From 83e34deb7f81776e353841e2e7f58dc3b9273a22 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 1 Nov 2018 10:05:53 -0400 Subject: [PATCH] - Synchronized data. --- 2018/14xxx/CVE-2018-14660.json | 143 +++++++++++++++++---------------- 2018/7xxx/CVE-2018-7356.json | 1 + 2 files changed, 73 insertions(+), 71 deletions(-) diff --git a/2018/14xxx/CVE-2018-14660.json b/2018/14xxx/CVE-2018-14660.json index c1b62a3748f..08fdaffef82 100644 --- a/2018/14xxx/CVE-2018-14660.json +++ b/2018/14xxx/CVE-2018-14660.json @@ -1,74 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2018-14660", - "ASSIGNER": "lpardo@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "[UNKNOWN]", - "product": { - "product_data": [ - { - "product_name": "glusterfs", - "version": { - "version_data": [ - { - "version_value": "affected versions through 4.1.4" - }, - { - "version_value": "affected versions through 3.1.2" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "lpardo@redhat.com", + "ID" : "CVE-2018-14660", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "glusterfs", + "version" : { + "version_data" : [ + { + "version_value" : "affected versions through 4.1.4" + }, + { + "version_value" : "affected versions through 3.1.2" + } + ] + } + } + ] + }, + "vendor_name" : "[UNKNOWN]" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-400" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-400" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - } - ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660" + } + ] + } } diff --git a/2018/7xxx/CVE-2018-7356.json b/2018/7xxx/CVE-2018-7356.json index d56294686e9..b37ee75f513 100644 --- a/2018/7xxx/CVE-2018-7356.json +++ b/2018/7xxx/CVE-2018-7356.json @@ -70,6 +70,7 @@ "references" : { "reference_data" : [ { + "name" : "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1009783", "refsource" : "CONFIRM", "url" : "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1009783" }