRM",
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055"
},
{
"name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available",
"refsource": "MLIST",
"url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056"
},
{
"name": "MDVSA-2011:056",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056"
"url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html",
"refsource": "MISC",
"name": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=674985",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=674985"
"url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-0347.html"
},
{
"name": "RHSA-2011:0347",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html"
"url": "http://www.ubuntu.com/usn/USN-1100-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1100-1"
},
{
"name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/28/1"
"url": "http://www.vupen.com/english/advisories/2011/0665",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0665"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=674985",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=674985"
},
{
"name": "MDVSA-2011:055",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055"
"url": "http://openwall.com/lists/oss-security/2011/02/28/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/02/28/1"
},
{
"name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/02/28/2"
"url": "http://openwall.com/lists/oss-security/2011/02/28/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/02/28/2"
},
{
"name": "43718",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43718"
"url": "http://openwall.com/lists/oss-security/2011/03/01/11",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/01/11"
},
{
"name": "USN-1100-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1100-1"
"url": "http://openwall.com/lists/oss-security/2011/03/01/15",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/01/15"
},
{
"name": "1025191",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025191"
"url": "http://securitytracker.com/id?1025191",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1025191"
},
{
"name": "ADV-2011-0665",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0665"
"url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9",
"refsource": "MISC",
"name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9"
},
{
"name": "43331",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43331"
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768",
"refsource": "MISC",
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680975",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239"
},
{
"name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9",
"refsource": "CONFIRM",
"url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680975"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "tomcat-servletsecurity-sec-bypass(65971)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971"
"url": "http://tomcat.apache.org/security-7.html",
"refsource": "MISC",
"name": "http://tomcat.apache.org/security-7.html"
},
{
"name": "20110315 [SECURITY] CVE-2011-1088 Apache Tomcat security constraint bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517013/100/0/threaded"
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E",
"refsource": "MISC",
"name": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E"
},
{
"name": "43684",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43684"
"url": "http://markmail.org/message/lzx5273wsgl5pob6",
"refsource": "MISC",
"name": "http://markmail.org/message/lzx5273wsgl5pob6"
},
{
"name": "46685",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46685"
"url": "http://markmail.org/message/yzmyn44f5aetmm2r",
"refsource": "MISC",
"name": "http://markmail.org/message/yzmyn44f5aetmm2r"
},
{
"name": "ADV-2011-0563",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0563"
"url": "http://secunia.com/advisories/43684",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43684"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076586",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076586"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076587",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076587"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076587",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076587"
},
{
"name": "71027",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71027"
"url": "http://svn.apache.org/viewvc?view=revision&revision=1077995",
"refsource": "MISC",
"name": "http://svn.apache.org/viewvc?view=revision&revision=1077995"
},
{
"name": "1025215",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025215"
"url": "http://www.osvdb.org/71027",
"refsource": "MISC",
"name": "http://www.osvdb.org/71027"
},
{
"name": "[announce] 20110302 [SECURITY] Tomcat 7 ignores @ServletSecurity annotations",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E"
"url": "http://www.securityfocus.com/archive/1/517013/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/517013/100/0/threaded"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076586",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076586"
"url": "http://www.securityfocus.com/bid/46685",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46685"
},
{
"name": "[users] 20110302 Re: @DenyAll does nothing",
"refsource": "MLIST",
"url": "http://markmail.org/message/lzx5273wsgl5pob6"
"url": "http://www.securitytracker.com/id?1025215",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1025215"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1077995",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1077995"
"url": "http://www.vupen.com/english/advisories/2011/0563",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0563"
},
{
"name": "[users] 20110302 Re: @DenyAll does nothing",
"refsource": "MLIST",
"url": "http://markmail.org/message/yzmyn44f5aetmm2r"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1089",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,117 +27,141 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/5"
},
{
"name": "[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/9"
},
{
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178",
"refsource": "MISC",
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625"
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
},
{
"name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/22/6"
},
{
"name": "46740",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46740"
},
{
"name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/22/4"
},
{
"name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/05/7"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688980",
"url": "http://openwall.com/lists/oss-security/2011/03/04/10",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980"
"name": "http://openwall.com/lists/oss-security/2011/03/04/10"
},
{
"name": "[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/07/9"
"url": "http://openwall.com/lists/oss-security/2011/03/04/11",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/04/11"
},
{
"name": "MDVSA-2011:178",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
"url": "http://openwall.com/lists/oss-security/2011/03/04/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/04/12"
},
{
"name": "[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/04/01/2"
"url": "http://openwall.com/lists/oss-security/2011/03/04/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/04/9"
},
{
"name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/10"
"url": "http://openwall.com/lists/oss-security/2011/03/05/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/05/3"
},
{
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/16"
"url": "http://openwall.com/lists/oss-security/2011/03/05/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/05/7"
},
{
"name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/31/4"
"url": "http://openwall.com/lists/oss-security/2011/03/07/9",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/07/9"
},
{
"name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/12"
"url": "http://openwall.com/lists/oss-security/2011/03/14/16",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/14/16"
},
{
"name": "MDVSA-2011:179",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
"url": "http://openwall.com/lists/oss-security/2011/03/14/5",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/14/5"
},
{
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/7"
"url": "http://openwall.com/lists/oss-security/2011/03/14/7",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/14/7"
},
{
"name": "[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/04/11"
"url": "http://openwall.com/lists/oss-security/2011/03/15/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/15/6"
},
{
"name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/05/3"
"url": "http://openwall.com/lists/oss-security/2011/03/22/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/22/4"
},
{
"name": "RHSA-2011:1526",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html"
"url": "http://openwall.com/lists/oss-security/2011/03/22/6",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/22/6"
},
{
"name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/31/3"
"url": "http://openwall.com/lists/oss-security/2011/03/31/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/31/3"
},
{
"name": "[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/15/6"
"url": "http://openwall.com/lists/oss-security/2011/03/31/4",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/31/4"
},
{
"url": "http://openwall.com/lists/oss-security/2011/04/01/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/04/01/2"
},
{
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625",
"refsource": "MISC",
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-1526.html"
},
{
"url": "http://www.securityfocus.com/bid/46740",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46740"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688980"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1090",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/07/2"
"url": "http://secunia.com/advisories/46397",
"refsource": "MISC",
"name": "http://secunia.com/advisories/46397"
},
{
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"name": "46397",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46397"
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"name": "1025336",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025336"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682641",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc"
"url": "http://openwall.com/lists/oss-security/2011/03/07/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/07/12"
},
{
"name": "[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/07/12"
"url": "http://openwall.com/lists/oss-security/2011/03/07/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/07/2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
"url": "http://securitytracker.com/id?1025336",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1025336"
},
{
"name": "SUSE-SU-2015:0812",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-1091 Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in"
"value": "libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
"value": "n/a"
}
]
}
@ -32,38 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.6-7.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.6-5.el5_7.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.9-3.el6",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -156,26 +133,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0703"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0616",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0616"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:1371",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:1371"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-1091",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1091"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=683031"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055",
"refsource": "MISC",
@ -190,31 +147,11 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402",
"refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=683031"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-1098 logrotate: TOCTOU race condition by creation of new files (between opening the file and moment, final permissions have been applied) [information disclosure]"
"value": "Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"cweId": "CWE-367"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.7.8-12.el6_0.1",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -264,46 +263,11 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0961"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0407",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0407"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-1098",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1098"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680798",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680798"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
]
}
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1158",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110314 CVE request for python-feedparser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/14/18"
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html"
},
{
"name": "http://support.novell.com/security/cve/CVE-2011-1158.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/security/cve/CVE-2011-1158.html"
"url": "http://openwall.com/lists/oss-security/2011/03/14/18",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/14/18"
},
{
"name": "43730",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43730"
"url": "http://openwall.com/lists/oss-security/2011/03/15/11",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/15/11"
},
{
"name": "https://code.google.com/p/feedparser/issues/detail?id=255",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/feedparser/issues/detail?id=255"
"url": "http://secunia.com/advisories/43730",
"refsource": "MISC",
"name": "http://secunia.com/advisories/43730"
},
{
"name": "46867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46867"
"url": "http://secunia.com/advisories/44074",
"refsource": "MISC",
"name": "http://secunia.com/advisories/44074"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684877",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684877"
"url": "http://support.novell.com/security/cve/CVE-2011-1158.html",
"refsource": "MISC",
"name": "http://support.novell.com/security/cve/CVE-2011-1158.html"
},
{
"name": "44074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44074"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082"
},
{
"name": "[oss-security] 20110315 Re: CVE request for python-feedparser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/15/11"
"url": "http://www.securityfocus.com/bid/46867",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46867"
},
{
"name": "[opensuse-updates] 20110408 openSUSE-SU-2011:0314-1 (moderate): python-feedparser security update",
"refsource": "MLIST",
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=680074",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=680074"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=680074",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=680074"
"url": "https://code.google.com/p/feedparser/issues/detail?id=255",
"refsource": "MISC",
"name": "https://code.google.com/p/feedparser/issues/detail?id=255"
},
{
"name": "MDVSA-2011:082",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684877",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684877"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1160",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1309d7afbed112f0e8e90be9af975550caa0076b"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684671",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b"
},
{
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://www.openwall.com/lists/oss-security/2011/03/15/13",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/15/13"
},
{
"name": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b"
"url": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b"
},
{
"name": "[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/15/13"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684671"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2011-1168 kdelibs: partially universal XSS in Konqueror error pages"
"value": "Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "6:4.3.4-11.el6_0.2",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -74,11 +73,6 @@
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0990"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:0464",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0464"
},
{
"url": "http://secunia.com/advisories/44065",
"refsource": "MISC",
@ -140,44 +134,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0928"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-1168",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1168"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695398",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=695398"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1169",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688898",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688898"
"url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671"
},
{
"name": "[oss-security] 20110318 CVE request: kernel: AudioScience HPI driver",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/18/1"
"url": "http://openwall.com/lists/oss-security/2011/03/18/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/18/1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=4a122c10fbfe9020df469f0f669da129c5757671",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=4a122c10fbfe9020df469f0f669da129c5757671"
"url": "http://openwall.com/lists/oss-security/2011/03/18/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/18/2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1"
},
{
"name": "[oss-security] 20110318 Re: CVE request: kernel: AudioScience HPI driver",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/03/18/2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688898",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688898"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1170",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "8282",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8282"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689321",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
},
{
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143"
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "[netfilter-devel] 20110310 [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace",
"refsource": "MLIST",
"url": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
"url": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2"
},
{
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
"url": "http://securityreason.com/securityalert/8278",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8278"
},
{
"name": "8278",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8278"
"url": "http://securityreason.com/securityalert/8282",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8282"
},
{
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1171",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,62 +27,86 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "8283",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8283"
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689327",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
},
{
"name": "[linux-kernel] 20110310 [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2"
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
"url": "http://securityreason.com/securityalert/8278",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8278"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=78b79876761b86653df89c48a7010b5cbd41a84a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=78b79876761b86653df89c48a7010b5cbd41a84a"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a"
},
{
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
"url": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2"
},
{
"name": "8278",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8278"
"url": "http://securityreason.com/securityalert/8283",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8283"
},
{
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0866",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.postgresql.org/about/news/1377/",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news/1377/"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "MDVSA-2012:027",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
},
{
"name": "49273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49273"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
},
{
"name": "RHSA-2012:0678",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
},
{
"name": "MDVSA-2012:026",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
"url": "http://secunia.com/advisories/49272",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49272"
},
{
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
"url": "http://secunia.com/advisories/49273",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49273"
},
{
"name": "MDVSA-2012:092",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092"
"url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2418"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
},
{
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
},
{
"name": "DSA-2418",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2418"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092"
},
{
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"name": "49272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49272"
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
},
{
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"name": "RHSA-2012:0677",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"name": "openSUSE-SU-2012:1173",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0867",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.postgresql.org/about/news/1377/",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news/1377/"
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
},
{
"name": "49273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49273"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
},
{
"name": "RHSA-2012:0678",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
"url": "http://secunia.com/advisories/49273",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49273"
},
{
"name": "MDVSA-2012:026",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
"url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2418"
},
{
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
},
{
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"name": "DSA-2418",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2418"
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"name": "openSUSE-SU-2012:1173",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0868",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,77 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.postgresql.org/about/news/1377/",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news/1377/"
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MISC",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
},
{
"name": "MDVSA-2012:027",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
},
{
"name": "49273",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49273"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
},
{
"name": "RHSA-2012:0678",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
},
{
"name": "MDVSA-2012:026",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
"url": "http://secunia.com/advisories/49272",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49272"
},
{
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
"url": "http://secunia.com/advisories/49273",
"refsource": "MISC",
"name": "http://secunia.com/advisories/49273"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
"url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2418"
},
{
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
},
{
"name": "DSA-2418",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2418"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
},
{
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"name": "49272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49272"
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
},
{
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"name": "RHSA-2012:0677",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"name": "openSUSE-SU-2012:1173",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-0870 samba: Any Batched (\"AndX\") request processing infinite recursion and heap-based buffer overflow"
"value": "Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,49 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 4",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-0.35.el4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.38.el5_8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.3 Long Life",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.7.el5_3.4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.6 EUS - Server Only",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.29.el5_6.4",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -142,60 +108,20 @@
"refsource": "MISC",
"name": "http://secunia.com/advisories/48844"
},
{
"url": "http://www.samba.org/samba/security/CVE-2012-0870",
"refsource": "MISC",
"name": "http://www.samba.org/samba/security/CVE-2012-0870"
},
{
"url": "http://www.ubuntu.com/usn/USN-1374-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1374-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:0332",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0332"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-0870",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-0870"
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795509"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0874",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 do not require authentication by default in certain profiles, which might allow remote attackers to invoke MBean methods and execute arbitrary code via unspecified vectors. NOTE: this issue can only be exploited when the interceptor is not properly configured with a \"second layer of authentication,\" or when used in conjunction with other vulnerabilities that bypass this second layer."
"value": "The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 do not require authentication by default in certain profiles, which might allow remote attackers to invoke MBean methods and execute arbitrary code via unspecified vectors. NOTE: this issue can only be exploited when the interceptor is not properly configured with a \"second layer of authentication,\" or when used in conjunction with other vulnerabilities that bypass this second layer."
}
]
},
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0192",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
},
{
"name": "RHSA-2013:0198",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
},
{
"name": "RHSA-2013:0195",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
},
{
"name": "RHSA-2013:0221",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
},
{
"name": "RHSA-2013:0196",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
},
{
"name": "57552",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57552"
},
{
"name": "RHSA-2013:0193",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
},
{
"name": "51984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51984"
},
{
"name": "1028042",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1028042"
},
{
"name": "52054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52054"
},
{
"name": "20131219 ESA-2013-094: EMC Data Protection Advisor JBOSS Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html"
},
{
"name": "RHSA-2013:0191",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795645",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795645"
"name": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
},
{
"name": "RHSA-2013:0533",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
},
{
"name": "RHSA-2013:0197",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
},
{
"name": "30211",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/30211"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
},
{
"name": "jboss-eap-jmxinvokerhaservlet-code-exec(81511)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
},
{
"name": "RHSA-2013:0194",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
},
{
"url": "http://secunia.com/advisories/51984",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51984"
},
{
"url": "http://secunia.com/advisories/52054",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52054"
},
{
"url": "http://securitytracker.com/id?1028042",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1028042"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html"
},
{
"url": "http://www.exploit-db.com/exploits/30211",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/30211"
},
{
"url": "http://www.securityfocus.com/bid/57552",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57552"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795645",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795645"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0875",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:0376",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0376.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html"
},
{
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714",
"refsource": "CONFIRM",
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714"
"url": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987",
"refsource": "MISC",
"name": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987"
},
{
"name": "1026777",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1026777"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0376.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0376.html"
},
{
"name": "[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data",
"refsource": "MLIST",
"url": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987"
"url": "http://securitytracker.com/id?1026777",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1026777"
},
{
"name": "http://sourceware.org/git/?p=systemtap.git;a=commit;h=64b0cff3b",
"refsource": "CONFIRM",
"url": "http://sourceware.org/git/?p=systemtap.git;a=commit;h=64b0cff3b"
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714",
"refsource": "MISC",
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714"
},
{
"name": "openSUSE-SU-2013:0475",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html"
"url": "http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b",
"refsource": "MISC",
"name": "http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0877",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PyXML",
"product": {
"product_data": [
{
"product_name": "PyXML",
"version": {
"version_data": [
{
"version_value": "through 2012-02-03"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PyXML",
"product": {
"product_data": [
{
"product_name": "PyXML",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 2012-02-03"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0877",
"url": "http://seclists.org/oss-sec/2014/q3/96",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-0877"
"name": "http://seclists.org/oss-sec/2014/q3/96"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877",
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/11",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877"
"name": "http://www.openwall.com/lists/oss-security/2014/07/08/11"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-0877",
@ -68,14 +69,14 @@
"name": "https://access.redhat.com/security/cve/cve-2012-0877"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q3/96",
"url": "http://seclists.org/oss-sec/2014/q3/96"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0877",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2014/07/08/11",
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/11"
"name": "https://security-tracker.debian.org/tracker/CVE-2012-0877"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0878",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=796790",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796790"
},
{
"name": "[oss-security] 20120223 CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with \"paster serve\" as root",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/1"
},
{
"name": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve",
"url": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471",
"refsource": "MISC",
"url": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve"
"name": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471"
},
{
"name": "48812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48812"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1206.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1206.html"
},
{
"name": "[oss-security] 20120223 Re: CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with \"paster serve\" as root",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/4"
"url": "http://secunia.com/advisories/48812",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48812"
},
{
"name": "RHSA-2012:1206",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1206.html"
"url": "http://secunia.com/advisories/50410",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50410"
},
{
"name": "50410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50410"
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/23/1"
},
{
"name": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471",
"refsource": "CONFIRM",
"url": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471"
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/23/4"
},
{
"name": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4",
"refsource": "CONFIRM",
"url": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4"
"url": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4",
"refsource": "MISC",
"name": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4"
},
{
"url": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve",
"refsource": "MISC",
"name": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796790",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=796790"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0880",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=787103",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787103"
"url": "http://seclists.org/oss-sec/2014/q3/96",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q3/96"
},
{
"name": "[oss-security] 20140708 Summer bug cleaning - some Hash DoS stuff",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q3/96"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787103",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=787103"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=20ed7b24df05eadf83168d1d0ce0052a31380928",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=20ed7b24df05eadf83168d1d0ce0052a31380928"
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8"
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=797878",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797878"
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8"
},
{
"name": "HPSBGN02970",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797878",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=797878"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1090",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
},
{
"name": "RHSA-2012:0531",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
},
{
"name": "SUSE-SU-2012:0554",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
"url": "http://secunia.com/advisories/48964",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48964"
},
{
"name": "RHSA-2012:0481",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
},
{
"name": "48964",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48964"
"url": "http://secunia.com/advisories/48842",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48842"
},
{
"name": "SUSE-SU-2012:0616",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798293",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798293"
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/4"
},
{
"name": "48842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48842"
"url": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08"
},
{
"name": "[oss-security] 20120228 Re: CVE request -- kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/4"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798293",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798293"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1094",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "JBoss AS 7",
"version": {
"version_data": [
{
"version_value": "prior to 7.1.1"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "JBoss AS 7",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to 7.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-1094",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1094"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1095",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120301 Re: Re: CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/2"
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798353",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798353"
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/15"
},
{
"name": "[oss-security] 20120228 Re: CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/15"
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/9"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=749335",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=749335"
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/02/2"
},
{
"name": "[oss-security] 20120228 CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/9"
"url": "https://bugzilla.novell.com/show_bug.cgi?id=749335",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=749335"
},
{
"name": "openSUSE-SU-2012:0400",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798353",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798353"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1096",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "NetworkManager",
"version": {
"version_data": [
{
"version_value": "0.9 and earlier"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,12 +27,46 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "NetworkManager",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.9 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-1096",
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/3",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-1096"
"name": "http://www.openwall.com/lists/oss-security/2012/03/02/3"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-1096",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1096"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=793329",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=793329"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1096",
@ -68,19 +79,9 @@
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-1096"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-1096",
"url": "https://security-tracker.debian.org/tracker/CVE-2012-1096",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1096"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/02/3"
},
{
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=793329",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=793329"
"name": "https://security-tracker.debian.org/tracker/CVE-2012-1096"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1097",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2012:0531",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
},
{
"name": "SUSE-SU-2012:0554",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
"url": "http://secunia.com/advisories/48898",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48898"
},
{
"name": "48898",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48898"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=799209",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799209"
"url": "http://secunia.com/advisories/48964",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48964"
},
{
"name": "RHSA-2012:0481",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
},
{
"name": "[oss-security] 20120305 CVE-2012-1097 kernel: regset: Prevent null pointer reference on readonly regsets",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/05/1"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
"url": "http://secunia.com/advisories/48842",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48842"
},
{
"name": "48964",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48964"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
},
{
"name": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e"
},
{
"name": "SUSE-SU-2012:0616",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
"url": "http://www.openwall.com/lists/oss-security/2012/03/05/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/05/1"
},
{
"name": "48842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48842"
"url": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799209",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=799209"
}
]
}

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-0433",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in vim/vim"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vim/vim",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "9.0.1225"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-0433",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in vim/vim"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vim/vim",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "9.0.1225"
}
]
}
}
]
},
"vendor_name": "vim"
}
}
]
},
"vendor_name": "vim"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e"
},
{
"name": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b",
"refsource": "MISC",
"url": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b"
}
]
},
"source": {
"advisory": "ae933869-a1ec-402a-bbea-d51764c6618e",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e"
},
{
"name": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b",
"refsource": "MISC",
"url": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-2db4df65c3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/"
}
]
},
"source": {
"advisory": "ae933869-a1ec-402a-bbea-d51764c6618e",
"discovery": "EXTERNAL"
}
}

View File

@ -66,6 +66,11 @@
"url": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh",
"refsource": "MISC",
"name": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-4e6353c6f7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/"
}
]
}