"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:00:56 +00:00
parent 2ffd22c369
commit 8a02665aa8
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
36 changed files with 1462 additions and 1913 deletions

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3504",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20121002 CVE-2012-3504: insecure temporary file usage in genkey perl script",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/02/3"
},
{
"name": "55756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55756"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"url": "http://www.openwall.com/lists/oss-security/2012/10/02/3",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
"name": "http://www.openwall.com/lists/oss-security/2012/10/02/3"
},
{
"name": "cryptoutils-genkey-symlink(79016)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016"
"url": "http://www.securityfocus.com/bid/55756",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55756"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3505",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket."
"value": "Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket."
}
]
},
@ -50,57 +27,81 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://banu.com/bugzilla/show_bug.cgi?id=110",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281",
"refsource": "MISC",
"url": "https://banu.com/bugzilla/show_bug.cgi?id=110"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281"
},
{
"name": "[oss-security] 20120817 CVE request: tinyproxy",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/17/3"
},
{
"name": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2",
"refsource": "CONFIRM",
"url": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2"
},
{
"name": "1027412",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027412"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985"
},
{
"name": "[oss-security] 20120818 Re: CVE request: tinyproxy",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/18/1"
},
{
"name": "51074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51074"
},
{
"name": "DSA-2564",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2564"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281",
"url": "http://secunia.com/advisories/50278",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281"
"name": "http://secunia.com/advisories/50278"
},
{
"name": "50278",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50278"
"url": "http://secunia.com/advisories/51074",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51074"
},
{
"url": "http://www.debian.org/security/2012/dsa-2564",
"refsource": "MISC",
"name": "http://www.debian.org/security/2012/dsa-2564"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/17/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/17/3"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/18/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/18/1"
},
{
"url": "http://www.securitytracker.com/id?1027412",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027412"
},
{
"url": "https://banu.com/bugzilla/show_bug.cgi?id=110",
"refsource": "MISC",
"name": "https://banu.com/bugzilla/show_bug.cgi?id=110"
},
{
"url": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2",
"refsource": "MISC",
"name": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3507",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/3"
},
{
"name": "http://www.securelist.com/en/advisories/50212",
"url": "http://secunia.com/advisories/50212",
"refsource": "MISC",
"url": "http://www.securelist.com/en/advisories/50212"
"name": "http://secunia.com/advisories/50212"
},
{
"name": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/"
"url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/",
"refsource": "MISC",
"name": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/"
},
{
"name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/9"
"url": "http://trac.roundcube.net/ticket/1488519",
"refsource": "MISC",
"name": "http://trac.roundcube.net/ticket/1488519"
},
{
"name": "[oss-security] 20120820 CVE-request: Roundcube XSS issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/2"
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/20/2"
},
{
"name": "http://trac.roundcube.net/ticket/1488519",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/ticket/1488519"
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/20/3"
},
{
"name": "50212",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50212"
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/20/9"
},
{
"url": "http://www.securelist.com/en/advisories/50212",
"refsource": "MISC",
"name": "http://www.securelist.com/en/advisories/50212"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3508",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://trac.roundcube.net/ticket/1488613",
"refsource": "CONFIRM",
"url": "http://trac.roundcube.net/ticket/1488613"
},
{
"name": "50279",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50279"
},
{
"name": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee",
"refsource": "CONFIRM",
"url": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee"
},
{
"name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/9"
},
{
"name": "[oss-security] 20120820 CVE-request: Roundcube XSS issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/2"
},
{
"name": "http://www.securelist.com/en/advisories/50279",
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/2",
"refsource": "MISC",
"url": "http://www.securelist.com/en/advisories/50279"
"name": "http://www.openwall.com/lists/oss-security/2012/08/20/2"
},
{
"name": "http://sourceforge.net/news/?group_id=139281&id=309011",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/news/?group_id=139281&id=309011"
"url": "http://www.openwall.com/lists/oss-security/2012/08/20/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/20/9"
},
{
"url": "http://secunia.com/advisories/50279",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50279"
},
{
"url": "http://sourceforge.net/news/?group_id=139281&id=309011",
"refsource": "MISC",
"name": "http://sourceforge.net/news/?group_id=139281&id=309011"
},
{
"url": "http://trac.roundcube.net/ticket/1488613",
"refsource": "MISC",
"name": "http://trac.roundcube.net/ticket/1488613"
},
{
"url": "http://www.securelist.com/en/advisories/50279",
"refsource": "MISC",
"name": "http://www.securelist.com/en/advisories/50279"
},
{
"url": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee",
"refsource": "MISC",
"name": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-3510 kernel: taskstats: use-after-free in xacct_add_tsk()"
"value": "Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Use After Free",
"cweId": "CWE-416"
"value": "n/a"
}
]
}
@ -32,16 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.18-308.16.1.el5",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -64,11 +63,6 @@
"refsource": "MISC",
"name": "http://secunia.com/advisories/50811"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1323",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1323"
},
{
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19",
"refsource": "MISC",
@ -95,44 +89,14 @@
"name": "http://www.securitytracker.com/id?1027602"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3510",
"url": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3510"
"name": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849722",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=849722"
},
{
"url": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3514",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "55114",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55114"
"url": "http://secunia.com/advisories/50311",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50311"
},
{
"name": "[oss-security] 20120820 ocaml-xml-light: hash table collisions CPU usage DoS CVE-2012-3514",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/21/2"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107"
},
{
"name": "MDVSA-2013:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107"
"url": "http://www.openwall.com/lists/oss-security/2012/08/21/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/21/2"
},
{
"name": "50311",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50311"
"url": "http://www.securityfocus.com/bid/55114",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55114"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266"
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266",
"refsource": "MISC",
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2012-3515 qemu: VT100 emulation vulnerability"
"value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model's address space.\""
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
"value": "n/a"
}
]
}
@ -32,46 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:83-249.el5_8.5",
"version_affected": "!"
},
{
"version_value": "0:3.0.3-135.el5_8.5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.295.el6_3.2",
"version_affected": "!"
}
]
}
},
{
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.295.el6_3.2",
"version_affected": "!"
},
{
"version_value": "0:6.3-20120926.0.el6_3",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -288,71 +257,6 @@
"url": "http://www.ubuntu.com/usn/USN-1590-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1590-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1233",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1233"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1234",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1234"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1235",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1235"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1236",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1236"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1262",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1262"
},
{
"url": "https://access.redhat.com/errata/RHSA-2012:1325",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1325"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-3515",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-3515"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=851252"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.4,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3516",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "55411",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55411"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html"
},
{
"name": "50530",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50530"
"url": "http://secunia.com/advisories/50472",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50472"
},
{
"name": "[oss-security] 20120905 Xen Security Advisory 18 (CVE-2012-3516) - grant table entry swaps have inadequate bounds checking",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/11"
"url": "http://secunia.com/advisories/50530",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50530"
},
{
"name": "50472",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50472"
"url": "http://support.citrix.com/article/CTX134708",
"refsource": "MISC",
"name": "http://support.citrix.com/article/CTX134708"
},
{
"name": "http://support.citrix.com/article/CTX134708",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX134708"
"url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking",
"refsource": "MISC",
"name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking"
},
{
"name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking",
"refsource": "CONFIRM",
"url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking"
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/09/05/11"
},
{
"name": "SUSE-SU-2012:1133",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html"
"url": "http://www.securityfocus.com/bid/55411",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55411"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3520",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,67 +27,91 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/22/1"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "55152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55152"
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html"
},
{
"name": "openSUSE-SU-2012:1330",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30"
},
{
"name": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea"
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
"url": "http://secunia.com/advisories/50848",
"refsource": "MISC",
"name": "http://secunia.com/advisories/50848"
},
{
"name": "USN-1599-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1599-1"
"url": "http://www.openwall.com/lists/oss-security/2012/08/22/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/08/22/1"
},
{
"name": "USN-1610-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1610-1"
"url": "http://www.securityfocus.com/bid/55152",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55152"
},
{
"name": "openSUSE-SU-2013:0261",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html"
"url": "http://www.ubuntu.com/usn/USN-1599-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1599-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30"
"url": "http://www.ubuntu.com/usn/USN-1610-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1610-1"
},
{
"name": "50848",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50848"
"url": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=850449",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=850449"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=850449",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=850449"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1788",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,82 +27,106 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696"
},
{
"name": "FEDORA-2013-3457",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"
},
{
"name": "MDVSA-2013:143",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"
},
{
"name": "FEDORA-2013-3473",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"
},
{
"name": "USN-1785-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1785-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917108",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108"
},
{
"name": "http://j00ru.vexillium.org/?p=1507",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa",
"refsource": "MISC",
"url": "http://j00ru.vexillium.org/?p=1507"
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa"
},
{
"name": "DSA-2719",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2719"
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492"
},
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa"
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696"
},
{
"name": "52846",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52846"
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959"
},
{
"name": "[oss-security] 20130228 Re: CVE Request: poppler 0.22.1 security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/8"
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888",
"refsource": "MISC",
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888"
},
{
"name": "[oss-security] 20130227 Re: CVE Request: poppler 0.22.1 security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/4"
"url": "http://j00ru.vexillium.org/?p=1507",
"refsource": "MISC",
"name": "http://j00ru.vexillium.org/?p=1507"
},
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"
},
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959"
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"
},
{
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492"
"url": "http://secunia.com/advisories/52846",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52846"
},
{
"url": "http://ubuntu.com/usn/usn-1785-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1785-1"
},
{
"url": "http://www.debian.org/security/2013/dsa-2719",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2719"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/28/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/02/28/8"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917108"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1792",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,97 +27,121 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1796-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1796-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html"
},
{
"name": "openSUSE-SU-2013:1187",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
},
{
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
"url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0744.html"
},
{
"name": "USN-1797-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1797-1"
"url": "http://www.ubuntu.com/usn/USN-1795-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1795-1"
},
{
"name": "USN-1788-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1788-1"
"url": "http://www.ubuntu.com/usn/USN-1796-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1796-1"
},
{
"name": "[oss-security] 20130307 CVE-2013-1792 Linux kernel: KEYS: race with concurrent install_user_keyrings()",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/07/1"
"url": "http://www.ubuntu.com/usn/USN-1797-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1797-1"
},
{
"name": "USN-1793-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1793-1"
"url": "http://www.ubuntu.com/usn/USN-1787-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1787-1"
},
{
"name": "USN-1792-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1792-1"
"url": "http://www.ubuntu.com/usn/USN-1788-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1788-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0da9dfdd2cd9889201bc6f6f43580c99165cd087",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0da9dfdd2cd9889201bc6f6f43580c99165cd087"
"url": "http://www.ubuntu.com/usn/USN-1792-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1792-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=916646",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=916646"
"url": "http://www.ubuntu.com/usn/USN-1793-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1793-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
"url": "http://www.ubuntu.com/usn/USN-1794-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1794-1"
},
{
"name": "USN-1794-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1794-1"
"url": "http://www.ubuntu.com/usn/USN-1798-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1798-1"
},
{
"name": "RHSA-2013:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0da9dfdd2cd9889201bc6f6f43580c99165cd087",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0da9dfdd2cd9889201bc6f6f43580c99165cd087"
},
{
"name": "USN-1795-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1795-1"
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
},
{
"name": "USN-1787-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1787-1"
"url": "http://www.openwall.com/lists/oss-security/2013/03/07/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/03/07/1"
},
{
"name": "openSUSE-SU-2014:0204",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html"
"url": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087"
},
{
"name": "USN-1798-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1798-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=916646",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=916646"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1793",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "openstack-utils",
"product": {
"product_data": [
{
"product_name": "openstack-db program",
"version": {
"version_data": [
{
"version_value": "through 2013-02-28"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,17 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "openstack-utils",
"product": {
"product_data": [
{
"product_name": "openstack-db program",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "through 2013-02-28"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793"
},
{
"url": "https://access.redhat.com/security/cve/cve-2013-1793",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2013-1793"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME"
"value": "Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Use After Free",
"cweId": "CWE-416"
"value": "n/a"
}
]
}
@ -32,60 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 5",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:83-262.el5_9.3",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-358.6.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.2 EUS - Server and Compute Node Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-220.39.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-279.31.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
"version": {
"version_data": [
{
"version_value": "0:6.4-20130415.0.el6_4",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -118,11 +73,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0928",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0928"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html",
"refsource": "MISC",
@ -168,70 +118,20 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1813-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0727",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0727"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0744",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0744"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0746",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0746"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:1026",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:1026"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1797",
"url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1797"
"name": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917013"
},
{
"url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1798",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,92 +27,116 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2013:0847",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html"
},
{
"name": "openSUSE-SU-2013:1187",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2c118bfab8bc6b8bb213abfc35201e441693d55",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2c118bfab8bc6b8bb213abfc35201e441693d55"
},
{
"name": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55"
},
{
"name": "USN-1812-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1812-1"
},
{
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "RHSA-2013:0928",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"name": "USN-1809-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1809-1"
},
{
"name": "RHSA-2013:0727",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html"
},
{
"name": "[oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/20/9"
},
{
"name": "RHSA-2013:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html"
},
{
"name": "RHSA-2013:0746",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html"
},
{
"name": "USN-1813-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1813-1"
},
{
"name": "openSUSE-SU-2013:0925",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917017",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017"
},
{
"name": "RHSA-2013:1026",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html",
"url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html"
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "MISC",
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html"
},
{
"url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0727.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0744.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0746.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1026.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/03/20/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/03/20/9"
},
{
"url": "http://www.ubuntu.com/usn/USN-1809-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1809-1"
},
{
"url": "http://www.ubuntu.com/usn/USN-1812-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1812-1"
},
{
"url": "http://www.ubuntu.com/usn/USN-1813-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1813-1"
},
{
"url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917017"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1799",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network. NOTE: this issue exists because of an incomplete fix for CVE-2013-0240."
"value": "Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network. NOTE: this issue exists because of an incomplete fix for CVE-2013-0240."
}
]
},
@ -50,52 +27,76 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[gnome-announce-list] 20130305 GNOME Online Accounts 3.7.91 released",
"refsource": "MLIST",
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html"
},
{
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8"
"url": "http://secunia.com/advisories/51976",
"refsource": "MISC",
"name": "http://secunia.com/advisories/51976"
},
{
"name": "51976",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51976"
"url": "http://secunia.com/advisories/52791",
"refsource": "MISC",
"name": "http://secunia.com/advisories/52791"
},
{
"name": "[gnome-announce-list] 20130304 GNOME Online Accounts 3.6.3 released",
"refsource": "MLIST",
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html"
"url": "http://ubuntu.com/usn/usn-1779-1",
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-1779-1"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=695106",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=695106"
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214"
},
{
"name": "USN-1779-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1779-1"
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=695106",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=695106"
},
{
"name": "52791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52791"
"url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214"
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html",
"refsource": "MISC",
"name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html"
},
{
"name": "openSUSE-SU-2013:0301",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html"
"url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html",
"refsource": "MISC",
"name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1800",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,37 +27,61 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
},
{
"name": "52897",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52897"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804721",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804721"
},
{
"name": "SUSE-SU-2013:0615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html"
},
{
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html",
"refsource": "MISC",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html"
},
{
"name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
"url": "http://secunia.com/advisories/52897",
"refsource": "MISC",
"url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
"name": "http://secunia.com/advisories/52897"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804721",
"refsource": "MISC",
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804721"
},
{
"url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
"refsource": "MISC",
"name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
},
{
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"refsource": "MISC",
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1801",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031",
"refsource": "CONFIRM",
"url": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031"
},
{
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"refsource": "MISC",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917229",
"url": "http://www.securityfocus.com/bid/58260",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917229"
"name": "http://www.securityfocus.com/bid/58260"
},
{
"name": "58260",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58260"
"url": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031",
"refsource": "MISC",
"name": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917229",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917229"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1802",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5",
"refsource": "CONFIRM",
"url": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5"
},
{
"name": "SUSE-SU-2013:0612",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html"
},
{
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"refsource": "MISC",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917233",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917233"
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html"
},
{
"url": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5",
"refsource": "MISC",
"name": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917233",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917233"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4298",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,47 +27,71 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1949-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1949-1"
"url": "http://www.imagemagick.org/script/changelog.php",
"refsource": "MISC",
"name": "http://www.imagemagick.org/script/changelog.php"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248"
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273",
"refsource": "MISC",
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273"
},
{
"name": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921",
"refsource": "CONFIRM",
"url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921"
"url": "http://secunia.com/advisories/54581",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54581"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273"
"url": "http://secunia.com/advisories/54671",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54671"
},
{
"name": "http://www.imagemagick.org/script/changelog.php",
"refsource": "CONFIRM",
"url": "http://www.imagemagick.org/script/changelog.php"
"url": "http://www.debian.org/security/2013/dsa-2750",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2750"
},
{
"name": "54671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54671"
"url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921",
"refsource": "MISC",
"name": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921"
},
{
"name": "54581",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54581"
"url": "http://www.ubuntu.com/usn/USN-1949-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1949-1"
},
{
"name": "DSA-2750",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2750"
"url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4299",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,142 +27,166 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1436",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
},
{
"name": "USN-2015-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2015-1"
"url": "http://www.ubuntu.com/usn/USN-2066-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2066-1"
},
{
"name": "RHSA-2013:1783",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1783.html"
"url": "http://www.ubuntu.com/usn/USN-2067-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2067-1"
},
{
"name": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1490.html"
},
{
"name": "USN-2043-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2043-1"
"url": "http://www.ubuntu.com/usn/USN-2049-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2049-1"
},
{
"name": "RHSA-2013:1490",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1449.html"
},
{
"name": "SUSE-SU-2015:0652",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
"url": "http://www.ubuntu.com/usn/USN-2050-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2050-1"
},
{
"name": "RHSA-2013:1519",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1519.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1450.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1450.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1436.html"
},
{
"name": "USN-2040-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2040-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
},
{
"name": "USN-2016-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2016-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1520.html"
},
{
"name": "RHSA-2013:1520",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html"
"url": "http://www.ubuntu.com/usn/USN-2041-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2041-1"
},
{
"name": "USN-2044-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2044-1"
"url": "http://www.ubuntu.com/usn/USN-2045-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2045-1"
},
{
"name": "USN-2066-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2066-1"
"url": "http://www.ubuntu.com/usn/USN-2040-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2040-1"
},
{
"name": "RHSA-2013:1449",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html"
"url": "http://www.ubuntu.com/usn/USN-2042-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2042-1"
},
{
"name": "RHSA-2013:1860",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1860.html"
"url": "http://www.ubuntu.com/usn/USN-2043-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2043-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233"
"url": "http://www.ubuntu.com/usn/USN-2044-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2044-1"
},
{
"name": "USN-2049-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2049-1"
"url": "http://www.ubuntu.com/usn/USN-2046-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2046-1"
},
{
"name": "USN-2045-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2045-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"name": "RHSA-2013:1460",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1519.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1519.html"
},
{
"name": "RHSA-2013:1450",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1450.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1783.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1783.html"
},
{
"name": "USN-2050-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2050-1"
"url": "http://www.ubuntu.com/usn/USN-2015-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2015-1"
},
{
"name": "USN-2042-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2042-1"
"url": "http://www.ubuntu.com/usn/USN-2016-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2016-1"
},
{
"name": "USN-2041-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2041-1"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca",
"refsource": "MISC",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca"
},
{
"name": "USN-2067-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2067-1"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1860.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1860.html"
},
{
"name": "USN-2046-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2046-1"
"url": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca"
},
{
"name": "SUSE-SU-2015:0812",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4300",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d661684cf6820331feae71146c35da83d794467e",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d661684cf6820331feae71146c35da83d794467e"
"url": "http://www.ubuntu.com/usn/USN-1995-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1995-1"
},
{
"name": "USN-1995-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1995-1"
"url": "http://www.ubuntu.com/usn/USN-1998-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1998-1"
},
{
"name": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e"
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e",
"refsource": "MISC",
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736"
"url": "http://www.openwall.com/lists/oss-security/2013/09/05/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/05/3"
},
{
"name": "[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/05/3"
"url": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e"
},
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2",
"refsource": "CONFIRM",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2"
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2",
"refsource": "MISC",
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2"
},
{
"name": "USN-1998-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1998-1"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4311",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,42 +27,66 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1954-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1954-1"
"url": "http://wiki.libvirt.org/page/Maintenance_Releases",
"refsource": "MISC",
"name": "http://wiki.libvirt.org/page/Maintenance_Releases"
},
{
"name": "http://wiki.libvirt.org/page/Maintenance_Releases",
"refsource": "CONFIRM",
"url": "http://wiki.libvirt.org/page/Maintenance_Releases"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
},
{
"name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html"
},
{
"name": "RHSA-2013:1272",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html"
},
{
"name": "RHSA-2013:1460",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1272.html"
},
{
"name": "openSUSE-SU-2013:1550",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html"
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
},
{
"name": "openSUSE-SU-2013:1549",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html"
"url": "http://www.ubuntu.com/usn/USN-1954-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1954-1"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that the Linux kernel did not properly account file descriptors passed over the unix socket against the process limit. A local user could use this flaw to exhaust all available memory on the system."
"value": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c."
}
]
},
@ -21,8 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Uncontrolled Resource Consumption",
"cweId": "CWE-400"
"value": "n/a"
}
]
}
@ -32,31 +31,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-642.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.rt56.420.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-514.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -79,16 +63,6 @@
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2574",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2574"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2584",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2584"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html",
"refsource": "MISC",
@ -99,11 +73,6 @@
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:0855",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:0855"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html",
"refsource": "MISC",
@ -169,16 +138,6 @@
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2931-1"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-4312",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-4312"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813"
},
{
"url": "https://github.com/torvalds/linux/commit/712f4aad406bb1ed67f3f98d04c044191f0ff593",
"refsource": "MISC",
@ -188,31 +147,11 @@
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4312",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4312"
}
]
},
"impact": {
"cvss": [
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4319",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130909 Re: CVE request: Torque privilege escalation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/09/11"
"url": "http://www.debian.org/security/2013/dsa-2770",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2770"
},
{
"name": "DSA-2770",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2770"
"url": "http://www.openwall.com/lists/oss-security/2013/09/09/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/09/11"
},
{
"name": "[torqueusers] 20130906 security advisory",
"refsource": "MLIST",
"url": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html"
"url": "http://www.openwall.com/lists/oss-security/2013/09/09/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/09/4"
},
{
"name": "[oss-security] 20130909 CVE request: Torque privilege escalation",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/09/4"
"url": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html",
"refsource": "MISC",
"name": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4324",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2013:1562",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html"
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
},
{
"name": "54947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54947"
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html"
},
{
"name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1273.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-1273.html"
},
{
"name": "RHSA-2013:1273",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1273.html"
"url": "http://secunia.com/advisories/54947",
"refsource": "MISC",
"name": "http://secunia.com/advisories/54947"
},
{
"name": "62538",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62538"
"url": "http://www.securityfocus.com/bid/62538",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/62538"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4327",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,27 +27,51 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "USN-1961-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1961-1"
},
{
"name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
},
{
"name": "DSA-2777",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2777"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680",
"url": "http://www.openwall.com/lists/oss-security/2013/09/18/6",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680"
"name": "http://www.openwall.com/lists/oss-security/2013/09/18/6"
},
{
"url": "http://www.debian.org/security/2013/dsa-2777",
"refsource": "MISC",
"name": "http://www.debian.org/security/2013/dsa-2777"
},
{
"url": "http://www.ubuntu.com/usn/USN-1961-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1961-1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680"
}
]
}

View File

@ -1,35 +1,12 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4329",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -50,32 +27,56 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130910 Re: Xen Security Advisory 61 - libxl partially sets up HVM passthrough even with disabled iommu",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/09/10/4"
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "[Xen-devel] 20130701 [PATCH] libxl: suppress device assignment to HVM guest when there is no IOMMU",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html"
"url": "http://www.debian.org/security/2014/dsa-3006",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-3006"
},
{
"name": "GLSA-201407-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
"refsource": "MISC",
"name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
"url": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html",
"refsource": "MISC",
"name": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html"
},
{
"name": "DSA-3006",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3006"
"url": "http://www.openwall.com/lists/oss-security/2013/09/10/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/10/4"
}
]
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10866",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -19,6 +40,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "redhat-certification 7"
}
]
@ -30,37 +52,17 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10866",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10866",
"url": "https://access.redhat.com/security/cve/CVE-2018-10866"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him."
"name": "https://access.redhat.com/security/cve/CVE-2018-10866"
}
]
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10867",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552",
"cweId": "CWE-552"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -19,6 +40,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "redhat-certification 7"
}
]
@ -30,37 +52,17 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10867",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10867",
"url": "https://access.redhat.com/security/cve/CVE-2018-10867"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user."
"name": "https://access.redhat.com/security/cve/CVE-2018-10867"
}
]
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10868",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a \"Billion Laugh Attack\" by replying to XMLRPC methods when getting the status of an host."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400",
"cweId": "CWE-400"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -19,6 +40,7 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "redhat-certification 7"
}
]
@ -30,37 +52,17 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10868",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10868",
"url": "https://access.redhat.com/security/cve/CVE-2018-10868"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a \"Billion Laugh Attack\" by replying to XMLRPC methods when getting the status of an host."
"name": "https://access.redhat.com/security/cve/CVE-2018-10868"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was discovered that redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd."
"value": "redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd."
}
]
},
@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Files or Directories Accessible to External Parties",
"value": "CWE-552",
"cweId": "CWE-552"
}
]
@ -32,20 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Certification for Red Hat Enterprise Linux 7",
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "0:5.16-20180809.el7",
"version_affected": "!"
},
{
"version_value": "0:5.16-20180809.1.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -68,16 +64,6 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:2373"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10869",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10869"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593780",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593780"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10869",
"refsource": "MISC",
@ -85,18 +71,6 @@
}
]
},
"work_around": [
{
"lang": "en",
"value": "If SELinux is enabled it further restricts the set of files that can be downloaded through this flaw."
}
],
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Riccardo Schirone (Red Hat Product Security)."
}
],
"impact": {
"cvss": [
{

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "CVE-2018-10874 ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution"
"value": "In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result."
}
]
},
@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Untrusted Search Path",
"value": "CWE-426",
"cweId": "CWE-426"
}
]
@ -32,105 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Ansible Engine 2.4 for RHEL 7",
"product_name": "ansible",
"version": {
"version_data": [
{
"version_value": "0:2.4.6.0-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Ansible Engine 2.5 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.5.6-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Ansible Engine 2.6 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.6.1-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Ansible Engine 2 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.6.1-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 10.0 (Newton)",
"version": {
"version_data": [
{
"version_value": "0:2.4.6.0-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 12.0 (Pike)",
"version": {
"version_data": [
{
"version_value": "0:2.4.6.0-1.el7ae",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-4.el7ost",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 13.0 (Queens)",
"version": {
"version_data": [
{
"version_value": "0:2.4.6.0-1.el7ae",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.0.22-1.el7ev",
"version_affected": "!"
},
{
"version_value": "0:4.2-5.0.el7",
"version_affected": "!"
},
{
"version_value": "0:4.2-20180724.0",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -188,16 +99,6 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:0054"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10874",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10874"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596528",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596528"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10874",
"refsource": "MISC",
@ -210,12 +111,6 @@
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Michael Scherer (OSAS) for reporting this issue."
}
],
"impact": {
"cvss": [
{

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image."
"value": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image."
}
]
},
@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Use After Free",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
@ -32,16 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "0:4.14.0-115.6.1.el7a",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -109,21 +109,11 @@
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:0525"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10876",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10876"
},
{
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=199403",
"refsource": "MISC",
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=199403"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596773",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596773"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876",
"refsource": "MISC",

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image."
"value": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image."
}
]
},
@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Read",
"value": "CWE-125",
"cweId": "CWE-125"
}
]
@ -32,16 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "0:4.14.0-115.el7a",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -109,16 +109,6 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/104878"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10877",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10877"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877",
"refsource": "MISC",
@ -130,16 +120,16 @@
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]

View File

@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Write",
"value": "CWE-787",
"cweId": "CWE-787"
}
]
@ -32,24 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.rt56.910.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.el7a",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-957.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -122,21 +114,11 @@
"refsource": "MISC",
"name": "http://patchwork.ozlabs.org/patch/929238/"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10878",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10878"
},
{
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=199865",
"refsource": "MISC",
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=199865"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878",
"refsource": "MISC",

View File

@ -21,7 +21,7 @@
"description": [
{
"lang": "eng",
"value": "Use After Free",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
@ -32,24 +32,16 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"vendor_name": "[UNKNOWN]",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.rt56.910.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.el7a",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-957.el7",
"version_affected": "!"
"version_affected": "=",
"version_value": "n/a"
}
]
}
@ -127,21 +119,11 @@
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/104902"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2018-10879",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-10879"
},
{
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=200001",
"refsource": "MISC",
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=200001"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879",
"refsource": "MISC",