"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 03:02:14 +00:00
parent a15af619fe
commit 4f598c7ce2
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
46 changed files with 2508 additions and 2832 deletions

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2942 kernel: net sched: fix some kernel memory leaks" "value": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Missing Release of Memory after Effective Lifetime", "value": "n/a"
"cweId": "CWE-401"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "MRG for RHEL-5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.6.33.7-rt29.45.el5rt", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 4",
"version": {
"version_data": [
{
"version_value": "0:2.6.9-89.31.1.EL",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-194.17.1.el5",
"version_affected": "!"
} }
] ]
} }
@ -121,11 +98,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0771",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0771"
},
{ {
"url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html", "url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html",
"refsource": "MISC", "refsource": "MISC",
@ -141,11 +113,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0723",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0723"
},
{ {
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html",
"refsource": "MISC", "refsource": "MISC",
@ -196,46 +163,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42529" "name": "http://www.securityfocus.com/bid/42529"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0779",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0779"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2942",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2942"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624903",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624903" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=624903"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2943", "ID": "CVE-2010-2943",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,132 +27,156 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771" "product_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7124fe0a5b619d65b739477b3b55a20bf805b06d", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7124fe0a5b619d65b739477b3b55a20bf805b06d" "version_data": [
},
{ {
"name": "42527", "version_affected": "=",
"refsource": "BID", "version_value": "n/a"
"url": "http://www.securityfocus.com/bid/42527" }
}, ]
{ }
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7b6259e7a83647948fa33a736cc832310c8d85aa", }
"refsource": "CONFIRM", ]
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7b6259e7a83647948fa33a736cc832310c8d85aa" }
}, }
{ ]
"name": "RHSA-2010:0723", }
"refsource": "REDHAT", },
"url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624923", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624923" "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
}, },
{ {
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "url": "http://secunia.com/advisories/42758",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" "name": "http://secunia.com/advisories/42758"
}, },
{ {
"name": "[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED", "url": "http://www.ubuntu.com/usn/USN-1041-1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768" "name": "http://www.ubuntu.com/usn/USN-1041-1"
}, },
{ {
"name": "46397", "url": "http://www.vupen.com/english/advisories/2011/0070",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/46397" "name": "http://www.vupen.com/english/advisories/2011/0070"
}, },
{ {
"name": "[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code", "url": "http://secunia.com/advisories/46397",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769" "name": "http://secunia.com/advisories/46397"
}, },
{ {
"name": "[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/18/2" "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{ {
"name": "[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767" "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{ {
"name": "[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2", "url": "http://support.avaya.com/css/P8/documents/100113326",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html" "name": "http://support.avaya.com/css/P8/documents/100113326"
}, },
{ {
"name": "USN-1041-1", "url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1041-1" "name": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35", "url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35" "name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767"
}, },
{ {
"name": "[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2", "url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html" "name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768"
}, },
{ {
"name": "ADV-2011-0280", "url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0280" "name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769"
}, },
{ {
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "url": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "name": "http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771"
}, },
{ {
"name": "42758", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42758" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188"
}, },
{ {
"name": "http://support.avaya.com/css/P8/documents/100113326", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://support.avaya.com/css/P8/documents/100113326" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d"
}, },
{ {
"name": "USN-1057-1", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1057-1" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa"
}, },
{ {
"name": "[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure", "url": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/5" "name": "http://oss.sgi.com/archives/xfs/2010-06/msg00191.html"
}, },
{ {
"name": "ADV-2011-0070", "url": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0070" "name": "http://oss.sgi.com/archives/xfs/2010-06/msg00198.html"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1920779e67cbf5ea8afef317777c5bf2b8096188", "url": "http://secunia.com/advisories/43161",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1920779e67cbf5ea8afef317777c5bf2b8096188" "name": "http://secunia.com/advisories/43161"
}, },
{ {
"name": "43161", "url": "http://www.openwall.com/lists/oss-security/2010/08/18/2",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43161" "name": "http://www.openwall.com/lists/oss-security/2010/08/18/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/19/5"
},
{
"url": "http://www.securityfocus.com/bid/42527",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42527"
},
{
"url": "http://www.ubuntu.com/usn/USN-1057-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1057-1"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0280",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0280"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624923",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=624923"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2945", "ID": "CVE-2010-2945",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20100820 Re: CVE Request: SLiM insecure PATH assignment", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/10" "product_data": [
},
{ {
"name": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171" "version_data": [
},
{ {
"name": "[oss-security] 20100819 CVE Request: SLiM insecure PATH assignment", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/8" }
}, ]
{ }
"name": "41005", }
"refsource": "SECUNIA", ]
"url": "http://secunia.com/advisories/41005" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://secunia.com/advisories/41005",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41005"
},
{
"url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171",
"refsource": "MISC",
"name": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/19/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/19/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/10"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2946", "ID": "CVE-2010-2946",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,97 +27,121 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "USN-1000-1", "vendor_name": "n/a",
"refsource": "UBUNTU", "product": {
"url": "http://www.ubuntu.com/usn/USN-1000-1" "product_data": [
},
{ {
"name": "[oss-security] 20100820 Re: CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with others", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/11" "version_data": [
},
{ {
"name": "SUSE-SA:2010:040", "version_affected": "=",
"refsource": "SUSE", "version_value": "n/a"
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html" }
}, ]
{ }
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6", }
"refsource": "CONFIRM", ]
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6" }
}, }
{ ]
"name": "SUSE-SA:2011:007", }
"refsource": "SUSE", },
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" "references": {
}, "reference_data": [
{ {
"name": "SUSE-SA:2010:060", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
}, },
{ {
"name": "ADV-2011-0298", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0298" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
}, },
{ {
"name": "MDVSA-2011:051", "url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" "name": "http://www.ubuntu.com/usn/USN-1000-1"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2", "url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2" "name": "http://www.vupen.com/english/advisories/2011/0298"
}, },
{ {
"name": "42589", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/42589" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
}, },
{ {
"name": "ADV-2011-0375", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0375" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
}, },
{ {
"name": "[oss-security] 20100820 CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with others", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/1" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
}, },
{ {
"name": "SUSE-SA:2011:008", "url": "http://secunia.com/advisories/43291",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" "name": "http://secunia.com/advisories/43291"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10", "url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10" "name": "http://www.vupen.com/english/advisories/2011/0375"
}, },
{ {
"name": "43291", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43291" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aca0fa34bdaba39bfddddba8ca70dba4782e8fe6"
}, },
{ {
"name": "41321", "url": "http://secunia.com/advisories/41321",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/41321" "name": "http://secunia.com/advisories/41321"
}, },
{ {
"name": "SUSE-SA:2010:054", "url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html" "name": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.10"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.51"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/11"
},
{
"url": "http://www.securityfocus.com/bid/42589",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42589"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2947", "ID": "CVE-2010-2947",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "42592", "vendor_name": "n/a",
"refsource": "BID", "product": {
"url": "http://www.securityfocus.com/bid/42592" "product_data": [
},
{ {
"name": "MDVSA-2010:165", "product_name": "n/a",
"refsource": "MANDRIVA", "version": {
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165" "version_data": [
},
{ {
"name": "ADV-2010-2232", "version_affected": "=",
"refsource": "VUPEN", "version_value": "n/a"
"url": "http://www.vupen.com/english/advisories/2010/2232" }
}, ]
{ }
"name": "[oss-security] 20100820 CVE Request: heap-based buffer overflow in libHX", }
"refsource": "MLIST", ]
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/5" }
}, }
{ ]
"name": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commit;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59", }
"refsource": "CONFIRM", },
"url": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commit;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20100820 Re: CVE Request: heap-based buffer overflow in libHX", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/12" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
}, },
{ {
"name": "SUSE-SR:2010:019", "url": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" "name": "http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625866", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625866" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:165"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/20/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/20/5"
},
{
"url": "http://www.securityfocus.com/bid/42592",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42592"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2232",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2232"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625866",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=625866"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2948 Quagga (bgpd): Stack buffer overflow by processing certain Route-Refresh messages" "value": "Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "n/a"
"cweId": "CWE-121"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:0.98.3-4.el4_8.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:0.98.6-5.el5_5.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:0.99.15-5.el6_0.1",
"version_affected": "!"
} }
] ]
} }
@ -96,11 +73,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0785.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0785",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0785"
},
{ {
"url": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3", "url": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3",
"refsource": "MISC", "refsource": "MISC",
@ -191,46 +163,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3124" "name": "http://www.vupen.com/english/advisories/2010/3124"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2010:0945",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2010:0945"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2010-2948",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2948"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626783",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626783" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=626783"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2949", "ID": "CVE-2010-2949",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,117 +27,141 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "ADV-2010-2304", "vendor_name": "n/a",
"refsource": "VUPEN", "product": {
"url": "http://www.vupen.com/english/advisories/2010/2304" "product_data": [
},
{ {
"name": "42498", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/42498" "version_data": [
},
{ {
"name": "[oss-security] 20100824 CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/3" }
}, ]
{ }
"name": "41238", }
"refsource": "SECUNIA", ]
"url": "http://secunia.com/advisories/41238" }
}, }
{ ]
"name": "SUSE-SR:2010:022", }
"refsource": "SUSE", },
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" "references": {
}, "reference_data": [
{ {
"name": "42642", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/42642" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
}, },
{ {
"name": "41038", "url": "http://secunia.com/advisories/42397",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/41038" "name": "http://secunia.com/advisories/42397"
}, },
{ {
"name": "GLSA-201202-02", "url": "http://www.vupen.com/english/advisories/2010/3097",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml" "name": "http://www.vupen.com/english/advisories/2010/3097"
}, },
{ {
"name": "42397", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42397" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
}, },
{ {
"name": "DSA-2104", "url": "http://secunia.com/advisories/41038",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2104" "name": "http://secunia.com/advisories/41038"
}, },
{ {
"name": "USN-1027-1", "url": "http://secunia.com/advisories/41238",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1027-1" "name": "http://secunia.com/advisories/41238"
}, },
{ {
"name": "42446", "url": "http://secunia.com/advisories/42446",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42446" "name": "http://secunia.com/advisories/42446"
}, },
{ {
"name": "SUSE-SU-2011:1316", "url": "http://secunia.com/advisories/42498",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html" "name": "http://secunia.com/advisories/42498"
}, },
{ {
"name": "http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb", "url": "http://secunia.com/advisories/48106",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb" "name": "http://secunia.com/advisories/48106"
}, },
{ {
"name": "MDVSA-2010:174", "url": "http://security.gentoo.org/glsa/glsa-201202-02.xml",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174" "name": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
}, },
{ {
"name": "48106", "url": "http://www.debian.org/security/2010/dsa-2104",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48106" "name": "http://www.debian.org/security/2010/dsa-2104"
}, },
{ {
"name": "ADV-2010-3097", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3097" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:174"
}, },
{ {
"name": "[oss-security] 20100825 Re: CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request", "url": "http://www.openwall.com/lists/oss-security/2010/08/24/3",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/4" "name": "http://www.openwall.com/lists/oss-security/2010/08/24/3"
}, },
{ {
"name": "RHSA-2010:0945", "url": "http://www.openwall.com/lists/oss-security/2010/08/25/4",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0945.html" "name": "http://www.openwall.com/lists/oss-security/2010/08/25/4"
}, },
{ {
"name": "http://www.quagga.net/news2.php?y=2010&m=8&d=19", "url": "http://www.quagga.net/news2.php?y=2010&m=8&d=19",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.quagga.net/news2.php?y=2010&m=8&d=19" "name": "http://www.quagga.net/news2.php?y=2010&m=8&d=19"
}, },
{ {
"name": "ADV-2010-3124", "url": "http://www.redhat.com/support/errata/RHSA-2010-0945.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3124" "name": "http://www.redhat.com/support/errata/RHSA-2010-0945.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626795", "url": "http://www.ubuntu.com/usn/USN-1027-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626795" "name": "http://www.ubuntu.com/usn/USN-1027-1"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2304",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2304"
},
{
"url": "http://www.vupen.com/english/advisories/2010/3124",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/3124"
},
{
"url": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb",
"refsource": "MISC",
"name": "http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb"
},
{
"url": "http://www.securityfocus.com/bid/42642",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42642"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626795",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626795"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2951", "ID": "CVE-2010-2951",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/6" "product_data": [
},
{ {
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/7" "version_data": [
},
{ {
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3009", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3009" }
}, ]
{ }
"name": "[squid-users] 20100824 Squid 3.1.7 is available", }
"refsource": "MLIST", ]
"url": "http://marc.info/?l=squid-users&m=128263555724981&w=2" }
}, }
{ ]
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626927", }
"refsource": "CONFIRM", },
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626927" "references": {
}, "reference_data": [
{ {
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=3021", "url": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=3021" "name": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072"
}, },
{ {
"name": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072", "url": "http://bugs.gentoo.org/show_bug.cgi?id=334263",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072" "name": "http://bugs.gentoo.org/show_bug.cgi?id=334263"
}, },
{ {
"name": "http://bugs.gentoo.org/show_bug.cgi?id=334263", "url": "http://bugs.squid-cache.org/show_bug.cgi?id=3009",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=334263" "name": "http://bugs.squid-cache.org/show_bug.cgi?id=3009"
}, },
{ {
"name": "[oss-security] 20100824 CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present", "url": "http://bugs.squid-cache.org/show_bug.cgi?id=3021",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/6" "name": "http://bugs.squid-cache.org/show_bug.cgi?id=3021"
}, },
{ {
"name": "[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present", "url": "http://marc.info/?l=squid-users&m=128263555724981&w=2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/2" "name": "http://marc.info/?l=squid-users&m=128263555724981&w=2"
}, },
{ {
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch", "url": "http://www.openwall.com/lists/oss-security/2010/08/24/6",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch" "name": "http://www.openwall.com/lists/oss-security/2010/08/24/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/24/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/24/7"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/25/6"
},
{
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch",
"refsource": "MISC",
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=626927",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=626927"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2953", "ID": "CVE-2010-2953",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.nth-dimension.org.uk/blog.php?id=87", "vendor_name": "n/a",
"refsource": "MISC", "product": {
"url": "http://www.nth-dimension.org.uk/blog.php?id=87" "product_data": [
},
{ {
"name": "ADV-2010-2341", "product_name": "n/a",
"refsource": "VUPEN", "version": {
"url": "http://www.vupen.com/english/advisories/2010/2341" "version_data": [
},
{ {
"name": "41383", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/41383" }
}, ]
{ }
"name": "42758", }
"refsource": "BID", ]
"url": "http://www.securityfocus.com/bid/42758" }
}, }
{ ]
"name": "[oss-security] 20100829 Hardening the linker (was Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only))", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2010/08/29/4" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20100826 Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only)", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/5" "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412"
}, },
{ {
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412", "url": "http://secunia.com/advisories/41383",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412" "name": "http://secunia.com/advisories/41383"
}, },
{ {
"name": "[oss-security] 20100826 Re: CVE request: CouchDB insecure library loading (Debian/Ubuntu only)", "url": "http://www.debian.org/security/2010/dsa-2107",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/1" "name": "http://www.debian.org/security/2010/dsa-2107"
}, },
{ {
"name": "[oss-security] 20100825 CVE request: CouchDB insecure library loading (Debian/Ubuntu only)", "url": "http://www.nth-dimension.org.uk/blog.php?id=87",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/25/7" "name": "http://www.nth-dimension.org.uk/blog.php?id=87"
}, },
{ {
"name": "DSA-2107", "url": "http://www.openwall.com/lists/oss-security/2010/08/25/7",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2107" "name": "http://www.openwall.com/lists/oss-security/2010/08/25/7"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/26/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/26/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/26/5"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/29/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/29/4"
},
{
"url": "http://www.securityfocus.com/bid/42758",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42758"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2341",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2341"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2010-2954 kernel: NULL deref and panic in irda" "value": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "NULL Pointer Dereference", "value": "n/a"
"cweId": "CWE-476"
} }
] ]
} }
@ -40,8 +39,8 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n/a", "version_affected": "=",
"version_affected": "=" "version_value": "n/a"
} }
] ]
} }
@ -130,44 +129,14 @@
"name": "http://www.vupen.com/english/advisories/2010/2266" "name": "http://www.vupen.com/english/advisories/2010/2266"
}, },
{ {
"url": "https://access.redhat.com/security/cve/CVE-2010-2954", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2010-2954" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628770",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628770" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628770"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61522"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2955", "ID": "CVE-2010-2955",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,97 +27,121 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "USN-1000-1", "vendor_name": "n/a",
"refsource": "UBUNTU", "product": {
"url": "http://www.ubuntu.com/usn/USN-1000-1" "product_data": [
},
{ {
"name": "RHSA-2010:0771", "product_name": "n/a",
"refsource": "REDHAT", "version": {
"url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html" "version_data": [
},
{ {
"name": "42885", "version_affected": "=",
"refsource": "BID", "version_value": "n/a"
"url": "http://www.securityfocus.com/bid/42885" }
}, ]
{ }
"name": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git;a=commit;h=42da2f948d949efd0111309f5827bf0298bcc9a4", }
"refsource": "CONFIRM", ]
"url": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git;a=commit;h=42da2f948d949efd0111309f5827bf0298bcc9a4" }
}, }
{ ]
"name": "[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl", }
"refsource": "MLIST", },
"url": "http://lkml.org/lkml/2010/8/30/127" "references": {
}, "reference_data": [
{ {
"name": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
}, },
{ {
"name": "SUSE-SA:2011:007", "url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" "name": "http://www.ubuntu.com/usn/USN-1000-1"
}, },
{ {
"name": "[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak", "url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lkml.org/lkml/2010/8/30/351" "name": "http://www.vupen.com/english/advisories/2011/0298"
}, },
{ {
"name": "RHSA-2010:0842", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0842.html"
}, },
{ {
"name": "[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/08/31/1" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"
}, },
{ {
"name": "ADV-2011-0298", "url": "http://www.redhat.com/support/errata/RHSA-2010-0771.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0298" "name": "http://www.redhat.com/support/errata/RHSA-2010-0771.html"
}, },
{ {
"name": "[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl", "url": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lkml.org/lkml/2010/8/27/413" "name": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290"
}, },
{ {
"name": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290", "url": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4",
"refsource": "MISC", "refsource": "MISC",
"url": "http://forums.grsecurity.net/viewtopic.php?f=3&t=2290" "name": "http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628434", "url": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434" "name": "http://grsecurity.net/~spender/wireless-infoleak-fix2.patch"
}, },
{ {
"name": "41245", "url": "http://lkml.org/lkml/2010/8/27/413",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/41245" "name": "http://lkml.org/lkml/2010/8/27/413"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2", "url": "http://lkml.org/lkml/2010/8/30/127",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2" "name": "http://lkml.org/lkml/2010/8/30/127"
}, },
{ {
"name": "[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak", "url": "http://lkml.org/lkml/2010/8/30/146",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lkml.org/lkml/2010/8/30/146" "name": "http://lkml.org/lkml/2010/8/30/146"
}, },
{ {
"name": "SUSE-SA:2010:054", "url": "http://lkml.org/lkml/2010/8/30/351",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html" "name": "http://lkml.org/lkml/2010/8/30/351"
},
{
"url": "http://secunia.com/advisories/41245",
"refsource": "MISC",
"name": "http://secunia.com/advisories/41245"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2010/08/31/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2010/08/31/1"
},
{
"url": "http://www.securityfocus.com/bid/42885",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/42885"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628434"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2956", "ID": "CVE-2010-2956",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,117 +27,141 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "ADV-2010-2312", "vendor_name": "n/a",
"refsource": "VUPEN", "product": {
"url": "http://www.vupen.com/english/advisories/2010/2312" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628628", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628628" "version_data": [
},
{ {
"name": "ADV-2010-2318", "version_affected": "=",
"refsource": "VUPEN", "version_value": "n/a"
"url": "http://www.vupen.com/english/advisories/2010/2318" }
}, ]
{ }
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", }
"refsource": "CONFIRM", ]
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }
}, }
{ ]
"name": "MDVSA-2010:175", }
"refsource": "MANDRIVA", },
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175" "references": {
}, "reference_data": [
{ {
"name": "ADV-2010-2320", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/2320" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html"
}, },
{ {
"name": "20101027 rPSA-2010-0075-1 sudo", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/514489/100/0/threaded" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
}, },
{ {
"name": "ADV-2010-2358", "url": "http://secunia.com/advisories/40508",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/2358" "name": "http://secunia.com/advisories/40508"
}, },
{ {
"name": "http://www.sudo.ws/sudo/alerts/runas_group.html", "url": "http://secunia.com/advisories/41316",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.sudo.ws/sudo/alerts/runas_group.html" "name": "http://secunia.com/advisories/41316"
}, },
{ {
"name": "http://wiki.rpath.com/Advisories:rPSA-2010-0075", "url": "http://secunia.com/advisories/42787",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://wiki.rpath.com/Advisories:rPSA-2010-0075" "name": "http://secunia.com/advisories/42787"
}, },
{ {
"name": "FEDORA-2010-14355", "url": "http://security.gentoo.org/glsa/glsa-201009-03.xml",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html" "name": "http://security.gentoo.org/glsa/glsa-201009-03.xml"
}, },
{ {
"name": "GLSA-201009-03", "url": "http://wiki.rpath.com/Advisories:rPSA-2010-0075",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201009-03.xml" "name": "http://wiki.rpath.com/Advisories:rPSA-2010-0075"
}, },
{ {
"name": "20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:175"
}, },
{ {
"name": "SUSE-SR:2010:017", "url": "http://www.redhat.com/support/errata/RHSA-2010-0675.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0675.html"
}, },
{ {
"name": "43019", "url": "http://www.securityfocus.com/archive/1/514489/100/0/threaded",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/43019" "name": "http://www.securityfocus.com/archive/1/514489/100/0/threaded"
}, },
{ {
"name": "RHSA-2010:0675", "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0675.html" "name": "http://www.securityfocus.com/archive/1/515545/100/0/threaded"
}, },
{ {
"name": "40508", "url": "http://www.securityfocus.com/bid/43019",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/40508" "name": "http://www.securityfocus.com/bid/43019"
}, },
{ {
"name": "1024392", "url": "http://www.securitytracker.com/id?1024392",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1024392" "name": "http://www.securitytracker.com/id?1024392"
}, },
{ {
"name": "42787", "url": "http://www.sudo.ws/sudo/alerts/runas_group.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42787" "name": "http://www.sudo.ws/sudo/alerts/runas_group.html"
}, },
{ {
"name": "ADV-2011-0025", "url": "http://www.ubuntu.com/usn/USN-983-1",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0025" "name": "http://www.ubuntu.com/usn/USN-983-1"
}, },
{ {
"name": "USN-983-1", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-983-1" "name": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html"
}, },
{ {
"name": "41316", "url": "http://www.vupen.com/english/advisories/2010/2312",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/41316" "name": "http://www.vupen.com/english/advisories/2010/2312"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2318",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2318"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2320",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2320"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2358",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2010/2358"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0025",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0025"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628628",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=628628"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3066", "ID": "CVE-2010-3066",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "vendor_name": "n/a",
"refsource": "BUGTRAQ", "product": {
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" "product_data": [
},
{ {
"name": "46397", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/46397" "version_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2" }
}, ]
{ }
"name": "1024708", }
"refsource": "SECTRACK", ]
"url": "http://securitytracker.com/id?1024708" }
}, }
{ ]
"name": "RHSA-2010:0839", }
"refsource": "REDHAT", },
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631716", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716" "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23", "url": "http://secunia.com/advisories/46397",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23" "name": "http://secunia.com/advisories/46397"
}, },
{ {
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MISC",
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2"
},
{
"url": "http://securitytracker.com/id?1024708",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1024708"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=631716",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=631716"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3067", "ID": "CVE-2010-3067",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,147 +27,171 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "42778", "vendor_name": "n/a",
"refsource": "SECUNIA", "product": {
"url": "http://secunia.com/advisories/42778" "product_data": [
},
{ {
"name": "USN-1000-1", "product_name": "n/a",
"refsource": "UBUNTU", "version": {
"url": "http://www.ubuntu.com/usn/USN-1000-1" "version_data": [
},
{ {
"name": "42801", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/42801" }
}, ]
{ }
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", }
"refsource": "BUGTRAQ", ]
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }
}, }
{ ]
"name": "46397", }
"refsource": "SECUNIA", },
"url": "http://secunia.com/advisories/46397" "references": {
}, "reference_data": [
{ {
"name": "SUSE-SA:2011:002", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2" "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"
}, },
{ {
"name": "SUSE-SA:2011:001", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
}, },
{ {
"name": "RHSA-2011:0007", "url": "http://www.ubuntu.com/usn/USN-1000-1",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" "name": "http://www.ubuntu.com/usn/USN-1000-1"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441", "url": "http://www.vupen.com/english/advisories/2011/0298",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441" "name": "http://www.vupen.com/english/advisories/2011/0298"
}, },
{ {
"name": "SUSE-SA:2011:007", "url": "http://secunia.com/advisories/42890",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" "name": "http://secunia.com/advisories/42890"
}, },
{ {
"name": "SUSE-SA:2010:060", "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" "name": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
}, },
{ {
"name": "ADV-2011-0298", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0298" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
}, },
{ {
"name": "MDVSA-2011:051", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
}, },
{ {
"name": "RHSA-2010:0839", "url": "http://secunia.com/advisories/42778",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html" "name": "http://secunia.com/advisories/42778"
}, },
{ {
"name": "MDVSA-2010:257", "url": "http://secunia.com/advisories/42801",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257" "name": "http://secunia.com/advisories/42801"
}, },
{ {
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "url": "http://www.debian.org/security/2010/dsa-2126",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "name": "http://www.debian.org/security/2010/dsa-2126"
}, },
{ {
"name": "ADV-2011-0375", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0375" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
}, },
{ {
"name": "42890", "url": "http://www.vupen.com/english/advisories/2011/0012",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/42890" "name": "http://www.vupen.com/english/advisories/2011/0012"
}, },
{ {
"name": "ADV-2011-0012", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0012" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
}, },
{ {
"name": "kernel-doiosubmit-dos(61884)", "url": "http://secunia.com/advisories/43291",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884" "name": "http://secunia.com/advisories/43291"
}, },
{ {
"name": "SUSE-SA:2011:008", "url": "http://secunia.com/advisories/46397",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" "name": "http://secunia.com/advisories/46397"
}, },
{ {
"name": "MDVSA-2011:029", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"
}, },
{ {
"name": "RHSA-2010:0758", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{ {
"name": "43291", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43291" "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478", "url": "http://www.vupen.com/english/advisories/2011/0375",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478" "name": "http://www.vupen.com/english/advisories/2011/0375"
}, },
{ {
"name": "RHSA-2010:0779", "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html" "name": "http://www.redhat.com/support/errata/RHSA-2010-0758.html"
}, },
{ {
"name": "DSA-2126", "url": "http://www.redhat.com/support/errata/RHSA-2010-0779.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2126" "name": "http://www.redhat.com/support/errata/RHSA-2010-0779.html"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0839.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2010-0839.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61884"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=629441"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1078", "ID": "CVE-2011-1078",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681259", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259" "product_data": [
},
{ {
"name": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86" "version_data": [
},
{ {
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10" }
}, ]
{ }
"name": "RHSA-2012:1156", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2012-1156.html" }
}, }
{ ]
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4c896e1471aec3b004a693c689f60be3b17ac86", }
"refsource": "CONFIRM", },
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4c896e1471aec3b004a693c689f60be3b17ac86" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2011:0833", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html" "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}, },
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" "name": "http://downloads.avaya.com/css/P8/documents/100145416"
}, },
{ {
"name": "http://downloads.avaya.com/css/P8/documents/100145416", "url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://downloads.avaya.com/css/P8/documents/100145416" "name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2012-1156.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-1156.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"url": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1079", "ID": "CVE-2011-1079",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681260", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260" "product_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=43629f8f5ea32a998d06d1bb41eefa0e821ff573", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=43629f8f5ea32a998d06d1bb41eefa0e821ff573" "version_data": [
},
{ {
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10" }
}, ]
{ }
"name": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573", }
"refsource": "CONFIRM", ]
"url": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573" }
}, }
{ ]
"name": "RHSA-2011:0833", }
"refsource": "REDHAT", },
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html" "references": {
}, "reference_data": [
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}, },
{ {
"name": "http://downloads.avaya.com/css/P8/documents/100145416", "url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://downloads.avaya.com/css/P8/documents/100145416" "name": "http://downloads.avaya.com/css/P8/documents/100145416"
}, },
{ {
"refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"name": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html" "name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"url": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html"
},
{
"url": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1080", "ID": "CVE-2011-1080",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,42 +27,66 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10" "product_data": [
},
{ {
"name": "RHSA-2011:0833", "product_name": "n/a",
"refsource": "REDHAT", "version": {
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html" "version_data": [
},
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }
}, ]
{ }
"name": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a", }
"refsource": "CONFIRM", ]
"url": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a" }
}, }
{ ]
"name": "http://downloads.avaya.com/css/P8/documents/100145416", }
"refsource": "CONFIRM", },
"url": "http://downloads.avaya.com/css/P8/documents/100145416" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681262", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262" "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d846f71195d57b0bbb143382647c2c6638b04c5a", "url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d846f71195d57b0bbb143382647c2c6638b04c5a" "name": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/03/01/10",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/01/10"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a"
},
{
"url": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1081", "ID": "CVE-2011-1081",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,107 +27,131 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "GLSA-201406-36", "vendor_name": "n/a",
"refsource": "GENTOO", "product": {
"url": "http://security.gentoo.org/glsa/glsa-201406-36.xml" "product_data": [
},
{ {
"name": "openldap-modrdnc-dos(66239)", "product_name": "n/a",
"refsource": "XF", "version": {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239" "version_data": [
},
{ {
"name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://openwall.com/lists/oss-security/2011/03/01/15" }
}, ]
{ }
"name": "[oss-security] 20110301 Re: CVE Request -- OpenLDAP -- two issues", }
"refsource": "MLIST", ]
"url": "http://openwall.com/lists/oss-security/2011/03/01/11" }
}, }
{ ]
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768", }
"refsource": "CONFIRM", },
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768" "references": {
}, "reference_data": [
{ {
"name": "[openldap-announce] 20110212 OpenLDAP 2.4.24 available", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html" "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
}, },
{ {
"name": "MDVSA-2011:056", "url": "http://secunia.com/advisories/43331",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056" "name": "http://secunia.com/advisories/43331"
}, },
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=674985", "url": "http://secunia.com/advisories/43718",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=674985" "name": "http://secunia.com/advisories/43718"
}, },
{ {
"name": "RHSA-2011:0347", "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html" "name": "http://security.gentoo.org/glsa/glsa-201406-36.xml"
}, },
{ {
"name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/28/1" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:056"
}, },
{ {
"name": "MDVSA-2011:055", "url": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:055" "name": "http://www.openldap.org/lists/openldap-announce/201102/msg00000.html"
}, },
{ {
"name": "[oss-security] 20110228 Re: CVE Request -- OpenLDAP -- two issues", "url": "http://www.redhat.com/support/errata/RHSA-2011-0347.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/28/2" "name": "http://www.redhat.com/support/errata/RHSA-2011-0347.html"
}, },
{ {
"name": "43718", "url": "http://www.ubuntu.com/usn/USN-1100-1",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43718" "name": "http://www.ubuntu.com/usn/USN-1100-1"
}, },
{ {
"name": "USN-1100-1", "url": "http://www.vupen.com/english/advisories/2011/0665",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1100-1" "name": "http://www.vupen.com/english/advisories/2011/0665"
}, },
{ {
"name": "1025191", "url": "https://bugzilla.novell.com/show_bug.cgi?id=674985",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://securitytracker.com/id?1025191" "name": "https://bugzilla.novell.com/show_bug.cgi?id=674985"
}, },
{ {
"name": "ADV-2011-0665", "url": "http://openwall.com/lists/oss-security/2011/02/28/1",
"refsource": "VUPEN", "refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0665" "name": "http://openwall.com/lists/oss-security/2011/02/28/1"
}, },
{ {
"name": "43331", "url": "http://openwall.com/lists/oss-security/2011/02/28/2",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/43331" "name": "http://openwall.com/lists/oss-security/2011/02/28/2"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680975", "url": "http://openwall.com/lists/oss-security/2011/03/01/11",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975" "name": "http://openwall.com/lists/oss-security/2011/03/01/11"
}, },
{ {
"name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9", "url": "http://openwall.com/lists/oss-security/2011/03/01/15",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9" "name": "http://openwall.com/lists/oss-security/2011/03/01/15"
},
{
"url": "http://securitytracker.com/id?1025191",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1025191"
},
{
"url": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9",
"refsource": "MISC",
"name": "http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/modrdn.c.diff?r1=1.170.2.8&r2=1.170.2.9"
},
{
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768",
"refsource": "MISC",
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6768"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66239"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680975",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680975"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1088", "ID": "CVE-2011-1088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "tomcat-servletsecurity-sec-bypass(65971)", "vendor_name": "n/a",
"refsource": "XF", "product": {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971" "product_data": [
},
{ {
"name": "20110315 [SECURITY] CVE-2011-1088 Apache Tomcat security constraint bypass", "product_name": "n/a",
"refsource": "BUGTRAQ", "version": {
"url": "http://www.securityfocus.com/archive/1/517013/100/0/threaded" "version_data": [
},
{ {
"name": "43684", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/43684" }
}, ]
{ }
"name": "46685", }
"refsource": "BID", ]
"url": "http://www.securityfocus.com/bid/46685" }
}, }
{ ]
"name": "ADV-2011-0563", }
"refsource": "VUPEN", },
"url": "http://www.vupen.com/english/advisories/2011/0563" "references": {
}, "reference_data": [
{ {
"name": "http://tomcat.apache.org/security-7.html", "url": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://tomcat.apache.org/security-7.html" "name": "http://tomcat.apache.org/security-7.html"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076587", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076587" "name": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E"
}, },
{ {
"name": "71027", "url": "http://markmail.org/message/lzx5273wsgl5pob6",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://www.osvdb.org/71027" "name": "http://markmail.org/message/lzx5273wsgl5pob6"
}, },
{ {
"name": "1025215", "url": "http://markmail.org/message/yzmyn44f5aetmm2r",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://www.securitytracker.com/id?1025215" "name": "http://markmail.org/message/yzmyn44f5aetmm2r"
}, },
{ {
"name": "[announce] 20110302 [SECURITY] Tomcat 7 ignores @ServletSecurity annotations", "url": "http://secunia.com/advisories/43684",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E" "name": "http://secunia.com/advisories/43684"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1076586", "url": "http://svn.apache.org/viewvc?view=revision&revision=1076586",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1076586" "name": "http://svn.apache.org/viewvc?view=revision&revision=1076586"
}, },
{ {
"name": "[users] 20110302 Re: @DenyAll does nothing", "url": "http://svn.apache.org/viewvc?view=revision&revision=1076587",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://markmail.org/message/lzx5273wsgl5pob6" "name": "http://svn.apache.org/viewvc?view=revision&revision=1076587"
}, },
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1077995", "url": "http://svn.apache.org/viewvc?view=revision&revision=1077995",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1077995" "name": "http://svn.apache.org/viewvc?view=revision&revision=1077995"
}, },
{ {
"name": "[users] 20110302 Re: @DenyAll does nothing", "url": "http://www.osvdb.org/71027",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://markmail.org/message/yzmyn44f5aetmm2r" "name": "http://www.osvdb.org/71027"
},
{
"url": "http://www.securityfocus.com/archive/1/517013/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/517013/100/0/threaded"
},
{
"url": "http://www.securityfocus.com/bid/46685",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46685"
},
{
"url": "http://www.securitytracker.com/id?1025215",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1025215"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0563",
"refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0563"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65971"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1089", "ID": "CVE-2011-1089",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,117 +27,141 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://openwall.com/lists/oss-security/2011/03/14/5" "product_data": [
},
{ {
"name": "[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://openwall.com/lists/oss-security/2011/03/04/9" "version_data": [
},
{ {
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625", "version_affected": "=",
"refsource": "MISC", "version_value": "n/a"
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625" }
}, ]
{ }
"name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", }
"refsource": "MLIST", ]
"url": "http://openwall.com/lists/oss-security/2011/03/22/6" }
}, }
{ ]
"name": "46740", }
"refsource": "BID", },
"url": "http://www.securityfocus.com/bid/46740" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/22/4" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
}, },
{ {
"name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/04/10",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/05/7" "name": "http://openwall.com/lists/oss-security/2011/03/04/10"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688980", "url": "http://openwall.com/lists/oss-security/2011/03/04/11",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980" "name": "http://openwall.com/lists/oss-security/2011/03/04/11"
}, },
{ {
"name": "[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/04/12",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/07/9" "name": "http://openwall.com/lists/oss-security/2011/03/04/12"
}, },
{ {
"name": "MDVSA-2011:178", "url": "http://openwall.com/lists/oss-security/2011/03/04/9",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" "name": "http://openwall.com/lists/oss-security/2011/03/04/9"
}, },
{ {
"name": "[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/05/3",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/04/01/2" "name": "http://openwall.com/lists/oss-security/2011/03/05/3"
}, },
{ {
"name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/05/7",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/04/10" "name": "http://openwall.com/lists/oss-security/2011/03/05/7"
}, },
{ {
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/07/9",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/14/16" "name": "http://openwall.com/lists/oss-security/2011/03/07/9"
}, },
{ {
"name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/14/16",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/31/4" "name": "http://openwall.com/lists/oss-security/2011/03/14/16"
}, },
{ {
"name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/14/5",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/04/12" "name": "http://openwall.com/lists/oss-security/2011/03/14/5"
}, },
{ {
"name": "MDVSA-2011:179", "url": "http://openwall.com/lists/oss-security/2011/03/14/7",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179" "name": "http://openwall.com/lists/oss-security/2011/03/14/7"
}, },
{ {
"name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/15/6",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/14/7" "name": "http://openwall.com/lists/oss-security/2011/03/15/6"
}, },
{ {
"name": "[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/22/4",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/04/11" "name": "http://openwall.com/lists/oss-security/2011/03/22/4"
}, },
{ {
"name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/22/6",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/05/3" "name": "http://openwall.com/lists/oss-security/2011/03/22/6"
}, },
{ {
"name": "RHSA-2011:1526", "url": "http://openwall.com/lists/oss-security/2011/03/31/3",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html" "name": "http://openwall.com/lists/oss-security/2011/03/31/3"
}, },
{ {
"name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/03/31/4",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/31/3" "name": "http://openwall.com/lists/oss-security/2011/03/31/4"
}, },
{ {
"name": "[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "url": "http://openwall.com/lists/oss-security/2011/04/01/2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/15/6" "name": "http://openwall.com/lists/oss-security/2011/04/01/2"
},
{
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625",
"refsource": "MISC",
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html",
"refsource": "MISC",
"name": "http://www.redhat.com/support/errata/RHSA-2011-1526.html"
},
{
"url": "http://www.securityfocus.com/bid/46740",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46740"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688980"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1090", "ID": "CVE-2011-1090",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://openwall.com/lists/oss-security/2011/03/07/2" "product_data": [
},
{ {
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "product_name": "n/a",
"refsource": "BUGTRAQ", "version": {
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" "version_data": [
},
{ {
"name": "46397", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/46397" }
}, ]
{ }
"name": "1025336", }
"refsource": "SECTRACK", ]
"url": "http://securitytracker.com/id?1025336" }
}, }
{ ]
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682641", }
"refsource": "CONFIRM", },
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641" "references": {
}, "reference_data": [
{ {
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "url": "http://secunia.com/advisories/46397",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "name": "http://secunia.com/advisories/46397"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc", "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc" "name": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{ {
"name": "[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/07/12" "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
}, },
{ {
"name": "SUSE-SU-2015:0812", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/07/12",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/07/12"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/07/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/07/2"
},
{
"url": "http://securitytracker.com/id?1025336",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1025336"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-1091 Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in" "value": "libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "NULL Pointer Dereference", "value": "n/a"
"cweId": "CWE-476"
} }
] ]
} }
@ -32,38 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.6.6-7.el4", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:2.6.6-5.el5_7.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.9-3.el6",
"version_affected": "!"
} }
] ]
} }
@ -156,26 +133,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0703" "name": "http://www.vupen.com/english/advisories/2011/0703"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0616",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0616"
},
{
"url": "https://access.redhat.com/errata/RHSA-2011:1371",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:1371"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-1091",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1091"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=683031"
},
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055",
"refsource": "MISC", "refsource": "MISC",
@ -190,31 +147,11 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402",
"refsource": "MISC", "refsource": "MISC",
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402" "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402"
}
]
}, },
"impact": {
"cvss": [
{ {
"accessComplexity": "MEDIUM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031",
"accessVector": "NETWORK", "refsource": "MISC",
"authentication": "SINGLE", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=683031"
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-1098 logrotate: TOCTOU race condition by creation of new files (between opening the file and moment, final permissions have been applied) [information disclosure]" "value": "Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition", "value": "n/a"
"cweId": "CWE-367"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.7.8-12.el6_0.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -264,46 +263,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0961" "name": "http://www.vupen.com/english/advisories/2011/0961"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0407",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0407"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-1098",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1098"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680798",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680798" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680798"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1158", "ID": "CVE-2011-1158",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20110314 CVE request for python-feedparser", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://openwall.com/lists/oss-security/2011/03/14/18" "product_data": [
},
{ {
"name": "http://support.novell.com/security/cve/CVE-2011-1158.html", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://support.novell.com/security/cve/CVE-2011-1158.html" "version_data": [
},
{ {
"name": "43730", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/43730" }
}, ]
{ }
"name": "https://code.google.com/p/feedparser/issues/detail?id=255", }
"refsource": "CONFIRM", ]
"url": "https://code.google.com/p/feedparser/issues/detail?id=255" }
}, }
{ ]
"name": "46867", }
"refsource": "BID", },
"url": "http://www.securityfocus.com/bid/46867" "references": {
}, "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684877", "url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684877" "name": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html"
}, },
{ {
"name": "44074", "url": "http://openwall.com/lists/oss-security/2011/03/14/18",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/44074" "name": "http://openwall.com/lists/oss-security/2011/03/14/18"
}, },
{ {
"name": "[oss-security] 20110315 Re: CVE request for python-feedparser", "url": "http://openwall.com/lists/oss-security/2011/03/15/11",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/03/15/11" "name": "http://openwall.com/lists/oss-security/2011/03/15/11"
}, },
{ {
"name": "[opensuse-updates] 20110408 openSUSE-SU-2011:0314-1 (moderate): python-feedparser security update", "url": "http://secunia.com/advisories/43730",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html" "name": "http://secunia.com/advisories/43730"
}, },
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=680074", "url": "http://secunia.com/advisories/44074",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=680074" "name": "http://secunia.com/advisories/44074"
}, },
{ {
"name": "MDVSA-2011:082", "url": "http://support.novell.com/security/cve/CVE-2011-1158.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082" "name": "http://support.novell.com/security/cve/CVE-2011-1158.html"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:082"
},
{
"url": "http://www.securityfocus.com/bid/46867",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/46867"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=680074",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=680074"
},
{
"url": "https://code.google.com/p/feedparser/issues/detail?id=255",
"refsource": "MISC",
"name": "https://code.google.com/p/feedparser/issues/detail?id=255"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684877",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684877"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1160", "ID": "CVE-2011-1160",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1309d7afbed112f0e8e90be9af975550caa0076b", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1309d7afbed112f0e8e90be9af975550caa0076b" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684671", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671" "version_data": [
},
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }
}, ]
{ }
"name": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b", }
"refsource": "CONFIRM", ]
"url": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b" }
}, }
{ ]
"name": "[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2011/03/15/13" "references": {
"reference_data": [
{
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "MISC",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b"
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/03/15/13",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2011/03/15/13"
},
{
"url": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=684671"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-1168 kdelibs: partially universal XSS in Konqueror error pages" "value": "Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "value": "n/a"
"cweId": "CWE-79"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "6:4.3.4-11.el6_0.2", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -74,11 +73,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.vupen.com/english/advisories/2011/0990" "name": "http://www.vupen.com/english/advisories/2011/0990"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2011:0464",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2011:0464"
},
{ {
"url": "http://secunia.com/advisories/44065", "url": "http://secunia.com/advisories/44065",
"refsource": "MISC", "refsource": "MISC",
@ -140,44 +134,14 @@
"name": "http://www.vupen.com/english/advisories/2011/0928" "name": "http://www.vupen.com/english/advisories/2011/0928"
}, },
{ {
"url": "https://access.redhat.com/security/cve/CVE-2011-1168", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-1168" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695398",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=695398" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=695398"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1169", "ID": "CVE-2011-1169",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688898", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688898" "product_data": [
},
{ {
"name": "[oss-security] 20110318 CVE request: kernel: AudioScience HPI driver", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://openwall.com/lists/oss-security/2011/03/18/1" "version_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=4a122c10fbfe9020df469f0f669da129c5757671", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commit;h=4a122c10fbfe9020df469f0f669da129c5757671" }
}, ]
{ }
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1", }
"refsource": "CONFIRM", ]
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1" }
}, }
{ ]
"name": "[oss-security] 20110318 Re: CVE request: kernel: AudioScience HPI driver", }
"refsource": "MLIST", },
"url": "http://openwall.com/lists/oss-security/2011/03/18/2" "references": {
"reference_data": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/18/1",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/18/1"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/18/2",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2011/03/18/2"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688898",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=688898"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1170", "ID": "CVE-2011-1170",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "8282", "vendor_name": "n/a",
"refsource": "SREASON", "product": {
"url": "http://securityreason.com/securityalert/8282" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689321", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321" "version_data": [
},
{ {
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15" }
}, ]
{ }
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143", }
"refsource": "CONFIRM", ]
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143" }
}, }
{ ]
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", }
"refsource": "CONFIRM", },
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2011:0833", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html" "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}, },
{ {
"name": "[netfilter-devel] 20110310 [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace", "url": "http://www.openwall.com/lists/oss-security/2011/03/18/15",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2" "name": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
}, },
{ {
"name": "http://downloads.avaya.com/css/P8/documents/100145416", "url": "http://www.openwall.com/lists/oss-security/2011/03/21/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://downloads.avaya.com/css/P8/documents/100145416" "name": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
}, },
{ {
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks", "url": "http://www.openwall.com/lists/oss-security/2011/03/21/4",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4" "name": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
}, },
{ {
"name": "8278", "url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "SREASON", "refsource": "MISC",
"url": "http://securityreason.com/securityalert/8278" "name": "http://downloads.avaya.com/css/P8/documents/100145416"
}, },
{ {
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks", "url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1" "name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143"
},
{
"url": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2"
},
{
"url": "http://securityreason.com/securityalert/8278",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8278"
},
{
"url": "http://securityreason.com/securityalert/8282",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8282"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1171", "ID": "CVE-2011-1171",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "8283", "vendor_name": "n/a",
"refsource": "SREASON", "product": {
"url": "http://securityreason.com/securityalert/8283" "product_data": [
},
{ {
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15" "version_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689327", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327" }
}, ]
{ }
"name": "[linux-kernel] 20110310 [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace", }
"refsource": "MLIST", ]
"url": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2" }
}, }
{ ]
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", }
"refsource": "CONFIRM", },
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2011:0833", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html" "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
}, },
{ {
"name": "http://downloads.avaya.com/css/P8/documents/100145416", "url": "http://www.openwall.com/lists/oss-security/2011/03/18/15",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://downloads.avaya.com/css/P8/documents/100145416" "name": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=78b79876761b86653df89c48a7010b5cbd41a84a", "url": "http://www.openwall.com/lists/oss-security/2011/03/21/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=78b79876761b86653df89c48a7010b5cbd41a84a" "name": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
}, },
{ {
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks", "url": "http://www.openwall.com/lists/oss-security/2011/03/21/4",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4" "name": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
}, },
{ {
"name": "8278", "url": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "SREASON", "refsource": "MISC",
"url": "http://securityreason.com/securityalert/8278" "name": "http://downloads.avaya.com/css/P8/documents/100145416"
}, },
{ {
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks", "url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1" "name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"url": "http://securityreason.com/securityalert/8278",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8278"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a"
},
{
"url": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=linux-kernel&m=129978077609894&w=2"
},
{
"url": "http://securityreason.com/securityalert/8283",
"refsource": "MISC",
"name": "http://securityreason.com/securityalert/8283"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0866", "ID": "CVE-2012-0866",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,82 +27,106 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.postgresql.org/about/news/1377/", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://www.postgresql.org/about/news/1377/" "product_data": [
},
{ {
"name": "MDVSA-2012:027", "product_name": "n/a",
"refsource": "MANDRIVA", "version": {
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027" "version_data": [
},
{ {
"name": "49273", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/49273" }
}, ]
{ }
"name": "RHSA-2012:0678", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html" }
}, }
{ ]
"name": "MDVSA-2012:026", }
"refsource": "MANDRIVA", },
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026" "references": {
}, "reference_data": [
{ {
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html" "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
}, },
{ {
"name": "MDVSA-2012:092", "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092" "name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" "name": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
}, },
{ {
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html", "url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html" "name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
}, },
{ {
"name": "DSA-2418", "url": "http://secunia.com/advisories/49272",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2418" "name": "http://secunia.com/advisories/49272"
}, },
{ {
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html", "url": "http://secunia.com/advisories/49273",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html" "name": "http://secunia.com/advisories/49273"
}, },
{ {
"name": "49272", "url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/49272" "name": "http://www.debian.org/security/2012/dsa-2418"
}, },
{ {
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
}, },
{ {
"name": "RHSA-2012:0677", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
}, },
{ {
"name": "openSUSE-SU-2012:1173", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092"
},
{
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
},
{
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0867", "ID": "CVE-2012-0867",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.postgresql.org/about/news/1377/", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://www.postgresql.org/about/news/1377/" "product_data": [
},
{ {
"name": "49273", "product_name": "n/a",
"refsource": "SECUNIA", "version": {
"url": "http://secunia.com/advisories/49273" "version_data": [
},
{ {
"name": "RHSA-2012:0678", "version_affected": "=",
"refsource": "REDHAT", "version_value": "n/a"
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html" }
}, ]
{ }
"name": "MDVSA-2012:026", }
"refsource": "MANDRIVA", ]
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026" }
}, }
{ ]
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html", }
"refsource": "CONFIRM", },
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html" "references": {
}, "reference_data": [
{ {
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html", "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html" "name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
}, },
{ {
"name": "DSA-2418", "url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2418" "name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
}, },
{ {
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html", "url": "http://secunia.com/advisories/49273",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html" "name": "http://secunia.com/advisories/49273"
}, },
{ {
"name": "openSUSE-SU-2012:1173", "url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" "name": "http://www.debian.org/security/2012/dsa-2418"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
},
{
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0868", "ID": "CVE-2012-0868",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://www.postgresql.org/about/news/1377/", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://www.postgresql.org/about/news/1377/" "product_data": [
},
{ {
"name": "MDVSA-2012:027", "product_name": "n/a",
"refsource": "MANDRIVA", "version": {
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027" "version_data": [
},
{ {
"name": "49273", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/49273" }
}, ]
{ }
"name": "RHSA-2012:0678", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html" }
}, }
{ ]
"name": "MDVSA-2012:026", }
"refsource": "MANDRIVA", },
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026" "references": {
}, "reference_data": [
{ {
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html" "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
}, },
{ {
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705" "name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html"
}, },
{ {
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html", "url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html" "name": "http://rhn.redhat.com/errata/RHSA-2012-0677.html"
}, },
{ {
"name": "DSA-2418", "url": "http://rhn.redhat.com/errata/RHSA-2012-0678.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2418" "name": "http://rhn.redhat.com/errata/RHSA-2012-0678.html"
}, },
{ {
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html", "url": "http://secunia.com/advisories/49272",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html" "name": "http://secunia.com/advisories/49272"
}, },
{ {
"name": "49272", "url": "http://secunia.com/advisories/49273",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/49272" "name": "http://secunia.com/advisories/49273"
}, },
{ {
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html", "url": "http://www.debian.org/security/2012/dsa-2418",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html" "name": "http://www.debian.org/security/2012/dsa-2418"
}, },
{ {
"name": "RHSA-2012:0677", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0677.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:026"
}, },
{ {
"name": "openSUSE-SU-2012:1173", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:027"
},
{
"url": "http://www.postgresql.org/about/news/1377/",
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1377/"
},
{
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-18.html"
},
{
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-11.html"
},
{
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-7.html"
},
{
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html",
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-3.html"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2012-0870 samba: Any Batched (\"AndX\") request processing infinite recursion and heap-based buffer overflow" "value": "Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "value": "n/a"
"cweId": "CWE-119"
} }
] ]
} }
@ -32,49 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.0.33-0.35.el4", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.38.el5_8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.3 Long Life",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.7.el5_3.4",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 5.6 EUS - Server Only",
"version": {
"version_data": [
{
"version_value": "0:3.0.33-3.29.el5_6.4",
"version_affected": "!"
} }
] ]
} }
@ -142,60 +108,20 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://secunia.com/advisories/48844" "name": "http://secunia.com/advisories/48844"
}, },
{
"url": "http://www.samba.org/samba/security/CVE-2012-0870",
"refsource": "MISC",
"name": "http://www.samba.org/samba/security/CVE-2012-0870"
},
{ {
"url": "http://www.ubuntu.com/usn/USN-1374-1", "url": "http://www.ubuntu.com/usn/USN-1374-1",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1374-1" "name": "http://www.ubuntu.com/usn/USN-1374-1"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2012:0332", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0332" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-0870",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-0870"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795509" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=795509"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0874", "ID": "CVE-2012-0874",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,97 +27,121 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2013:0192", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html" "product_data": [
},
{ {
"name": "RHSA-2013:0198", "product_name": "n/a",
"refsource": "REDHAT", "version": {
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html" "version_data": [
},
{ {
"name": "RHSA-2013:0195", "version_affected": "=",
"refsource": "REDHAT", "version_value": "n/a"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html" }
}, ]
{ }
"name": "RHSA-2013:0221", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html" }
}, }
{ ]
"name": "RHSA-2013:0196", }
"refsource": "REDHAT", },
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html" "references": {
}, "reference_data": [
{ {
"name": "57552", "url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/57552" "name": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
}, },
{ {
"name": "RHSA-2013:0193", "url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
}, },
{ {
"name": "51984", "url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/51984" "name": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
}, },
{ {
"name": "1028042", "url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://securitytracker.com/id?1028042" "name": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
}, },
{ {
"name": "52054", "url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/52054" "name": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
}, },
{ {
"name": "20131219 ESA-2013-094: EMC Data Protection Advisor JBOSS Remote Code Execution Vulnerability", "url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
}, },
{ {
"name": "RHSA-2013:0191", "url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795645", "url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795645" "name": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
}, },
{ {
"name": "RHSA-2013:0533", "url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
}, },
{ {
"name": "RHSA-2013:0197", "url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
}, },
{ {
"name": "30211", "url": "http://secunia.com/advisories/51984",
"refsource": "EXPLOIT-DB", "refsource": "MISC",
"url": "http://www.exploit-db.com/exploits/30211" "name": "http://secunia.com/advisories/51984"
}, },
{ {
"name": "jboss-eap-jmxinvokerhaservlet-code-exec(81511)", "url": "http://secunia.com/advisories/52054",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511" "name": "http://secunia.com/advisories/52054"
}, },
{ {
"name": "RHSA-2013:0194", "url": "http://securitytracker.com/id?1028042",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html" "name": "http://securitytracker.com/id?1028042"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html",
"refsource": "MISC",
"name": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html"
},
{
"url": "http://www.exploit-db.com/exploits/30211",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/30211"
},
{
"url": "http://www.securityfocus.com/bid/57552",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57552"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795645",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795645"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0875", "ID": "CVE-2012-0875",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2012:0376", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2012-0376.html" "product_data": [
},
{ {
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714" "version_data": [
},
{ {
"name": "1026777", "version_affected": "=",
"refsource": "SECTRACK", "version_value": "n/a"
"url": "http://securitytracker.com/id?1026777" }
}, ]
{ }
"name": "[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data", }
"refsource": "MLIST", ]
"url": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987" }
}, }
{ ]
"name": "http://sourceware.org/git/?p=systemtap.git;a=commit;h=64b0cff3b", }
"refsource": "CONFIRM", },
"url": "http://sourceware.org/git/?p=systemtap.git;a=commit;h=64b0cff3b" "references": {
}, "reference_data": [
{ {
"name": "openSUSE-SU-2013:0475", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html"
},
{
"url": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987",
"refsource": "MISC",
"name": "http://permalink.gmane.org/gmane.comp.security.oss.general/6987"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2012-0376.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2012-0376.html"
},
{
"url": "http://securitytracker.com/id?1026777",
"refsource": "MISC",
"name": "http://securitytracker.com/id?1026777"
},
{
"url": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714",
"refsource": "MISC",
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=13714"
},
{
"url": "http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b",
"refsource": "MISC",
"name": "http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0877", "ID": "CVE-2012-0877",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PyXML",
"product": {
"product_data": [
{
"product_name": "PyXML",
"version": {
"version_data": [
{
"version_value": "through 2012-02-03"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,41 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PyXML",
"product": {
"product_data": [
{
"product_name": "PyXML",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 2012-02-03"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0877", "url": "http://seclists.org/oss-sec/2014/q3/96",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-0877" "name": "http://seclists.org/oss-sec/2014/q3/96"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877", "url": "http://www.openwall.com/lists/oss-security/2014/07/08/11",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877" "name": "http://www.openwall.com/lists/oss-security/2014/07/08/11"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2012-0877", "url": "https://access.redhat.com/security/cve/cve-2012-0877",
@ -68,14 +69,14 @@
"name": "https://access.redhat.com/security/cve/cve-2012-0877" "name": "https://access.redhat.com/security/cve/cve-2012-0877"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877",
"refsource": "MISC", "refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q3/96", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877"
"url": "http://seclists.org/oss-sec/2014/q3/96"
}, },
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0877",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2014/07/08/11", "name": "https://security-tracker.debian.org/tracker/CVE-2012-0877"
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/11"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0878", "ID": "CVE-2012-0878",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=796790", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796790" "product_data": [
},
{ {
"name": "[oss-security] 20120223 CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with \"paster serve\" as root", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/1" "version_data": [
},
{ {
"name": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve", "version_affected": "=",
"refsource": "MISC", "version_value": "n/a"
"url": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve" }
}, ]
{ }
"name": "48812", }
"refsource": "SECUNIA", ]
"url": "http://secunia.com/advisories/48812" }
}, }
{ ]
"name": "[oss-security] 20120223 Re: CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with \"paster serve\" as root", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/4" "references": {
}, "reference_data": [
{ {
"name": "RHSA-2012:1206", "url": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1206.html" "name": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471"
}, },
{ {
"name": "50410", "url": "http://rhn.redhat.com/errata/RHSA-2012-1206.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50410" "name": "http://rhn.redhat.com/errata/RHSA-2012-1206.html"
}, },
{ {
"name": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471", "url": "http://secunia.com/advisories/48812",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471" "name": "http://secunia.com/advisories/48812"
}, },
{ {
"name": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4", "url": "http://secunia.com/advisories/50410",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4" "name": "http://secunia.com/advisories/50410"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/23/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/02/23/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/23/4"
},
{
"url": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4",
"refsource": "MISC",
"name": "https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4"
},
{
"url": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve",
"refsource": "MISC",
"name": "https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796790",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=796790"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0880", "ID": "CVE-2012-0880",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,41 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=787103", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787103" "product_data": [
},
{ {
"name": "[oss-security] 20140708 Summer bug cleaning - some Hash DoS stuff", "product_name": "n/a",
"refsource": "MLIST", "version": {
"url": "http://seclists.org/oss-sec/2014/q3/96" "version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/oss-sec/2014/q3/96",
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q3/96"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787103",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=787103"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1088", "ID": "CVE-2012-1088",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,27 +27,51 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=20ed7b24df05eadf83168d1d0ce0052a31380928", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=20ed7b24df05eadf83168d1d0ce0052a31380928" "product_data": [
},
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8" "version_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=797878", "version_affected": "=",
"refsource": "CONFIRM", "version_value": "n/a"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797878" }
}, ]
{ }
"name": "HPSBGN02970", }
"refsource": "HP", ]
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2" }
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2",
"refsource": "MISC",
"name": "http://marc.info/?l=bugtraq&m=139447903326211&w=2"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797878",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=797878"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1090", "ID": "CVE-2012-1090",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08", "vendor_name": "n/a",
"refsource": "CONFIRM", "product": {
"url": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08" "product_data": [
},
{ {
"name": "RHSA-2012:0531", "product_name": "n/a",
"refsource": "REDHAT", "version": {
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" "version_data": [
},
{ {
"name": "SUSE-SU-2012:0554", "version_affected": "=",
"refsource": "SUSE", "version_value": "n/a"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" }
}, ]
{ }
"name": "RHSA-2012:0481", }
"refsource": "REDHAT", ]
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html" }
}, }
{ ]
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10", }
"refsource": "CONFIRM", },
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10" "references": {
}, "reference_data": [
{ {
"name": "48964", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48964" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
}, },
{ {
"name": "SUSE-SU-2012:0616", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798293", "url": "http://secunia.com/advisories/48964",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798293" "name": "http://secunia.com/advisories/48964"
}, },
{ {
"name": "48842", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48842" "name": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
}, },
{ {
"name": "[oss-security] 20120228 Re: CVE request -- kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount", "url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/4" "name": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
},
{
"url": "http://secunia.com/advisories/48842",
"refsource": "MISC",
"name": "http://secunia.com/advisories/48842"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/4"
},
{
"url": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798293",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798293"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1094", "ID": "CVE-2012-1094",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "JBoss AS 7",
"version": {
"version_data": [
{
"version_value": "prior to 7.1.1"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,17 +27,41 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094", "vendor_name": "n/a",
"refsource": "MISC", "product": {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094" "product_data": [
},
{ {
"url": "https://access.redhat.com/security/cve/cve-2012-1094", "product_name": "JBoss AS 7",
"refsource": "MISC", "version": {
"name": "https://access.redhat.com/security/cve/cve-2012-1094" "version_data": [
{
"version_affected": "=",
"version_value": "prior to 7.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/cve-2012-1094",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1094"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1095", "ID": "CVE-2012-1095",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "[oss-security] 20120301 Re: Re: CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status", "vendor_name": "n/a",
"refsource": "MLIST", "product": {
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/2" "product_data": [
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798353", "product_name": "n/a",
"refsource": "CONFIRM", "version": {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798353" "version_data": [
},
{ {
"name": "[oss-security] 20120228 Re: CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status", "version_affected": "=",
"refsource": "MLIST", "version_value": "n/a"
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/15" }
}, ]
{ }
"name": "https://bugzilla.novell.com/show_bug.cgi?id=749335", }
"refsource": "CONFIRM", ]
"url": "https://bugzilla.novell.com/show_bug.cgi?id=749335" }
}, }
{ ]
"name": "[oss-security] 20120228 CVE Request (minor) -- osc: Improper sanitization of terminal emulator escape sequences when displaying build log and build status", }
"refsource": "MLIST", },
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/9" "references": {
}, "reference_data": [
{ {
"name": "openSUSE-SU-2012:0400", "url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html" "name": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00035.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/15"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/02/28/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/02/28/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/02/2"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=749335",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=749335"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798353",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=798353"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1096", "ID": "CVE-2012-1096",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "NetworkManager",
"version": {
"version_data": [
{
"version_value": "0.9 and earlier"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,46 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "NetworkManager",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.9 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2012-1096", "url": "http://www.openwall.com/lists/oss-security/2012/03/02/3",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-1096" "name": "http://www.openwall.com/lists/oss-security/2012/03/02/3"
},
{
"url": "https://access.redhat.com/security/cve/cve-2012-1096",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1096"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=793329",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=793329"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1096",
@ -68,19 +79,9 @@
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-1096" "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-1096"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2012-1096", "url": "https://security-tracker.debian.org/tracker/CVE-2012-1096",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2012-1096" "name": "https://security-tracker.debian.org/tracker/CVE-2012-1096"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/02/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/02/3"
},
{
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=793329",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=793329"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1097", "ID": "CVE-2012-1097",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,67 +27,91 @@
} }
] ]
}, },
"references": { "affects": {
"reference_data": [ "vendor": {
"vendor_data": [
{ {
"name": "RHSA-2012:0531", "vendor_name": "n/a",
"refsource": "REDHAT", "product": {
"url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" "product_data": [
},
{ {
"name": "SUSE-SU-2012:0554", "product_name": "n/a",
"refsource": "SUSE", "version": {
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" "version_data": [
},
{ {
"name": "48898", "version_affected": "=",
"refsource": "SECUNIA", "version_value": "n/a"
"url": "http://secunia.com/advisories/48898" }
}, ]
{ }
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=799209", }
"refsource": "CONFIRM", ]
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799209" }
}, }
{ ]
"name": "RHSA-2012:0481", }
"refsource": "REDHAT", },
"url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html" "references": {
}, "reference_data": [
{ {
"name": "[oss-security] 20120305 CVE-2012-1097 kernel: regset: Prevent null pointer reference on readonly regsets", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/03/05/1" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10", "url": "http://secunia.com/advisories/48898",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10" "name": "http://secunia.com/advisories/48898"
}, },
{ {
"name": "48964", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48964" "name": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e", "url": "http://secunia.com/advisories/48964",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e" "name": "http://secunia.com/advisories/48964"
}, },
{ {
"name": "SUSE-SU-2012:0616", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" "name": "http://rhn.redhat.com/errata/RHSA-2012-0531.html"
}, },
{ {
"name": "48842", "url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48842" "name": "http://rhn.redhat.com/errata/RHSA-2012-0481.html"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e", "url": "http://secunia.com/advisories/48842",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e" "name": "http://secunia.com/advisories/48842"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/03/05/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/05/1"
},
{
"url": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799209",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=799209"
} }
] ]
} }

View File

@ -79,6 +79,11 @@
"name": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b", "name": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b" "url": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-2db4df65c3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/"
} }
] ]
}, },

View File

@ -66,6 +66,11 @@
"url": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh", "url": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh" "name": "https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-4e6353c6f7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/"
} }
] ]
} }