"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-02 21:01:38 +00:00
parent 9181d64a9f
commit 53e05e5467
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
29 changed files with 3276 additions and 1488 deletions

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3079",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM)."
"value": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users."
}
]
},
@ -44,53 +21,119 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 5.7",
"version": {
"version_data": [
{
"version_value": "0:2.3.8-134.el6sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444"
"url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-0590.html"
},
{
"name": "RHSA-2016:0590",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html"
"url": "https://access.redhat.com/errata/RHSA-2016:0590",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:0590"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940"
"url": "https://access.redhat.com/security/cve/CVE-2016-3079",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3079"
},
{
"name": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad",
"refsource": "CONFIRM",
"url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444"
},
{
"name": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba",
"refsource": "CONFIRM",
"url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940"
},
{
"name": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9",
"refsource": "CONFIRM",
"url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9"
"url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f",
"refsource": "MISC",
"name": "https://github.com/spacewalkproject/spacewalk/commit/7920542f"
},
{
"name": "https://github.com/spacewalkproject/spacewalk/commit/7920542f",
"refsource": "CONFIRM",
"url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f"
"url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad",
"refsource": "MISC",
"name": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad"
},
{
"url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9",
"refsource": "MISC",
"name": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9"
},
{
"url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba",
"refsource": "MISC",
"name": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jan Huta\u0159 (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3080",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in spacewalk-java in Red Hat Satellite 5.7 allows remote attackers to inject arbitrary web script or HTML via the (1) RHNMD User or (2) Filesystem parameters, related to display of monitoring probes."
"value": "A stored cross-site scripting (XSS) flaw was found in the way spacewalk-java displayed monitoring probes. An attacker can embed HTML and Javascript in the values for RHNMD User or Filesystem parameters in Satellite, allowing them to inject malicious content into the web page that is then displayed with that probe data."
}
]
},
@ -44,23 +21,103 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 5.7",
"version": {
"version_data": [
{
"version_value": "0:2.3.8-147.el6sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320942",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320942"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1484.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1484.html"
},
{
"name": "RHSA-2016:1484",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1484.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1484",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1484"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3080",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3080"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320942",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320942"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jan Huta\u0159 (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3097",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in spacewalk-java in Red Hat Satellite 5.7 allows remote attackers to inject arbitrary web script or HTML via a group name, related to viewing snapshot data."
"value": "A stored cross-site scripting (XSS) flaw was found in the way spacewalk-java displayed group names. An attacker can embed HTML and Javascript in the values for group names in Satellite, allowing them to inject malicious content into the web page that is then displayed when viewing the snapshot data."
}
]
},
@ -44,23 +21,103 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 5.7",
"version": {
"version_data": [
{
"version_value": "0:2.3.8-147.el6sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322747",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322747"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1484.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1484.html"
},
{
"name": "RHSA-2016:1484",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1484.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1484",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1484"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3097",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3097"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322747",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322747"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jan Huta\u0159 (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3099",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled."
"value": "A flaw was found in the way mod_nss parsed certain OpenSSL-style cipher strings. As a result, mod_nss could potentially use ciphers that were not intended to be enabled."
}
]
},
@ -44,38 +21,104 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Missing Report of Error Condition",
"cweId": "CWE-392"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.0.14-7.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "FEDORA-2016-85e9f2e3cd",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183129.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183129.html"
},
{
"name": "FEDORA-2016-8b28358b72",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183129.html"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html"
},
{
"name": "RHSA-2016:2602",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2602.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2602.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2602.html"
},
{
"name": "FEDORA-2016-1eaaf1ed0f",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html"
"url": "https://access.redhat.com/errata/RHSA-2016:2602",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2602"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3099",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3099"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1319052"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Rob Crittenden (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3698",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network."
"value": "It was found that libndp did not properly validate and check the origin of Neighbor Discovery Protocol (NDP) messages. An attacker on a non-local network could use this flaw to advertise a node as a router, allowing them to perform man-in-the-middle attacks on a connecting client, or disrupt the network connectivity of that client."
}
]
},
@ -44,48 +21,119 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.2-6.el7_2",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f",
"refsource": "CONFIRM",
"url": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839",
"refsource": "CONFIRM",
"url": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839"
"url": "http://www.debian.org/security/2016/dsa-3581",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3581"
},
{
"name": "DSA-3581",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3581"
"url": "http://www.openwall.com/lists/oss-security/2016/05/17/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/17/9"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
"url": "http://www.ubuntu.com/usn/USN-2980-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2980-1"
},
{
"name": "[oss-security] 20160517 RHSA-2016:1086 libndp: denial of service due to insufficient validation of source of NDP messages",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/17/9"
"url": "https://access.redhat.com/errata/RHSA-2016:1086",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1086"
},
{
"name": "USN-2980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2980-1"
"url": "https://access.redhat.com/security/cve/CVE-2016-3698",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3698"
},
{
"name": "RHSA-2016:1086",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1086.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329366",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1329366"
},
{
"url": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839",
"refsource": "MISC",
"name": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839"
},
{
"url": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f",
"refsource": "MISC",
"name": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2016-1086.html",
"refsource": "MISC",
"name": "https://rhn.redhat.com/errata/RHSA-2016-1086.html"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Julien Bernard (Viag\u00e9nie) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3703",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter."
"value": "An origin validation vulnerability was found in OpenShift Enterprise. An attacker could potentially access API credentials stored in a web browser's localStorage if anonymous access was granted to a service/proxy or pod/proxy API for a specific pod, and an authorized access_token was provided in the query parameter."
}
]
},
@ -44,23 +21,104 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Authorization",
"cweId": "CWE-285"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 3.2",
"version": {
"version_data": [
{
"version_value": "0:3.2.0.44-1.git.0.a4463d9.el7",
"version_affected": "!"
},
{
"version_value": "0:1.4.7-1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Enterprise 3.1",
"version": {
"version_data": [
{
"version_value": "0:3.1.1.6-8.git.64.80b61da.el7aos",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1094",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1094"
"url": "https://access.redhat.com/errata/RHSA-2016:1094",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1094"
},
{
"name": "RHSA-2016:1095",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1095"
"url": "https://access.redhat.com/errata/RHSA-2016:1095",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1095"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3703",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3703"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330233",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1330233"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jordan Liggitt (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3704",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords."
"value": "Pulp makes unsafe use of Bash's $RANDOM to generate a NSS DB password and seed resulting in insufficient randomness. An attacker could potentially guess the seed used given enough time and compute resources."
}
]
},
@ -44,48 +21,379 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Use of Insufficiently Random Values",
"cweId": "CWE-330"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.1.14-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.34-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:201801241201-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.4-1",
"version_affected": "!"
},
{
"version_value": "1:1.15.6.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5-15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.26-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.0.5-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.9-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0-23.0.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0.12-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.14-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.11-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.13-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.8-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.5-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.12-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.58-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.fm1_15.el7sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5",
"refsource": "CONFIRM",
"url": "https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5"
},
{
"name": "https://pulp.plan.io/issues/1858",
"refsource": "CONFIRM",
"url": "https://pulp.plan.io/issues/1858"
},
{
"name": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25",
"url": "https://access.redhat.com/errata/RHSA-2018:0336",
"refsource": "MISC",
"url": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25"
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "RHSA-2018:0336",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "FEDORA-2016-4373f7d32a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YM2LCC7QBRCK4LTN5EZT5OHTVAR3MYTY/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1330264",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330264"
},
{
"name": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105",
"url": "https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5",
"refsource": "MISC",
"url": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105"
"name": "https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YM2LCC7QBRCK4LTN5EZT5OHTVAR3MYTY/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YM2LCC7QBRCK4LTN5EZT5OHTVAR3MYTY/"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3704",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3704"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330264",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1330264"
},
{
"url": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25",
"refsource": "MISC",
"name": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25"
},
{
"url": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105",
"refsource": "MISC",
"name": "https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105"
},
{
"url": "https://pulp.plan.io/issues/1858",
"refsource": "MISC",
"name": "https://pulp.plan.io/issues/1858"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Randy Barlow (RedHat) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3705",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references."
"value": "Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion."
}
]
},
@ -44,93 +21,169 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Uncontrolled Recursion",
"cweId": "CWE-674"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.6-21.el6_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:2.9.1-6.el7_2.3",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/May/10"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "openSUSE-SU-2016:1446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html"
"url": "http://www.ubuntu.com/usn/USN-2994-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2994-1"
},
{
"name": "openSUSE-SU-2016:1298",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1292",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
"url": "https://access.redhat.com/errata/RHSA-2016:2957",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2957"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "MISC",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name": "DSA-3593",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2016/dsa-3593"
"url": "https://www.debian.org/security/2016/dsa-3593",
"refsource": "MISC",
"name": "https://www.debian.org/security/2016/dsa-3593"
},
{
"name": "USN-2994-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2994-1"
"url": "https://www.tenable.com/security/tns-2016-18",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"url": "https://security.gentoo.org/glsa/201701-37",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201701-37"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=765207",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=765207"
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html"
},
{
"name": "89854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/89854"
"url": "http://seclists.org/fulldisclosure/2016/May/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2016/May/10"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"url": "http://www.securityfocus.com/bid/89854",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/89854"
},
{
"name": "GLSA-201701-37",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-37"
"url": "https://access.redhat.com/security/cve/CVE-2016-3705",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3705"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=765207",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=765207"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443"
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239",
"refsource": "MISC",
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3708",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Red Hat OpenShift Enterprise 3.2, when multi-tenant SDN is enabled and a build is run in a namespace that would normally be isolated from pods in other namespaces, allows remote authenticated users to access network resources on restricted pods via an s2i build with a builder image that (1) contains ONBUILD commands or (2) does not contain a tar binary."
"value": "A flaw was found in OpenShift Enterprise when multi-tenant SDN is enabled and a build is run within a namespace that would normally be isolated from pods in other namespaces. If an s2i build is run in such an environment the container being built can access network resources on pods that should not be available to it."
}
]
},
@ -44,18 +21,88 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Access Control",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 3.2",
"version": {
"version_data": [
{
"version_value": "0:3.2.0.44-1.git.0.a4463d9.el7",
"version_affected": "!"
},
{
"version_value": "0:1.4.7-1.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1094",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1094"
"url": "https://access.redhat.com/errata/RHSA-2016:1094",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1094"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3708",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3708"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331229",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1331229"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Ben Parees (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3711",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the \"OPENSHIFT_[namespace]_SERVERID\" cookie."
"value": "An information disclosure flaw was discovered in haproxy as used by OpenShift Enterprise; a cookie with the name \"OPENSHIFT_[namespace]_SERVERID\" was set, which contained the internal IP address of a pod."
}
]
},
@ -44,23 +21,87 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 3.2",
"version": {
"version_data": [
{
"version_value": "0:0.0.20-1.el7aos",
"version_affected": "!"
},
{
"version_value": "0:1.0.8-2.el7aos",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1064",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1064"
"url": "https://access.redhat.com/errata/RHSA-2016:1064",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1064"
},
{
"name": "https://github.com/openshift/origin/pull/8334",
"refsource": "CONFIRM",
"url": "https://github.com/openshift/origin/pull/8334"
"url": "https://access.redhat.com/security/cve/CVE-2016-3711",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3711"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322718",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322718"
},
{
"url": "https://github.com/openshift/origin/pull/8334",
"refsource": "MISC",
"name": "https://github.com/openshift/origin/pull/8334"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3712",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode."
"value": "An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance."
}
]
},
@ -44,68 +21,155 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Out-of-bounds Read",
"cweId": "CWE-125"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.503.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "10:1.5.3-126.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://xenbits.xen.org/xsa/advisory-179.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-179.html"
"url": "http://www.ubuntu.com/usn/USN-2974-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2974-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "RHSA-2017:0621",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0621.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2585.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2585.html"
},
{
"name": "http://support.citrix.com/article/CTX212736",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX212736"
"url": "https://access.redhat.com/errata/RHSA-2016:2585",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2585"
},
{
"name": "[Qemu-devel] 20160509 [PULL 5/5] vga: make sure vga register setup for vbe stays intact (CVE-2016-3712).",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html"
"url": "http://support.citrix.com/article/CTX212736",
"refsource": "MISC",
"name": "http://support.citrix.com/article/CTX212736"
},
{
"name": "[oss-security] 20160509 CVE-2016-3712 Qemu: vga: out-of-bounds read and integer overflow issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/09/4"
"url": "http://www.debian.org/security/2016/dsa-3573",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3573"
},
{
"name": "1035794",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035794"
"url": "http://www.securitytracker.com/id/1035794",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1035794"
},
{
"name": "USN-2974-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2974-1"
"url": "http://xenbits.xen.org/xsa/advisory-179.html",
"refsource": "MISC",
"name": "http://xenbits.xen.org/xsa/advisory-179.html"
},
{
"name": "RHSA-2016:2585",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2585.html"
"url": "http://rhn.redhat.com/errata/RHSA-2017-0621.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2017-0621.html"
},
{
"name": "DSA-3573",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3573"
"url": "http://www.openwall.com/lists/oss-security/2016/05/09/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/09/4"
},
{
"name": "90314",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90314"
"url": "http://www.securityfocus.com/bid/90314",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90314"
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:0621",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2017:0621"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3712",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3712"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318712",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1318712"
},
{
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Zuozhi Fzz (Alibaba Inc.) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3715",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image."
"value": "It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete arbitrary files."
}
]
},
@ -44,113 +21,195 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:6.7.2.7-4.el6_7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:6.7.8.9-13.el7_2",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog",
"refsource": "CONFIRM",
"url": "http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "openSUSE-SU-2016:1266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
"url": "http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog",
"refsource": "MISC",
"name": "http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog"
},
{
"name": "https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588",
"refsource": "CONFIRM",
"url": "https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html"
},
{
"name": "openSUSE-SU-2016:1326",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html"
},
{
"name": "USN-2990-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2990-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html"
},
{
"name": "openSUSE-SU-2016:1261",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html"
},
{
"name": "20160513 May 2016 - HipChat Server - Critical Security Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538378/100/0/threaded"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html"
},
{
"name": "39767",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39767/"
"url": "http://rhn.redhat.com/errata/RHSA-2016-0726.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-0726.html"
},
{
"name": "SUSE-SU-2016:1260",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html"
"url": "http://www.debian.org/security/2016/dsa-3580",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3580"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"url": "http://www.debian.org/security/2016/dsa-3746",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3746"
},
{
"name": "[oss-security] 20160504 Re: ImageMagick Is On Fire -- CVE-2016-3714",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/03/18"
"url": "http://www.openwall.com/lists/oss-security/2016/05/03/18",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/03/18"
},
{
"name": "DSA-3746",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3746"
"url": "http://www.securityfocus.com/archive/1/538378/100/0/threaded",
"refsource": "MISC",
"name": "http://www.securityfocus.com/archive/1/538378/100/0/threaded"
},
{
"name": "GLSA-201611-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-21"
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568",
"refsource": "MISC",
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568"
},
{
"name": "SUSE-SU-2016:1275",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html"
"url": "http://www.ubuntu.com/usn/USN-2990-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2990-1"
},
{
"name": "SSA:2016-132-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568"
"url": "https://access.redhat.com/errata/RHSA-2016:0726",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:0726"
},
{
"name": "https://www.imagemagick.org/script/changelog.php",
"refsource": "CONFIRM",
"url": "https://www.imagemagick.org/script/changelog.php"
"url": "https://security.gentoo.org/glsa/201611-21",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201611-21"
},
{
"name": "DSA-3580",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3580"
"url": "https://www.exploit-db.com/exploits/39767/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/39767/"
},
{
"name": "RHSA-2016:0726",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0726.html"
"url": "https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588",
"refsource": "MISC",
"name": "https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588"
},
{
"name": "89852",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/89852"
"url": "https://www.imagemagick.org/script/changelog.php",
"refsource": "MISC",
"name": "https://www.imagemagick.org/script/changelog.php"
},
{
"url": "http://www.securityfocus.com/bid/89852",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/89852"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3715",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3715"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332500",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1332500"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Details can be found under the resolve tab at https://access.redhat.com/security/vulnerabilities/2296071\n\nRed Hat Enterprise Linux 6 and 7\n================================\n\nAs a workaround the /etc/ImageMagick/policy.xml file can be edited to disable processing of MVG, HTTPS, HTTP, URL, FTP, EPHEMERAL, MSL, LABEL, TEXT,\nSHOW, WIN and PLT commands within image files, simply add the following lines:\n\n<policy domain=\"coder\" rights=\"none\" pattern=\"EPHEMERAL\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"HTTPS\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"HTTP\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"URL\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"FTP\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"MVG\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"MSL\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"TEXT\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"LABEL\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"SHOW\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"WIN\" />\n<policy domain=\"coder\" rights=\"none\" pattern=\"PLT\" />\n<policy domain=\"path\" rights=\"none\" pattern=\"@*\" />\n\nwithin the policy map stanza:\n\n<policymap>\n...\n</policymap>\n\n\nRed Hat Enterprise Linux 5\n==========================\n\nIn the following folders:\n/usr/lib64/ImageMagick-6.2.8/modules-Q16/coders/ (64bit package)\nor\n/usr/lib/ImageMagick-6.2.8/modules-Q16/coders/ (32bit package)\n\nRename the following files:\n* mvg.so to mvg.so.bak\n* msl.so to msl.so.bak\n* label.so to label.so.bak"
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,25 +1,92 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10126",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "kernel",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "0:3.10.0-1062.4.1.rt56.1027.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1062.4.1.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.17.1.el7a",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.54.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-147.rt24.93.el8",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-147.el8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-80.15.1.el8_0",
"version_affected": "!"
}
]
}
@ -30,173 +97,182 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"url": "https://usn.ubuntu.com/4094-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4094-1/"
},
{
"url": "https://usn.ubuntu.com/4118-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4118-1/"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3309",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3309"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3517",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3517"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0204",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0174",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0174"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html"
},
{
"url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html"
},
{
"url": "http://www.securityfocus.com/bid/108817",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/108817"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3055",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3055"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3076",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3076"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3089",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3089"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:2289",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:2289"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10126",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10126"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126",
"refsource": "CONFIRM"
},
{
"refsource": "DEBIAN",
"name": "DSA-4465",
"url": "https://www.debian.org/security/2019/dsa-4465"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html"
},
{
"refsource": "BUGTRAQ",
"name": "20190618 [SECURITY] [DSA 4465-1] linux security update",
"url": "https://seclists.org/bugtraq/2019/Jun/26"
},
{
"refsource": "BID",
"name": "108817",
"url": "http://www.securityfocus.com/bid/108817"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K95593121",
"url": "https://support.f5.com/csp/article/K95593121"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190710-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190710-0002/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1716",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1757",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html"
},
{
"refsource": "BUGTRAQ",
"name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)",
"url": "https://seclists.org/bugtraq/2019/Jul/33"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4093-1",
"url": "https://usn.ubuntu.com/4093-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4094-1",
"url": "https://usn.ubuntu.com/4094-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4095-2",
"url": "https://usn.ubuntu.com/4095-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4095-1",
"url": "https://usn.ubuntu.com/4095-1/"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html",
"url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4117-1",
"url": "https://usn.ubuntu.com/4117-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4118-1",
"url": "https://usn.ubuntu.com/4118-1/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3076",
"url": "https://access.redhat.com/errata/RHSA-2019:3076"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3055",
"url": "https://access.redhat.com/errata/RHSA-2019:3055"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3089",
"url": "https://access.redhat.com/errata/RHSA-2019:3089"
"name": "https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
"name": "https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3309",
"url": "https://access.redhat.com/errata/RHSA-2019:3309"
"url": "https://seclists.org/bugtraq/2019/Jul/33",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Jul/33"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3517",
"url": "https://access.redhat.com/errata/RHSA-2019:3517"
"url": "https://seclists.org/bugtraq/2019/Jun/26",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Jun/26"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0174",
"url": "https://access.redhat.com/errata/RHSA-2020:0174"
"url": "https://security.netapp.com/advisory/ntap-20190710-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20190710-0002/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences."
"url": "https://support.f5.com/csp/article/K95593121",
"refsource": "MISC",
"name": "https://support.f5.com/csp/article/K95593121"
},
{
"url": "https://usn.ubuntu.com/4093-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4093-1/"
},
{
"url": "https://usn.ubuntu.com/4095-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4095-1/"
},
{
"url": "https://usn.ubuntu.com/4095-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4095-2/"
},
{
"url": "https://usn.ubuntu.com/4117-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4117-1/"
},
{
"url": "https://www.debian.org/security/2019/dsa-4465",
"refsource": "MISC",
"name": "https://www.debian.org/security/2019/dsa-4465"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank huangwen (ADLab of Venustech) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,51 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10137",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal flaw was found in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "spacewalkproject",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "spacewalk-proxy",
"product_name": "Red Hat Satellite Proxy v 5.8",
"version": {
"version_data": [
{
"version_value": "spacewalk through 2.9"
"version_value": "0:2.5.3-177.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-8.el6sat",
"version_affected": "!"
}
]
}
@ -30,43 +56,58 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:1663",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:1663"
},
{
"lang": "eng",
"value": "A path traversal flaw was found in spacewalk-proxy, all versions through 2.9, in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process."
"url": "https://access.redhat.com/security/cve/CVE-2019-10137",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10137"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702604",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1702604"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10137"
}
]
},
"work_around": [
{
"lang": "en",
"value": "SELinux in enforcing mode will prevent the proxy to access files that have an incompatible SELinux context"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Malte Kraus (SUSE) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,63 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10139",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVE-2019-10139 cockpit-ovirt: admin and appliance passwords saved in plain text variable file during HE deployment"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficiently Protected Credentials",
"cweId": "CWE-522"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ovirt",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "cockpit-ovirt",
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "0:0.13.5-1.el7ev",
"version_affected": "!"
},
{
"version_value": "0:1.1.9-0.1.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-0.20190717.0.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-2.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-20190722.0.el7_7",
"version_affected": "!"
}
]
}
@ -30,58 +68,56 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-522"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2019:2437",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"url": "http://www.securityfocus.com/bid/108396",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/108396"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2433",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2433"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10139",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10139"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709829",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1709829"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10139",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10139",
"refsource": "CONFIRM"
},
{
"refsource": "BID",
"name": "108396",
"url": "http://www.securityfocus.com/bid/108396"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2433",
"url": "https://access.redhat.com/errata/RHSA-2019:2433"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2437",
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted."
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10139"
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,58 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10143",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered freeradius does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execution with Unnecessary Privileges",
"cweId": "CWE-250"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "freeradius",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "freeradius",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "affects <= 3.0.19"
"version_value": "0:3.0.13-15.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "8010020190614154208.16b3ab4d",
"version_affected": "!"
}
]
}
@ -30,86 +63,87 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-266"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-250"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://freeradius.org/security/",
"refsource": "MISC",
"name": "https://freeradius.org/security/",
"url": "https://freeradius.org/security/"
"name": "https://freeradius.org/security/"
},
{
"url": "http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html"
},
{
"url": "http://seclists.org/fulldisclosure/2019/Nov/14",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2019/Nov/14"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3353",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3353"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:3984",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:3984"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10143",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10143"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705340",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1705340"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143"
},
{
"url": "https://github.com/FreeRADIUS/freeradius-server/pull/2666",
"name": "https://github.com/FreeRADIUS/freeradius-server/pull/2666",
"refsource": "CONFIRM"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-4a8eeaf80e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-9454ce61b2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3353",
"url": "https://access.redhat.com/errata/RHSA-2019:3353"
},
{
"refsource": "FULLDISC",
"name": "20191115 [AIT-SA-20191112-01] CVE-2019-10143: Privilege Escalation via Logrotate in FreeRadius",
"url": "http://seclists.org/fulldisclosure/2019/Nov/14"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html"
}
]
},
"description": {
"description_data": [
"name": "https://github.com/FreeRADIUS/freeradius-server/pull/2666"
},
{
"lang": "eng",
"value": "** DISPUTED ** It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated \"there is simply no way for anyone to gain privileges through this alleged issue.\""
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Add `su radiusd:radiusd` to all log sections in /etc/logrotate.d/radiusd.\n\nBy keeping SELinux in \"Enforcing\" mode, radiusd user will be limited in the directories he can write to."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10146",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Reflected Cross Site Scripting flaw was found in the pki-ca module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,49 @@
"product": {
"product_data": [
{
"product_name": "pki-core",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "all pki-core 10.x.x versions"
"version_value": "0:10.5.18-12.el7_9",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:10.5.9-15.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.7 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:10.5.16-7.el7_7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "8030020200911215836.5ff1562f",
"version_affected": "!"
},
{
"version_value": "8030020200527165326.30b713e6",
"version_affected": "!"
}
]
}
@ -30,43 +89,67 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2020:4847",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:4847"
},
{
"lang": "eng",
"value": "A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser."
"url": "https://access.redhat.com/errata/RHSA-2021:0819",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0819"
},
{
"url": "https://access.redhat.com/errata/RHSA-2021:0851",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0851"
},
{
"url": "https://access.redhat.com/errata/RHSA-2021:0975",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0975"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10146",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10146"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Pritam Singh (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,84 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10150",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that OpenShift Container Platform does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication",
"cweId": "CWE-287"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "redhat",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "atomic-openshift",
"product_name": "Red Hat OpenShift Container Platform 3.10",
"version": {
"version_data": [
{
"version_value": "3.6.x - 4.0.0"
"version_value": "0:3.10.175-1.git.0.f9f0e81.el7",
"version_affected": "!"
},
{
"version_value": "0:1.10.6-2.rhaos3.10.git56d7d9a.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 3.11",
"version": {
"version_data": [
{
"version_value": "0:3.11.153-1.git.0.aaf3f71.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 3.9",
"version": {
"version_data": [
{
"version_value": "0:3.9.102-1.git.0.6411f52.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.1",
"version": {
"version_data": [
{
"version_value": "v4.1.20-201910102034",
"version_affected": "!"
}
]
}
@ -30,68 +89,78 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2019:2989",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2989"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3007",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3007"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3143",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3143"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3811",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3811"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10150",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10150"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713433",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1713433"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10150",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10150"
},
{
"url": "https://docs.openshift.com/container-platform/3.11/dev_guide/builds/build_inputs.html#source-secrets-ssh-key-authentication",
"refsource": "MISC",
"name": "https://docs.openshift.com/container-platform/3.11/dev_guide/builds/build_inputs.html#source-secrets-ssh-key-authentication"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10150",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10150",
"refsource": "CONFIRM"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2989",
"url": "https://access.redhat.com/errata/RHSA-2019:2989"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3007",
"url": "https://access.redhat.com/errata/RHSA-2019:3007"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3143",
"url": "https://access.redhat.com/errata/RHSA-2019:3143"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3811",
"url": "https://access.redhat.com/errata/RHSA-2019:3811"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that OpenShift Container Platform versions 3.6.x - 4.6.0 does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output."
}
]
},
"work_around": [
{
"lang": "en",
"value": "Use only methods (such as HTTPS with TLS verification) that enable the identity of the remote repository to be validated."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank @l14n_uk for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10159",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A data leak vulnerability was found in cfme-gemset, in versions including and prior to 5.10.4.3 and versions including and prior to 5.9.9.3, due to an improper authorization in the migration log controller. An attacker with access to an unprivileged user account can access all VM migration logs available."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authorization",
"cweId": "CWE-285"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,20 @@
"product": {
"product_data": [
{
"product_name": "cfme",
"product_name": "CloudForms Management Engine 5.10",
"version": {
"version_data": [
{
"version_value": "5.10.4.3 and below, 5.9.9.3 and below"
"version_value": "0:3.5.1-1.el7at",
"version_affected": "!"
},
{
"version_value": "0:5.10.8.0-1.el7cf",
"version_affected": "!"
},
{
"version_value": "0:1.8.5-1.el7cf",
"version_affected": "!"
}
]
}
@ -30,48 +60,52 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10159",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10159",
"refsource": "CONFIRM"
"url": "https://access.redhat.com/errata/RHSA-2019:2466",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2466"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2466",
"url": "https://access.redhat.com/errata/RHSA-2019:2466"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/security/cve/CVE-2019-10159",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10159"
},
{
"lang": "eng",
"value": "cfme-gemset versions 5.10.4.3 and below, 5.9.9.3 and below are vulnerable to a data leak, due to an improper authorization in the migration log controller. An attacker with access to an unprivileged user can access all VM migration logs available."
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718080",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1718080"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10159",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10159"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Milan Zazrivec (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10160",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Encoding Error",
"cweId": "CWE-172"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Python",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "python",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "affects 2.7, 3.5, 3.6, 3.7, >= v3.8.0a4 and < v3.8.0b1"
"version_value": "0:2.7.5-80.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.16-6.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:2.7.16-6.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS",
"version": {
"version_data": [
{
"version_value": "0:2.7.16-6.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS",
"version": {
"version_data": [
{
"version_value": "0:2.7.16-6.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS",
"version": {
"version_data": [
{
"version_value": "0:2.7.16-6.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.1.9-0.1.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-0.20190717.0.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-2.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.3.5-20190722.0.el7_7",
"version_affected": "!"
}
]
}
@ -30,178 +130,182 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-172"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2437",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1587",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:1587"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1700",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:1700"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10160",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10160"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718388",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1718388"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160"
},
{
"url": "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09"
},
{
"url": "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e"
},
{
"url": "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de"
},
{
"url": "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468",
"refsource": "MISC",
"name": "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468"
},
{
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/"
},
{
"url": "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html",
"refsource": "MISC",
"name": "https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160",
"refsource": "CONFIRM"
"url": "https://security.netapp.com/advisory/ntap-20190617-0003/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20190617-0003/"
},
{
"url": "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e",
"name": "https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e",
"refsource": "CONFIRM"
"url": "https://usn.ubuntu.com/4127-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4127-1/"
},
{
"url": "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de",
"name": "https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de",
"refsource": "CONFIRM"
},
{
"url": "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09",
"name": "https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09",
"refsource": "CONFIRM"
},
{
"url": "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468",
"name": "https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468",
"refsource": "CONFIRM"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190617-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190617-0003/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1587",
"url": "https://access.redhat.com/errata/RHSA-2019:1587"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1700",
"url": "https://access.redhat.com/errata/RHSA-2019:1700"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7723d4774a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7df59302e0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-9bfb4a3e4b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-60a1defcd1",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2437",
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1906",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4127-2",
"url": "https://usn.ubuntu.com/4127-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4127-1",
"url": "https://usn.ubuntu.com/4127-1/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-50772cf122",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-5dc275c9f2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-2b1f72899a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-b06ec6159b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-d202cda4f8",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-57462fa10d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0086",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application."
"url": "https://usn.ubuntu.com/4127-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4127-2/"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Riccardo Schirone (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,69 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10176",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "RedHat",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "atomic-openshift",
"product_name": "Red Hat OpenShift Container Platform 3.11",
"version": {
"version_data": [
{
"version_value": "all versions fixed"
"version_value": "v3.11.157-1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.1",
"version": {
"version_data": [
{
"version_value": "v4.1.16-201909100604",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.2",
"version": {
"version_data": [
{
"version_value": "v4.2.0-201910101614",
"version_affected": "!"
}
]
}
@ -30,53 +74,62 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHBA-2019:2922",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHBA-2019:2922"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2792",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2792"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4053",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4053"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10176",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10176"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712569",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1712569"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176",
"refsource": "CONFIRM"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2792",
"url": "https://access.redhat.com/errata/RHSA-2019:2792"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4053",
"url": "https://access.redhat.com/errata/RHSA-2019:4053"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack."
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jeremy Choi (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,74 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10180",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "[UNKNOWN]",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "pki-core",
"product_name": "Red Hat Certificate System 9.4 EUS",
"version": {
"version_data": [
{
"version_value": "all pki-core 10.x.x versions"
"version_value": "0:1.1.17-4.el7dsrv",
"version_affected": "!"
},
{
"version_value": "0:10.5.9-2.el7pki",
"version_affected": "!"
},
{
"version_value": "0:10.5.9-15.el7pki",
"version_affected": "!"
},
{
"version_value": "0:10.5.9-5.el7pki",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Certificate System 9.7",
"version": {
"version_data": [
{
"version_value": "0:10.5.18-12.el7pki",
"version_affected": "!"
},
{
"version_value": "0:10.5.18-5.el7pki",
"version_affected": "!"
}
]
}
@ -30,43 +79,57 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2021:0947",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0947"
},
{
"lang": "eng",
"value": "A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code."
"url": "https://access.redhat.com/errata/RHSA-2021:0948",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0948"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10180",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10180"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721137",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1721137"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10180"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Pritam Singh (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "2.4/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
}
]
}
}

View File

@ -1,25 +1,58 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10182",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that icedtea-web did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Control of Generation of Code ('Code Injection')",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IcedTea",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "icedtea-web",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "affects up to and including 1.7.2 and 1.8.2"
"version_value": "0:1.7.1-2.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:1.7.1-17.el8_0",
"version_affected": "!"
}
]
}
@ -30,81 +63,93 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182",
"refsource": "CONFIRM"
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html"
},
{
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"refsource": "CONFIRM"
"url": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2003",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2003"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2004",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2004"
},
{
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327",
"refsource": "CONFIRM"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1911",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190909 [SECURITY] [DLA 1914-1] icedtea-web security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html"
},
{
"refsource": "BUGTRAQ",
"name": "20191007 CVE-2019-10181, CVE-2019-10182, CVE-2019-10185: IcedTea-Web vulnerabilities leading to RCE",
"url": "https://seclists.org/bugtraq/2019/Oct/5"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html"
}
]
},
"description": {
"description_data": [
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327"
},
{
"lang": "eng",
"value": "It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user."
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"refsource": "MISC",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html"
},
{
"url": "https://seclists.org/bugtraq/2019/Oct/5",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Oct/5"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10182",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10182"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724958",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1724958"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182"
}
]
},
"work_around": [
{
"lang": "en",
"value": "No known mitigation."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Imre Rad for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10183",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The virt-install utility used to provision new virtual machines, in virt-manager v2.2.0, has introduced an option '--unattended' to create VMs without user interaction. This option accepts guest VM password as command line arguments. An attacker could obtain these passwords though process listings on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,12 @@
"product": {
"product_data": [
{
"product_name": "virt-install",
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "from virt-manager v2.2.0"
"version_value": "0:2.2.1-2.el8",
"version_affected": "!"
}
]
}
@ -30,53 +52,67 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.securityfocus.com/bid/109027",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/109027"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3464",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3464"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10183",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10183"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726232",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1726232"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10183",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10183",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10183"
},
{
"refsource": "BID",
"name": "109027",
"url": "http://www.securityfocus.com/bid/109027"
"url": "https://virt-manager.org/download/",
"refsource": "MISC",
"name": "https://virt-manager.org/download/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3464",
"url": "https://access.redhat.com/errata/RHSA-2019:3464"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Virt-install(1) utility used to provision new virtual machines has introduced an option '--unattended' to create VMs without user interaction. This option accepts guest VM password as command line arguments, thus leaking them to others users on the system via process listing. It was introduced recently in the virt-manager v2.2.0 release."
"url": "https://www.openwall.com/lists/oss-security/2019/07/03/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/07/03/1"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Daniel P. Berrang\u00e9 (Red Hat Inc.)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,58 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10185",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that icedtea-web was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IcedTea",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "icedtea-web",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "affects up to and including 1.7.2 and 1.8.2"
"version_value": "0:1.7.1-2.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:1.7.1-17.el8_0",
"version_affected": "!"
}
]
}
@ -30,78 +63,98 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"refsource": "CONFIRM"
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html"
},
{
"url": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2003",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2003"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2004",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2004"
},
{
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327"
},
{
"url": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344",
"refsource": "MISC",
"name": "https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html"
},
{
"url": "https://seclists.org/bugtraq/2019/Oct/5",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Oct/5"
},
{
"url": "https://security.gentoo.org/glsa/202107-51",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/202107-51"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10185",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10185"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724989",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1724989"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10185",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10185",
"refsource": "CONFIRM"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1911",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190909 [SECURITY] [DLA 1914-1] icedtea-web security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html"
},
{
"refsource": "BUGTRAQ",
"name": "20191007 CVE-2019-10181, CVE-2019-10182, CVE-2019-10185: IcedTea-Web vulnerabilities leading to RCE",
"url": "https://seclists.org/bugtraq/2019/Oct/5"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-51",
"url": "https://security.gentoo.org/glsa/202107-51"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox."
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10185"
}
]
},
"work_around": [
{
"lang": "en",
"value": "No known mitigation."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Imre Rad for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,47 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10205",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the way Red Hat Quay stores robot account tokens in plain text. An attacker able to perform database queries in the Red Hat Quay database could use the tokens to read or write container images stored in the registry."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficiently Protected Credentials",
"cweId": "CWE-522"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "RED HAT",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "quay",
"product_name": "Red Hat Quay 3",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "v3.2.0-6",
"version_affected": "!"
}
]
}
@ -30,43 +52,52 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-522"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10205",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10205",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:4341",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4341"
},
{
"lang": "eng",
"value": "A flaw was found in the way Red Hat Quay stores robot account tokens in plain text. An attacker able to perform database queries in the Red Hat Quay database could use the tokens to read or write container images stored in the registry."
"url": "https://access.redhat.com/security/cve/CVE-2019-10205",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10205"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732190",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1732190"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10205",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10205"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Sean Smith (F5 Networks) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "6/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10207",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel\u2019s Bluetooth implementation of UART. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,31 @@
"product": {
"product_data": [
{
"product_name": "kernel",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x"
"version_value": "0:3.10.0-1127.rt56.1093.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1127.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-147.rt24.93.el8",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-147.el8",
"version_affected": "!"
}
]
}
@ -30,48 +71,66 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207",
"refsource": "CONFIRM"
"url": "https://access.redhat.com/errata/RHSA-2019:3309",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3309"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200103-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200103-0001/"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:3517",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3517"
},
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash."
"url": "https://security.netapp.com/advisory/ntap-20200103-0001/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20200103-0001/"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1016",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1016"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1070",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1070"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10207",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10207"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207"
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
}
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3560",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "pesign",
"version": {
"version_data": [
{
"version_value": "All versions up to pesign-115"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22->CWE-269"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2135420#c0",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135420#c0"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack."
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48079",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-48079",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Monnai aaPanel host system v1.5 contains an access control issue which allows attackers to escalate privileges and execute arbitrary code via uploading a crafted PHP file to the virtual host directory of the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://mf.mengnai.top/",
"refsource": "MISC",
"name": "http://mf.mengnai.top/"
},
{
"url": "https://thanatosxingyu.github.io/",
"refsource": "MISC",
"name": "https://thanatosxingyu.github.io/"
}
]
}