diff --git a/2012/3xxx/CVE-2012-3504.json b/2012/3xxx/CVE-2012-3504.json index c2acca142be..8179f8437f3 100644 --- a/2012/3xxx/CVE-2012-3504.json +++ b/2012/3xxx/CVE-2012-3504.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3504", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20121002 CVE-2012-3504: insecure temporary file usage in genkey perl script", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/10/02/3" - }, - { - "name": "55756", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/55756" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256", + "url": "http://www.openwall.com/lists/oss-security/2012/10/02/3", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256" + "name": "http://www.openwall.com/lists/oss-security/2012/10/02/3" }, { - "name": "cryptoutils-genkey-symlink(79016)", - "refsource": "XF", - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016" + "url": "http://www.securityfocus.com/bid/55756", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/55756" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79016" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256" } ] } diff --git a/2012/3xxx/CVE-2012-3505.json b/2012/3xxx/CVE-2012-3505.json index 5b63447bcc1..ad4662f66df 100644 --- a/2012/3xxx/CVE-2012-3505.json +++ b/2012/3xxx/CVE-2012-3505.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3505", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket." + "value": "Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket." } ] }, @@ -50,57 +27,81 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://banu.com/bugzilla/show_bug.cgi?id=110", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281", "refsource": "MISC", - "url": "https://banu.com/bugzilla/show_bug.cgi?id=110" + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281" }, { - "name": "[oss-security] 20120817 CVE request: tinyproxy", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/17/3" - }, - { - "name": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2", - "refsource": "CONFIRM", - "url": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2" - }, - { - "name": "1027412", - "refsource": "SECTRACK", - "url": "http://www.securitytracker.com/id?1027412" - }, - { - "name": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985" - }, - { - "name": "[oss-security] 20120818 Re: CVE request: tinyproxy", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/18/1" - }, - { - "name": "51074", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51074" - }, - { - "name": "DSA-2564", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2012/dsa-2564" - }, - { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281", + "url": "http://secunia.com/advisories/50278", "refsource": "MISC", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281" + "name": "http://secunia.com/advisories/50278" }, { - "name": "50278", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50278" + "url": "http://secunia.com/advisories/51074", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51074" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2564", + "refsource": "MISC", + "name": "http://www.debian.org/security/2012/dsa-2564" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/17/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/17/3" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/18/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/18/1" + }, + { + "url": "http://www.securitytracker.com/id?1027412", + "refsource": "MISC", + "name": "http://www.securitytracker.com/id?1027412" + }, + { + "url": "https://banu.com/bugzilla/show_bug.cgi?id=110", + "refsource": "MISC", + "name": "https://banu.com/bugzilla/show_bug.cgi?id=110" + }, + { + "url": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2", + "refsource": "MISC", + "name": "https://banu.com/bugzilla/show_bug.cgi?id=110#c2" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985" } ] } diff --git a/2012/3xxx/CVE-2012-3507.json b/2012/3xxx/CVE-2012-3507.json index 43d548d5ecd..8d09204eae4 100644 --- a/2012/3xxx/CVE-2012-3507.json +++ b/2012/3xxx/CVE-2012-3507.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3507", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/20/3" - }, - { - "name": "http://www.securelist.com/en/advisories/50212", + "url": "http://secunia.com/advisories/50212", "refsource": "MISC", - "url": "http://www.securelist.com/en/advisories/50212" + "name": "http://secunia.com/advisories/50212" }, { - "name": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/" + "url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/", + "refsource": "MISC", + "name": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/" }, { - "name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9" + "url": "http://trac.roundcube.net/ticket/1488519", + "refsource": "MISC", + "name": "http://trac.roundcube.net/ticket/1488519" }, { - "name": "[oss-security] 20120820 CVE-request: Roundcube XSS issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2" + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/20/2" }, { - "name": "http://trac.roundcube.net/ticket/1488519", - "refsource": "CONFIRM", - "url": "http://trac.roundcube.net/ticket/1488519" + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/20/3" }, { - "name": "50212", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50212" + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/20/9" + }, + { + "url": "http://www.securelist.com/en/advisories/50212", + "refsource": "MISC", + "name": "http://www.securelist.com/en/advisories/50212" } ] } diff --git a/2012/3xxx/CVE-2012-3508.json b/2012/3xxx/CVE-2012-3508.json index d19eaa69449..7239c8b015a 100644 --- a/2012/3xxx/CVE-2012-3508.json +++ b/2012/3xxx/CVE-2012-3508.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3508", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://trac.roundcube.net/ticket/1488613", - "refsource": "CONFIRM", - "url": "http://trac.roundcube.net/ticket/1488613" - }, - { - "name": "50279", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50279" - }, - { - "name": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee", - "refsource": "CONFIRM", - "url": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee" - }, - { - "name": "[oss-security] 20120820 Re: CVE-request: Roundcube XSS issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9" - }, - { - "name": "[oss-security] 20120820 CVE-request: Roundcube XSS issues", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2" - }, - { - "name": "http://www.securelist.com/en/advisories/50279", + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2", "refsource": "MISC", - "url": "http://www.securelist.com/en/advisories/50279" + "name": "http://www.openwall.com/lists/oss-security/2012/08/20/2" }, { - "name": "http://sourceforge.net/news/?group_id=139281&id=309011", - "refsource": "CONFIRM", - "url": "http://sourceforge.net/news/?group_id=139281&id=309011" + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/20/9" + }, + { + "url": "http://secunia.com/advisories/50279", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50279" + }, + { + "url": "http://sourceforge.net/news/?group_id=139281&id=309011", + "refsource": "MISC", + "name": "http://sourceforge.net/news/?group_id=139281&id=309011" + }, + { + "url": "http://trac.roundcube.net/ticket/1488613", + "refsource": "MISC", + "name": "http://trac.roundcube.net/ticket/1488613" + }, + { + "url": "http://www.securelist.com/en/advisories/50279", + "refsource": "MISC", + "name": "http://www.securelist.com/en/advisories/50279" + }, + { + "url": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee", + "refsource": "MISC", + "name": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee" } ] } diff --git a/2012/3xxx/CVE-2012-3510.json b/2012/3xxx/CVE-2012-3510.json index 6d6adf96640..d98f3580004 100644 --- a/2012/3xxx/CVE-2012-3510.json +++ b/2012/3xxx/CVE-2012-3510.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-3510 kernel: taskstats: use-after-free in xacct_add_tsk()" + "value": "Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", - "cweId": "CWE-416" + "value": "n/a" } ] } @@ -32,16 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.18-308.16.1.el5", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -64,11 +63,6 @@ "refsource": "MISC", "name": "http://secunia.com/advisories/50811" }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1323", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1323" - }, { "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19", "refsource": "MISC", @@ -95,44 +89,14 @@ "name": "http://www.securitytracker.com/id?1027602" }, { - "url": "https://access.redhat.com/security/cve/CVE-2012-3510", + "url": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-3510" + "name": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849722", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=849722" - }, - { - "url": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 5.6, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "PARTIAL", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C", - "version": "2.0" } ] } diff --git a/2012/3xxx/CVE-2012-3514.json b/2012/3xxx/CVE-2012-3514.json index cb21121d275..9bbb0e71dad 100644 --- a/2012/3xxx/CVE-2012-3514.json +++ b/2012/3xxx/CVE-2012-3514.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3514", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "55114", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/55114" + "url": "http://secunia.com/advisories/50311", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50311" }, { - "name": "[oss-security] 20120820 ocaml-xml-light: hash table collisions CPU usage DoS CVE-2012-3514", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/21/2" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107" }, { - "name": "MDVSA-2013:107", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107" + "url": "http://www.openwall.com/lists/oss-security/2012/08/21/2", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/21/2" }, { - "name": "50311", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50311" + "url": "http://www.securityfocus.com/bid/55114", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/55114" }, { - "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266", - "refsource": "CONFIRM", - "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266" + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266", + "refsource": "MISC", + "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266" } ] } diff --git a/2012/3xxx/CVE-2012-3515.json b/2012/3xxx/CVE-2012-3515.json index d78e289a712..400feaeecc2 100644 --- a/2012/3xxx/CVE-2012-3515.json +++ b/2012/3xxx/CVE-2012-3515.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2012-3515 qemu: VT100 emulation vulnerability" + "value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model's address space.\"" } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "cweId": "CWE-119" + "value": "n/a" } ] } @@ -32,46 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:83-249.el5_8.5", - "version_affected": "!" - }, - { - "version_value": "0:3.0.3-135.el5_8.5", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "2:0.12.1.2-2.295.el6_3.2", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6", - "version": { - "version_data": [ - { - "version_value": "2:0.12.1.2-2.295.el6_3.2", - "version_affected": "!" - }, - { - "version_value": "0:6.3-20120926.0.el6_3", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -288,71 +257,6 @@ "url": "http://www.ubuntu.com/usn/USN-1590-1", "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-1590-1" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1233", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1233" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1234", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1234" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1235", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1235" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1236", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1236" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1262", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1262" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2012:1325", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2012:1325" - }, - { - "url": "https://access.redhat.com/security/cve/CVE-2012-3515", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2012-3515" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "MEDIUM", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 7.4, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", - "version": "2.0" } ] } diff --git a/2012/3xxx/CVE-2012-3516.json b/2012/3xxx/CVE-2012-3516.json index 17fcdebc9eb..d29c0b35544 100644 --- a/2012/3xxx/CVE-2012-3516.json +++ b/2012/3xxx/CVE-2012-3516.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3516", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "55411", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/55411" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { - "name": "50530", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50530" + "url": "http://secunia.com/advisories/50472", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50472" }, { - "name": "[oss-security] 20120905 Xen Security Advisory 18 (CVE-2012-3516) - grant table entry swaps have inadequate bounds checking", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/09/05/11" + "url": "http://secunia.com/advisories/50530", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50530" }, { - "name": "50472", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50472" + "url": "http://support.citrix.com/article/CTX134708", + "refsource": "MISC", + "name": "http://support.citrix.com/article/CTX134708" }, { - "name": "http://support.citrix.com/article/CTX134708", - "refsource": "CONFIRM", - "url": "http://support.citrix.com/article/CTX134708" + "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking", + "refsource": "MISC", + "name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking" }, { - "name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking", - "refsource": "CONFIRM", - "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-18_grant_table_entry_swaps_have_inadequate_bounds_checking" + "url": "http://www.openwall.com/lists/oss-security/2012/09/05/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/09/05/11" }, { - "name": "SUSE-SU-2012:1133", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" + "url": "http://www.securityfocus.com/bid/55411", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/55411" } ] } diff --git a/2012/3xxx/CVE-2012-3520.json b/2012/3xxx/CVE-2012-3520.json index 2b77121d5a1..f292b9ffe7c 100644 --- a/2012/3xxx/CVE-2012-3520.json +++ b/2012/3xxx/CVE-2012-3520.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3520", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,67 +27,91 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2012/08/22/1" + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "refsource": "MISC", + "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { - "name": "55152", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/55152" + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html" }, { - "name": "openSUSE-SU-2012:1330", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30" }, { - "name": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea" + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html" }, { - "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", - "refsource": "CONFIRM", - "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" + "url": "http://secunia.com/advisories/50848", + "refsource": "MISC", + "name": "http://secunia.com/advisories/50848" }, { - "name": "USN-1599-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1599-1" + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2012/08/22/1" }, { - "name": "USN-1610-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1610-1" + "url": "http://www.securityfocus.com/bid/55152", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/55152" }, { - "name": "openSUSE-SU-2013:0261", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00018.html" + "url": "http://www.ubuntu.com/usn/USN-1599-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1599-1" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30" + "url": "http://www.ubuntu.com/usn/USN-1610-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1610-1" }, { - "name": "50848", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/50848" + "url": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=850449", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850449" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850449", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=850449" } ] } diff --git a/2013/1xxx/CVE-2013-1788.json b/2013/1xxx/CVE-2013-1788.json index 32360558bcf..1998ad115a0 100644 --- a/2013/1xxx/CVE-2013-1788.json +++ b/2013/1xxx/CVE-2013-1788.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1788", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,82 +27,106 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696" - }, - { - "name": "FEDORA-2013-3457", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html" - }, - { - "name": "MDVSA-2013:143", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143" - }, - { - "name": "FEDORA-2013-3473", - "refsource": "FEDORA", - "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html" - }, - { - "name": "USN-1785-1", - "refsource": "UBUNTU", - "url": "http://ubuntu.com/usn/usn-1785-1" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917108", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108" - }, - { - "name": "http://j00ru.vexillium.org/?p=1507", + "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa", "refsource": "MISC", - "url": "http://j00ru.vexillium.org/?p=1507" + "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa" }, { - "name": "DSA-2719", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2719" + "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492" }, { - "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa" + "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696" }, { - "name": "52846", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52846" + "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959" }, { - "name": "[oss-security] 20130228 Re: CVE Request: poppler 0.22.1 security fixes", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/28/8" + "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888", + "refsource": "MISC", + "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888" }, { - "name": "[oss-security] 20130227 Re: CVE Request: poppler 0.22.1 security fixes", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/02/28/4" + "url": "http://j00ru.vexillium.org/?p=1507", + "refsource": "MISC", + "name": "http://j00ru.vexillium.org/?p=1507" }, { - "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html" }, { - "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959" + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html", + "refsource": "MISC", + "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html" }, { - "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492", - "refsource": "CONFIRM", - "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492" + "url": "http://secunia.com/advisories/52846", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52846" + }, + { + "url": "http://ubuntu.com/usn/usn-1785-1", + "refsource": "MISC", + "name": "http://ubuntu.com/usn/usn-1785-1" + }, + { + "url": "http://www.debian.org/security/2013/dsa-2719", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2719" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/02/28/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/28/4" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/02/28/8", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/02/28/8" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917108" } ] } diff --git a/2013/1xxx/CVE-2013-1792.json b/2013/1xxx/CVE-2013-1792.json index 7771deecabd..87b46f8b9f6 100644 --- a/2013/1xxx/CVE-2013-1792.json +++ b/2013/1xxx/CVE-2013-1792.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1792", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,97 +27,121 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-1796-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1796-1" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" }, { - "name": "openSUSE-SU-2013:1187", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { - "name": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087" + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" }, { - "name": "MDVSA-2013:176", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" + "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" }, { - "name": "USN-1797-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1797-1" + "url": "http://www.ubuntu.com/usn/USN-1795-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1795-1" }, { - "name": "USN-1788-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1788-1" + "url": "http://www.ubuntu.com/usn/USN-1796-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1796-1" }, { - "name": "[oss-security] 20130307 CVE-2013-1792 Linux kernel: KEYS: race with concurrent install_user_keyrings()", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/03/07/1" + "url": "http://www.ubuntu.com/usn/USN-1797-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1797-1" }, { - "name": "USN-1793-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1793-1" + "url": "http://www.ubuntu.com/usn/USN-1787-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1787-1" }, { - "name": "USN-1792-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1792-1" + "url": "http://www.ubuntu.com/usn/USN-1788-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1788-1" }, { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0da9dfdd2cd9889201bc6f6f43580c99165cd087", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0da9dfdd2cd9889201bc6f6f43580c99165cd087" + "url": "http://www.ubuntu.com/usn/USN-1792-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1792-1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=916646", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=916646" + "url": "http://www.ubuntu.com/usn/USN-1793-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1793-1" }, { - "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3", - "refsource": "CONFIRM", - "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3" + "url": "http://www.ubuntu.com/usn/USN-1794-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1794-1" }, { - "name": "USN-1794-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1794-1" + "url": "http://www.ubuntu.com/usn/USN-1798-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1798-1" }, { - "name": "RHSA-2013:0744", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0da9dfdd2cd9889201bc6f6f43580c99165cd087", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0da9dfdd2cd9889201bc6f6f43580c99165cd087" }, { - "name": "USN-1795-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1795-1" + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3", + "refsource": "MISC", + "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3" }, { - "name": "USN-1787-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1787-1" + "url": "http://www.openwall.com/lists/oss-security/2013/03/07/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/03/07/1" }, { - "name": "openSUSE-SU-2014:0204", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" + "url": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087" }, { - "name": "USN-1798-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1798-1" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=916646", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=916646" } ] } diff --git a/2013/1xxx/CVE-2013-1793.json b/2013/1xxx/CVE-2013-1793.json index ad063a3a205..19b457ee1d1 100644 --- a/2013/1xxx/CVE-2013-1793.json +++ b/2013/1xxx/CVE-2013-1793.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1793", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "openstack-utils", - "product": { - "product_data": [ - { - "product_name": "openstack-db program", - "version": { - "version_data": [ - { - "version_value": "through 2013-02-28" - } - ] - } - } - ] - } - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,17 +27,41 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "openstack-utils", + "product": { + "product_data": [ + { + "product_name": "openstack-db program", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "through 2013-02-28" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793" - }, { "url": "https://access.redhat.com/security/cve/cve-2013-1793", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/cve-2013-1793" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793" } ] } diff --git a/2013/1xxx/CVE-2013-1797.json b/2013/1xxx/CVE-2013-1797.json index 0f8da1a7fe3..4695135b850 100644 --- a/2013/1xxx/CVE-2013-1797.json +++ b/2013/1xxx/CVE-2013-1797.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME" + "value": "Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", - "cweId": "CWE-416" + "value": "n/a" } ] } @@ -32,60 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 5", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:83-262.el5_9.3", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-358.6.1.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6.2 EUS - Server and Compute Node Only", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-220.39.1.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only", - "version": { - "version_data": [ - { - "version_value": "0:2.6.32-279.31.1.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6", - "version": { - "version_data": [ - { - "version_value": "0:6.4-20130415.0.el6_4", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -118,11 +73,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0928", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0928" - }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html", "refsource": "MISC", @@ -168,70 +118,20 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-1813-1" }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0727", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0727" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0744", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0744" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:0746", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:0746" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2013:1026", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2013:1026" - }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1", "refsource": "MISC", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1" }, { - "url": "https://access.redhat.com/security/cve/CVE-2013-1797", + "url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-1797" + "name": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917013" - }, - { - "url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1", - "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1" - } - ] - }, - "impact": { - "cvss": [ - { - "accessComplexity": "HIGH", - "accessVector": "ADJACENT_NETWORK", - "authentication": "SINGLE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 6.5, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "COMPLETE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "COMPLETE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", - "version": "2.0" } ] } diff --git a/2013/1xxx/CVE-2013-1798.json b/2013/1xxx/CVE-2013-1798.json index eb0c792d5a2..dc60370db72 100644 --- a/2013/1xxx/CVE-2013-1798.json +++ b/2013/1xxx/CVE-2013-1798.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1798", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,92 +27,116 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2013:0847", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" - }, - { - "name": "openSUSE-SU-2013:1187", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" - }, - { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2c118bfab8bc6b8bb213abfc35201e441693d55", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2c118bfab8bc6b8bb213abfc35201e441693d55" - }, - { - "name": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55" - }, - { - "name": "USN-1812-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1812-1" - }, - { - "name": "MDVSA-2013:176", - "refsource": "MANDRIVA", - "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" - }, - { - "name": "RHSA-2013:0928", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" - }, - { - "name": "USN-1809-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1809-1" - }, - { - "name": "RHSA-2013:0727", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html" - }, - { - "name": "[oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/03/20/9" - }, - { - "name": "RHSA-2013:0744", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" - }, - { - "name": "RHSA-2013:0746", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html" - }, - { - "name": "USN-1813-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1813-1" - }, - { - "name": "openSUSE-SU-2013:0925", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917017", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017" - }, - { - "name": "RHSA-2013:1026", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" - }, - { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", - "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", + "refsource": "MISC", + "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" + }, + { + "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0727.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-0746.html" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/03/20/9", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/03/20/9" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1809-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1809-1" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1812-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1812-1" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1813-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1813-1" + }, + { + "url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917017" } ] } diff --git a/2013/1xxx/CVE-2013-1799.json b/2013/1xxx/CVE-2013-1799.json index 30b876dba6c..a2ce69abdd8 100644 --- a/2013/1xxx/CVE-2013-1799.json +++ b/2013/1xxx/CVE-2013-1799.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1799", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network. NOTE: this issue exists because of an incomplete fix for CVE-2013-0240." + "value": "Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network. NOTE: this issue exists because of an incomplete fix for CVE-2013-0240." } ] }, @@ -50,52 +27,76 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[gnome-announce-list] 20130305 GNOME Online Accounts 3.7.91 released", - "refsource": "MLIST", - "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" }, { - "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8", - "refsource": "CONFIRM", - "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8" + "url": "http://secunia.com/advisories/51976", + "refsource": "MISC", + "name": "http://secunia.com/advisories/51976" }, { - "name": "51976", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/51976" + "url": "http://secunia.com/advisories/52791", + "refsource": "MISC", + "name": "http://secunia.com/advisories/52791" }, { - "name": "[gnome-announce-list] 20130304 GNOME Online Accounts 3.6.3 released", - "refsource": "MLIST", - "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html" + "url": "http://ubuntu.com/usn/usn-1779-1", + "refsource": "MISC", + "name": "http://ubuntu.com/usn/usn-1779-1" }, { - "name": "https://bugzilla.gnome.org/show_bug.cgi?id=695106", - "refsource": "CONFIRM", - "url": "https://bugzilla.gnome.org/show_bug.cgi?id=695106" + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214", + "refsource": "MISC", + "name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214" }, { - "name": "USN-1779-1", - "refsource": "UBUNTU", - "url": "http://ubuntu.com/usn/usn-1779-1" + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=695106", + "refsource": "MISC", + "name": "https://bugzilla.gnome.org/show_bug.cgi?id=695106" }, { - "name": "52791", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52791" + "url": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8", + "refsource": "MISC", + "name": "https://git.gnome.org/browse/gnome-online-accounts/commit/?id=9cf4bc0ced2c53bcdd36922caa65afc8a167bbd8" }, { - "name": "https://bugzilla.gnome.org/show_bug.cgi?id=693214", - "refsource": "CONFIRM", - "url": "https://bugzilla.gnome.org/show_bug.cgi?id=693214" + "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html", + "refsource": "MISC", + "name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00007.html" }, { - "name": "openSUSE-SU-2013:0301", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" + "url": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html", + "refsource": "MISC", + "name": "https://mail.gnome.org/archives/gnome-announce-list/2013-March/msg00020.html" } ] } diff --git a/2013/1xxx/CVE-2013-1800.json b/2013/1xxx/CVE-2013-1800.json index a5c12bab961..ea158a7780e 100644 --- a/2013/1xxx/CVE-2013-1800.json +++ b/2013/1xxx/CVE-2013-1800.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1800", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,37 +27,61 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236" - }, - { - "name": "52897", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/52897" - }, - { - "name": "https://bugzilla.novell.com/show_bug.cgi?id=804721", - "refsource": "CONFIRM", - "url": "https://bugzilla.novell.com/show_bug.cgi?id=804721" - }, - { - "name": "SUSE-SU-2013:0615", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html" - }, - { - "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html", "refsource": "MISC", - "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html" }, { - "name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6", + "url": "http://secunia.com/advisories/52897", "refsource": "MISC", - "url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6" + "name": "http://secunia.com/advisories/52897" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=804721", + "refsource": "MISC", + "name": "https://bugzilla.novell.com/show_bug.cgi?id=804721" + }, + { + "url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6", + "refsource": "MISC", + "name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6" + }, + { + "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", + "refsource": "MISC", + "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236" } ] } diff --git a/2013/1xxx/CVE-2013-1801.json b/2013/1xxx/CVE-2013-1801.json index 3530ac7a90a..de464591fd2 100644 --- a/2013/1xxx/CVE-2013-1801.json +++ b/2013/1xxx/CVE-2013-1801.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1801", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031", - "refsource": "CONFIRM", - "url": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031" - }, - { - "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", + "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", "refsource": "MISC", - "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" + "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917229", + "url": "http://www.securityfocus.com/bid/58260", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917229" + "name": "http://www.securityfocus.com/bid/58260" }, { - "name": "58260", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/58260" + "url": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031", + "refsource": "MISC", + "name": "https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917229", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917229" } ] } diff --git a/2013/1xxx/CVE-2013-1802.json b/2013/1xxx/CVE-2013-1802.json index 40402cb54a9..a6316851307 100644 --- a/2013/1xxx/CVE-2013-1802.json +++ b/2013/1xxx/CVE-2013-1802.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1802", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5", - "refsource": "CONFIRM", - "url": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5" - }, - { - "name": "SUSE-SU-2013:0612", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html" - }, - { - "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", + "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately", "refsource": "MISC", - "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" + "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917233", + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917233" + "name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html" + }, + { + "url": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5", + "refsource": "MISC", + "name": "https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917233", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=917233" } ] } diff --git a/2013/4xxx/CVE-2013-4298.json b/2013/4xxx/CVE-2013-4298.json index f32432fdd6f..9a6afbd0008 100644 --- a/2013/4xxx/CVE-2013-4298.json +++ b/2013/4xxx/CVE-2013-4298.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4298", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,47 +27,71 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-1949-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1949-1" + "url": "http://www.imagemagick.org/script/changelog.php", + "refsource": "MISC", + "name": "http://www.imagemagick.org/script/changelog.php" }, { - "name": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248", - "refsource": "CONFIRM", - "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248" + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273", + "refsource": "MISC", + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273" }, { - "name": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921", - "refsource": "CONFIRM", - "url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921" + "url": "http://secunia.com/advisories/54581", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54581" }, { - "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273", - "refsource": "CONFIRM", - "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721273" + "url": "http://secunia.com/advisories/54671", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54671" }, { - "name": "http://www.imagemagick.org/script/changelog.php", - "refsource": "CONFIRM", - "url": "http://www.imagemagick.org/script/changelog.php" + "url": "http://www.debian.org/security/2013/dsa-2750", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2750" }, { - "name": "54671", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54671" + "url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921", + "refsource": "MISC", + "name": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23921" }, { - "name": "54581", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54581" + "url": "http://www.ubuntu.com/usn/USN-1949-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1949-1" }, { - "name": "DSA-2750", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2750" + "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1218248" } ] } diff --git a/2013/4xxx/CVE-2013-4299.json b/2013/4xxx/CVE-2013-4299.json index bc05a824d8d..e1a8cfeeb23 100644 --- a/2013/4xxx/CVE-2013-4299.json +++ b/2013/4xxx/CVE-2013-4299.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4299", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,142 +27,166 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "RHSA-2013:1436", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" }, { - "name": "USN-2015-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2015-1" + "url": "http://www.ubuntu.com/usn/USN-2066-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2066-1" }, { - "name": "RHSA-2013:1783", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1783.html" + "url": "http://www.ubuntu.com/usn/USN-2067-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2067-1" }, { - "name": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1490.html" }, { - "name": "USN-2043-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2043-1" + "url": "http://www.ubuntu.com/usn/USN-2049-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2049-1" }, { - "name": "RHSA-2013:1490", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1449.html" }, { - "name": "SUSE-SU-2015:0652", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" + "url": "http://www.ubuntu.com/usn/USN-2050-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2050-1" }, { - "name": "RHSA-2013:1519", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1519.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1450.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1450.html" }, { - "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1436.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1436.html" }, { - "name": "USN-2040-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2040-1" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" }, { - "name": "USN-2016-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2016-1" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1520.html" }, { - "name": "RHSA-2013:1520", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1520.html" + "url": "http://www.ubuntu.com/usn/USN-2041-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2041-1" }, { - "name": "USN-2044-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2044-1" + "url": "http://www.ubuntu.com/usn/USN-2045-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2045-1" }, { - "name": "USN-2066-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2066-1" + "url": "http://www.ubuntu.com/usn/USN-2040-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2040-1" }, { - "name": "RHSA-2013:1449", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html" + "url": "http://www.ubuntu.com/usn/USN-2042-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2042-1" }, { - "name": "RHSA-2013:1860", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1860.html" + "url": "http://www.ubuntu.com/usn/USN-2043-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2043-1" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233" + "url": "http://www.ubuntu.com/usn/USN-2044-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2044-1" }, { - "name": "USN-2049-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2049-1" + "url": "http://www.ubuntu.com/usn/USN-2046-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2046-1" }, { - "name": "USN-2045-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2045-1" + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" }, { - "name": "RHSA-2013:1460", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1519.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1519.html" }, { - "name": "RHSA-2013:1450", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1450.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1783.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1783.html" }, { - "name": "USN-2050-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2050-1" + "url": "http://www.ubuntu.com/usn/USN-2015-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2015-1" }, { - "name": "USN-2042-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2042-1" + "url": "http://www.ubuntu.com/usn/USN-2016-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-2016-1" }, { - "name": "USN-2041-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2041-1" + "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca", + "refsource": "MISC", + "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca" }, { - "name": "USN-2067-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2067-1" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1860.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1860.html" }, { - "name": "USN-2046-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-2046-1" + "url": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca" }, { - "name": "SUSE-SU-2015:0812", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233" } ] } diff --git a/2013/4xxx/CVE-2013-4300.json b/2013/4xxx/CVE-2013-4300.json index eef059c0815..890919d8452 100644 --- a/2013/4xxx/CVE-2013-4300.json +++ b/2013/4xxx/CVE-2013-4300.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4300", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d661684cf6820331feae71146c35da83d794467e", - "refsource": "CONFIRM", - "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d661684cf6820331feae71146c35da83d794467e" + "url": "http://www.ubuntu.com/usn/USN-1995-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1995-1" }, { - "name": "USN-1995-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1995-1" + "url": "http://www.ubuntu.com/usn/USN-1998-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1998-1" }, { - "name": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e", - "refsource": "CONFIRM", - "url": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e" + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e", + "refsource": "MISC", + "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e" }, { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736", - "refsource": "CONFIRM", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736" + "url": "http://www.openwall.com/lists/oss-security/2013/09/05/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/05/3" }, { - "name": "[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/05/3" + "url": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e", + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e" }, { - "name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2", - "refsource": "CONFIRM", - "url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2" + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2", + "refsource": "MISC", + "name": "https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2" }, { - "name": "USN-1998-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1998-1" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736" } ] } diff --git a/2013/4xxx/CVE-2013-4311.json b/2013/4xxx/CVE-2013-4311.json index 49699701566..29572e5e55f 100644 --- a/2013/4xxx/CVE-2013-4311.json +++ b/2013/4xxx/CVE-2013-4311.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4311", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,42 +27,66 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-1954-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1954-1" + "url": "http://wiki.libvirt.org/page/Maintenance_Releases", + "refsource": "MISC", + "name": "http://wiki.libvirt.org/page/Maintenance_Releases" }, { - "name": "http://wiki.libvirt.org/page/Maintenance_Releases", - "refsource": "CONFIRM", - "url": "http://wiki.libvirt.org/page/Maintenance_Releases" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" }, { - "name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" }, { - "name": "RHSA-2013:1272", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" }, { - "name": "RHSA-2013:1460", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1460.html" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1272.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1272.html" }, { - "name": "openSUSE-SU-2013:1550", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" + "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/18/6" }, { - "name": "openSUSE-SU-2013:1549", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" + "url": "http://www.ubuntu.com/usn/USN-1954-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1954-1" } ] } diff --git a/2013/4xxx/CVE-2013-4312.json b/2013/4xxx/CVE-2013-4312.json index 38b63729320..307d34f96e2 100644 --- a/2013/4xxx/CVE-2013-4312.json +++ b/2013/4xxx/CVE-2013-4312.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the Linux kernel did not properly account file descriptors passed over the unix socket against the process limit. A local user could use this flaw to exhaust all available memory on the system." + "value": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c." } ] }, @@ -21,8 +21,7 @@ "description": [ { "lang": "eng", - "value": "Uncontrolled Resource Consumption", - "cweId": "CWE-400" + "value": "n/a" } ] } @@ -32,31 +31,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 6", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "0:2.6.32-642.el6", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:3.10.0-514.rt56.420.el7", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-514.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -79,16 +63,6 @@ "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2016-2584.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2574", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2574" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:2584", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:2584" - }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html", "refsource": "MISC", @@ -99,11 +73,6 @@ "refsource": "MISC", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, - { - "url": "https://access.redhat.com/errata/RHSA-2016:0855", - "refsource": "MISC", - "name": "https://access.redhat.com/errata/RHSA-2016:0855" - }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html", "refsource": "MISC", @@ -169,16 +138,6 @@ "refsource": "MISC", "name": "http://www.ubuntu.com/usn/USN-2931-1" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2013-4312", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2013-4312" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813" - }, { "url": "https://github.com/torvalds/linux/commit/712f4aad406bb1ed67f3f98d04c044191f0ff593", "refsource": "MISC", @@ -188,31 +147,11 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2013-4312", "refsource": "MISC", "name": "https://security-tracker.debian.org/tracker/CVE-2013-4312" - } - ] - }, - "impact": { - "cvss": [ + }, { - "accessComplexity": "LOW", - "accessVector": "LOCAL", - "authentication": "NONE", - "availabilityImpact": "COMPLETE", - "availabilityRequirement": "NOT_DEFINED", - "baseScore": 4.9, - "collateralDamagePotential": "NOT_DEFINED", - "confidentialityImpact": "NONE", - "confidentialityRequirement": "NOT_DEFINED", - "environmentalScore": 0, - "exploitability": "NOT_DEFINED", - "integrityImpact": "NONE", - "integrityRequirement": "NOT_DEFINED", - "remediationLevel": "NOT_DEFINED", - "reportConfidence": "NOT_DEFINED", - "targetDistribution": "NOT_DEFINED", - "temporalScore": 0, - "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "version": "2.0" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297813" } ] } diff --git a/2013/4xxx/CVE-2013-4319.json b/2013/4xxx/CVE-2013-4319.json index 28f3c956975..ca31db5e5f8 100644 --- a/2013/4xxx/CVE-2013-4319.json +++ b/2013/4xxx/CVE-2013-4319.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4319", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130909 Re: CVE request: Torque privilege escalation", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/09/11" + "url": "http://www.debian.org/security/2013/dsa-2770", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2770" }, { - "name": "DSA-2770", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2770" + "url": "http://www.openwall.com/lists/oss-security/2013/09/09/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/09/11" }, { - "name": "[torqueusers] 20130906 security advisory", - "refsource": "MLIST", - "url": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html" + "url": "http://www.openwall.com/lists/oss-security/2013/09/09/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/09/4" }, { - "name": "[oss-security] 20130909 CVE request: Torque privilege escalation", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/09/4" + "url": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html", + "refsource": "MISC", + "name": "http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html" } ] } diff --git a/2013/4xxx/CVE-2013-4324.json b/2013/4xxx/CVE-2013-4324.json index 61208a65b65..5aaa3a22bfb 100644 --- a/2013/4xxx/CVE-2013-4324.json +++ b/2013/4xxx/CVE-2013-4324.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4324", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "openSUSE-SU-2013:1562", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html" + "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/18/6" }, { - "name": "54947", - "refsource": "SECUNIA", - "url": "http://secunia.com/advisories/54947" + "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html" }, { - "name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6" + "url": "http://rhn.redhat.com/errata/RHSA-2013-1273.html", + "refsource": "MISC", + "name": "http://rhn.redhat.com/errata/RHSA-2013-1273.html" }, { - "name": "RHSA-2013:1273", - "refsource": "REDHAT", - "url": "http://rhn.redhat.com/errata/RHSA-2013-1273.html" + "url": "http://secunia.com/advisories/54947", + "refsource": "MISC", + "name": "http://secunia.com/advisories/54947" }, { - "name": "62538", - "refsource": "BID", - "url": "http://www.securityfocus.com/bid/62538" + "url": "http://www.securityfocus.com/bid/62538", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/62538" } ] } diff --git a/2013/4xxx/CVE-2013-4327.json b/2013/4xxx/CVE-2013-4327.json index 22f7e3c341d..d015dcf627c 100644 --- a/2013/4xxx/CVE-2013-4327.json +++ b/2013/4xxx/CVE-2013-4327.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4327", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,27 +27,51 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "USN-1961-1", - "refsource": "UBUNTU", - "url": "http://www.ubuntu.com/usn/USN-1961-1" - }, - { - "name": "[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6" - }, - { - "name": "DSA-2777", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2013/dsa-2777" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680", + "url": "http://www.openwall.com/lists/oss-security/2013/09/18/6", "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680" + "name": "http://www.openwall.com/lists/oss-security/2013/09/18/6" + }, + { + "url": "http://www.debian.org/security/2013/dsa-2777", + "refsource": "MISC", + "name": "http://www.debian.org/security/2013/dsa-2777" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1961-1", + "refsource": "MISC", + "name": "http://www.ubuntu.com/usn/USN-1961-1" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006680" } ] } diff --git a/2013/4xxx/CVE-2013-4329.json b/2013/4xxx/CVE-2013-4329.json index e45cd6f5d7d..800b6ee4532 100644 --- a/2013/4xxx/CVE-2013-4329.json +++ b/2013/4xxx/CVE-2013-4329.json @@ -1,35 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4329", + "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -50,32 +27,56 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "name": "[oss-security] 20130910 Re: Xen Security Advisory 61 - libxl partially sets up HVM passthrough even with disabled iommu", - "refsource": "MLIST", - "url": "http://www.openwall.com/lists/oss-security/2013/09/10/4" + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", + "refsource": "MISC", + "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { - "name": "[Xen-devel] 20130701 [PATCH] libxl: suppress device assignment to HVM guest when there is no IOMMU", - "refsource": "MLIST", - "url": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html" + "url": "http://www.debian.org/security/2014/dsa-3006", + "refsource": "MISC", + "name": "http://www.debian.org/security/2014/dsa-3006" }, { - "name": "GLSA-201407-03", - "refsource": "GENTOO", - "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" + "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml" }, { - "name": "SUSE-SU-2014:0446", - "refsource": "SUSE", - "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" + "url": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html", + "refsource": "MISC", + "name": "http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html" }, { - "name": "DSA-3006", - "refsource": "DEBIAN", - "url": "http://www.debian.org/security/2014/dsa-3006" + "url": "http://www.openwall.com/lists/oss-security/2013/09/10/4", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/09/10/4" } ] } diff --git a/2018/10xxx/CVE-2018-10866.json b/2018/10xxx/CVE-2018-10866.json index e6275f8335e..537c1970e34 100644 --- a/2018/10xxx/CVE-2018-10866.json +++ b/2018/10xxx/CVE-2018-10866.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2018-10866", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862", + "cweId": "CWE-862" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "redhat-certification 7" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-862" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632" }, { + "url": "https://access.redhat.com/security/cve/CVE-2018-10866", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10866", - "url": "https://access.redhat.com/security/cve/CVE-2018-10866" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him." + "name": "https://access.redhat.com/security/cve/CVE-2018-10866" } ] } diff --git a/2018/10xxx/CVE-2018-10867.json b/2018/10xxx/CVE-2018-10867.json index c6e97bb3932..7b959ed136a 100644 --- a/2018/10xxx/CVE-2018-10867.json +++ b/2018/10xxx/CVE-2018-10867.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2018-10867", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552", + "cweId": "CWE-552" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "redhat-certification 7" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-552" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764" }, { + "url": "https://access.redhat.com/security/cve/CVE-2018-10867", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10867", - "url": "https://access.redhat.com/security/cve/CVE-2018-10867" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user." + "name": "https://access.redhat.com/security/cve/CVE-2018-10867" } ] } diff --git a/2018/10xxx/CVE-2018-10868.json b/2018/10xxx/CVE-2018-10868.json index b231285474e..05fb71537a9 100644 --- a/2018/10xxx/CVE-2018-10868.json +++ b/2018/10xxx/CVE-2018-10868.json @@ -1,12 +1,33 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2018-10868", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a \"Billion Laugh Attack\" by replying to XMLRPC methods when getting the status of an host." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400", + "cweId": "CWE-400" + } + ] + } + ] + }, "affects": { "vendor": { "vendor_data": [ @@ -19,6 +40,7 @@ "version": { "version_data": [ { + "version_affected": "=", "version_value": "redhat-certification 7" } ] @@ -30,37 +52,17 @@ ] } }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-400" - } - ] - } - ] - }, "references": { "reference_data": [ { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776", "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776" }, { + "url": "https://access.redhat.com/security/cve/CVE-2018-10868", "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10868", - "url": "https://access.redhat.com/security/cve/CVE-2018-10868" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a \"Billion Laugh Attack\" by replying to XMLRPC methods when getting the status of an host." + "name": "https://access.redhat.com/security/cve/CVE-2018-10868" } ] } diff --git a/2018/10xxx/CVE-2018-10869.json b/2018/10xxx/CVE-2018-10869.json index 0a1d6caa9b9..a688057dd95 100644 --- a/2018/10xxx/CVE-2018-10869.json +++ b/2018/10xxx/CVE-2018-10869.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was discovered that redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd." + "value": "redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Files or Directories Accessible to External Parties", + "value": "CWE-552", "cweId": "CWE-552" } ] @@ -32,20 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Certification for Red Hat Enterprise Linux 7", + "product_name": "redhat-certification", "version": { "version_data": [ { - "version_value": "0:5.16-20180809.el7", - "version_affected": "!" - }, - { - "version_value": "0:5.16-20180809.1.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -68,16 +64,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:2373" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10869", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10869" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593780", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593780" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10869", "refsource": "MISC", @@ -85,18 +71,6 @@ } ] }, - "work_around": [ - { - "lang": "en", - "value": "If SELinux is enabled it further restricts the set of files that can be downloaded through this flaw." - } - ], - "credits": [ - { - "lang": "en", - "value": "This issue was discovered by Riccardo Schirone (Red Hat Product Security)." - } - ], "impact": { "cvss": [ { diff --git a/2018/10xxx/CVE-2018-10874.json b/2018/10xxx/CVE-2018-10874.json index 1c60049d99f..89d39b3d6ca 100644 --- a/2018/10xxx/CVE-2018-10874.json +++ b/2018/10xxx/CVE-2018-10874.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "CVE-2018-10874 ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution" + "value": "In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Untrusted Search Path", + "value": "CWE-426", "cweId": "CWE-426" } ] @@ -32,105 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Ansible Engine 2.4 for RHEL 7", + "product_name": "ansible", "version": { "version_data": [ { - "version_value": "0:2.4.6.0-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Ansible Engine 2.5 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2.5.6-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Ansible Engine 2.6 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2.6.1-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Ansible Engine 2 for RHEL 7", - "version": { - "version_data": [ - { - "version_value": "0:2.6.1-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 10.0 (Newton)", - "version": { - "version_data": [ - { - "version_value": "0:2.4.6.0-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 12.0 (Pike)", - "version": { - "version_data": [ - { - "version_value": "0:2.4.6.0-1.el7ae", - "version_affected": "!" - }, - { - "version_value": "0:1.0.1-4.el7ost", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat OpenStack Platform 13.0 (Queens)", - "version": { - "version_data": [ - { - "version_value": "0:2.4.6.0-1.el7ae", - "version_affected": "!" - } - ] - } - }, - { - "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", - "version": { - "version_data": [ - { - "version_value": "0:1.0.22-1.el7ev", - "version_affected": "!" - }, - { - "version_value": "0:4.2-5.0.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.2-20180724.0", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -188,16 +99,6 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:0054" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10874", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10874" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596528", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596528" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10874", "refsource": "MISC", @@ -210,12 +111,6 @@ } ] }, - "credits": [ - { - "lang": "en", - "value": "Red Hat would like to thank Michael Scherer (OSAS) for reporting this issue." - } - ], "impact": { "cvss": [ { diff --git a/2018/10xxx/CVE-2018-10876.json b/2018/10xxx/CVE-2018-10876.json index 7781a59946c..fc8af7cc00d 100644 --- a/2018/10xxx/CVE-2018-10876.json +++ b/2018/10xxx/CVE-2018-10876.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image." + "value": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", + "value": "CWE-416", "cweId": "CWE-416" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.14.0-115.6.1.el7a", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -109,21 +109,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2019:0525" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10876", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10876" - }, { "url": "https://bugzilla.kernel.org/show_bug.cgi?id=199403", "refsource": "MISC", "name": "https://bugzilla.kernel.org/show_bug.cgi?id=199403" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596773" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", "refsource": "MISC", diff --git a/2018/10xxx/CVE-2018-10877.json b/2018/10xxx/CVE-2018-10877.json index c40c6668bc1..9812cfb3fc1 100644 --- a/2018/10xxx/CVE-2018-10877.json +++ b/2018/10xxx/CVE-2018-10877.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image." + "value": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image." } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Read", + "value": "CWE-125", "cweId": "CWE-125" } ] @@ -32,16 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:4.14.0-115.el7a", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -109,16 +109,6 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/104878" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10877", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10877" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877", "refsource": "MISC", @@ -130,16 +120,16 @@ "cvss": [ { "attackComplexity": "LOW", - "attackVector": "PHYSICAL", + "attackVector": "LOCAL", "availabilityImpact": "HIGH", - "baseScore": 5.2, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] diff --git a/2018/10xxx/CVE-2018-10878.json b/2018/10xxx/CVE-2018-10878.json index 918216a9e03..06960b48fa5 100644 --- a/2018/10xxx/CVE-2018-10878.json +++ b/2018/10xxx/CVE-2018-10878.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Out-of-bounds Write", + "value": "CWE-787", "cweId": "CWE-787" } ] @@ -32,24 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-957.rt56.910.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.el7a", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-957.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -122,21 +114,11 @@ "refsource": "MISC", "name": "http://patchwork.ozlabs.org/patch/929238/" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10878", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10878" - }, { "url": "https://bugzilla.kernel.org/show_bug.cgi?id=199865", "refsource": "MISC", "name": "https://bugzilla.kernel.org/show_bug.cgi?id=199865" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878", "refsource": "MISC", diff --git a/2018/10xxx/CVE-2018-10879.json b/2018/10xxx/CVE-2018-10879.json index b0d71f8c41e..17e5e297414 100644 --- a/2018/10xxx/CVE-2018-10879.json +++ b/2018/10xxx/CVE-2018-10879.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Use After Free", + "value": "CWE-416", "cweId": "CWE-416" } ] @@ -32,24 +32,16 @@ "vendor": { "vendor_data": [ { - "vendor_name": "Red Hat", + "vendor_name": "[UNKNOWN]", "product": { "product_data": [ { - "product_name": "Red Hat Enterprise Linux 7", + "product_name": "kernel", "version": { "version_data": [ { - "version_value": "0:3.10.0-957.rt56.910.el7", - "version_affected": "!" - }, - { - "version_value": "0:4.14.0-115.el7a", - "version_affected": "!" - }, - { - "version_value": "0:3.10.0-957.el7", - "version_affected": "!" + "version_affected": "=", + "version_value": "n/a" } ] } @@ -127,21 +119,11 @@ "refsource": "MISC", "name": "http://www.securityfocus.com/bid/104902" }, - { - "url": "https://access.redhat.com/security/cve/CVE-2018-10879", - "refsource": "MISC", - "name": "https://access.redhat.com/security/cve/CVE-2018-10879" - }, { "url": "https://bugzilla.kernel.org/show_bug.cgi?id=200001", "refsource": "MISC", "name": "https://bugzilla.kernel.org/show_bug.cgi?id=200001" }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806", - "refsource": "MISC", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806" - }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879", "refsource": "MISC",