mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4a7ce04cbe
commit
9181d64a9f
18
2015/10xxx/CVE-2015-10072.json
Normal file
18
2015/10xxx/CVE-2015-10072.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2015-10072",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-10147",
|
"ID": "CVE-2016-10147",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5)."
|
"value": "Algorithms not compatible with mcryptd could be spawned by mcryptd with a direct crypto_alloc_tfm invocation using a \"mcryptd(alg)\" name construct. This causes mcryptd to crash the kernel if an arbitrary \"alg\" is incompatible and not intended to be used with mcryptd."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,58 +21,131 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "NULL Pointer Dereference",
|
||||||
|
"cweId": "CWE-476"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-693.rt56.617.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-693.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd",
|
"url": "https://access.redhat.com/errata/RHSA-2017:1842",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd"
|
"name": "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd",
|
"url": "https://access.redhat.com/errata/RHSA-2017:2077",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd"
|
"name": "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[linux-crypto] 20161202 Crash in crypto mcryptd",
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://marc.info/?l=linux-crypto-vger&m=148063683310477&w=2"
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm",
|
"url": "http://marc.info/?l=linux-crypto-vger&m=148063683310477&w=2",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/13"
|
"name": "http://marc.info/?l=linux-crypto-vger&m=148063683310477&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "95677",
|
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/95677"
|
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200",
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/13",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200"
|
"name": "http://www.openwall.com/lists/oss-security/2017/01/17/13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15",
|
"url": "http://www.securityfocus.com/bid/95677",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15"
|
"name": "http://www.securityfocus.com/bid/95677"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2077",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-10147",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-10147"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:1842",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||||||
|
"version": "2.0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-1714",
|
"ID": "CVE-2016-1714",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration."
|
"value": "An out-of-bounds read/write flaw was discovered in the way QEMU's Firmware Configuration device emulation processed certain firmware configurations. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance or, potentially, execute arbitrary code on the host with privileges of the QEMU process."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,108 +21,296 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Out-of-bounds Read",
|
||||||
|
"cweId": "CWE-125"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.479.el6_7.4",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:1.5.3-105.el7_2.3",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.479.el6_7.4",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.3.0-31.el7_2.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.3.0-31.el7_2.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.3.0-31.el7_2.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "RHEV 3.6 For IBM Power Systems",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.3.0-31.el7_2.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.479.el6_7.4",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.3.0-31.el7_2.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations",
|
"url": "http://www.debian.org/security/2016/dsa-3469",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/10"
|
"name": "http://www.debian.org/security/2016/dsa-3469"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0083",
|
"url": "http://www.debian.org/security/2016/dsa-3470",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0083.html"
|
"name": "http://www.debian.org/security/2016/dsa-3470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0085",
|
"url": "http://www.debian.org/security/2016/dsa-3471",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0085.html"
|
"name": "http://www.debian.org/security/2016/dsa-3471"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0086",
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html"
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
"url": "https://security.gentoo.org/glsa/201604-01",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
"name": "https://security.gentoo.org/glsa/201604-01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/11"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0084.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/11/7"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0086.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1034858",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securitytracker.com/id/1034858"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0087.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0088.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0081",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0084",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0081.html"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0084"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "80250",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0086",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/80250"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0086"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201604-01",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0087",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201604-01"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0087"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3469",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0088",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3469"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0088"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3470",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0081.html",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3470"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0081.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0082",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0082.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0082.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0082.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0087",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0083.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0083.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0084",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0085.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0085.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3471",
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/11/7",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3471"
|
"name": "http://www.openwall.com/lists/oss-security/2016/01/11/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0088",
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/10",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html"
|
"name": "http://www.openwall.com/lists/oss-security/2016/01/12/10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/11",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2016/01/12/11"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/80250",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/80250"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securitytracker.com/id/1034858",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securitytracker.com/id/1034858"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:0081",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:0081"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:0082",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:0082"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:0083",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:0083"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:0085",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:0085"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2016-1714",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2016-1714"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296060",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "ADJACENT_NETWORK",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-1905",
|
"ID": "CVE-2016-1905",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object."
|
"value": "An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain requests. An authenticated remote attacker could use this flaw to gain additional access to resources such as RAM and disk space."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,23 +21,399 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Improper Authorization",
|
||||||
|
"cweId": "CWE-285"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenShift Enterprise 3.0",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.2.0-0.git.45.423f434.el7ose",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenShift Enterprise 3.1",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.1.1.6-1.git.0.b57e8bd.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.18.2-3.gitaf4752e.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.625.3-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.3-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.2.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.8.2-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.4.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.4.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.2-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.2.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.2-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.3.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.4-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.8.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.2.3-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.3-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:5.2.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.1.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.0-6.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.1.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.2.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.1.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.1.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.9.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.4-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.9-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.6.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.3.5-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.5.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.8.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.0.1-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.4.0-5.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.3.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.2.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.11-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.2.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.5-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.1-3.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.0-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.4.2-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.3-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:5.1.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.5-3.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.3-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.2.1-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.2-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.3.4-4.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.0-3.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.3-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.6.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.2-2.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.3-1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.35-1.git.0.6a386dd.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.4.0-1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.5.0-1.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://github.com/kubernetes/kubernetes/issues/19479",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0070",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/kubernetes/kubernetes/issues/19479"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0070"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0070",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0351",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0351"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2016-1905",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2016-1905"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1297910",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1297910"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kubernetes/kubernetes/issues/19479",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/kubernetes/kubernetes/issues/19479"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-1981",
|
"ID": "CVE-2016-1981",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS."
|
"value": "An infinite loop flaw was found in the way QEMU's e1000 NIC emulation implementation processed data using transmit or receive descriptors under certain conditions. A privileged user inside a guest could use this flaw to crash the QEMU instance."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,63 +21,123 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Loop with Unreachable Exit Condition ('Infinite Loop')",
|
||||||
|
"cweId": "CWE-835"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:1.5.3-126.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[qemu-devel] 20160119 [PATCH] e1000: eliminate infinite loops on out-of-bounds transfer start",
|
"url": "http://www.debian.org/security/2016/dsa-3469",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html"
|
"name": "http://www.debian.org/security/2016/dsa-3469"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201604-01",
|
"url": "http://www.debian.org/security/2016/dsa-3470",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201604-01"
|
"name": "http://www.debian.org/security/2016/dsa-3470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3469",
|
"url": "http://www.debian.org/security/2016/dsa-3471",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3469"
|
"name": "http://www.debian.org/security/2016/dsa-3471"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3470",
|
"url": "https://security.gentoo.org/glsa/201604-01",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3470"
|
"name": "https://security.gentoo.org/glsa/201604-01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160119 CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2585.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/19/10"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2585.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570",
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/19/10",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570"
|
"name": "http://www.openwall.com/lists/oss-security/2016/01/19/10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160122 Re: CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines",
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/22/1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/22/1"
|
"name": "http://www.openwall.com/lists/oss-security/2016/01/22/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2585",
|
"url": "http://www.securityfocus.com/bid/81549",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2585.html"
|
"name": "http://www.securityfocus.com/bid/81549"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3471",
|
"url": "https://access.redhat.com/errata/RHSA-2016:2585",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3471"
|
"name": "https://access.redhat.com/errata/RHSA-2016:2585"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "81549",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-1981",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/81549"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-1981"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "ADJACENT_NETWORK",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 2.3,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-2104",
|
"ID": "CVE-2016-2104",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags."
|
"value": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,28 +21,94 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||||
|
"cweId": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Satellite 5.7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.3.8-134.el6sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0590",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-0590.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677",
|
"url": "https://access.redhat.com/errata/RHSA-2016:0590",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677"
|
"name": "https://access.redhat.com/errata/RHSA-2016:0590"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-2104",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-2104"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-2121",
|
"ID": "CVE-2016-2121",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "redis",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "[UNKNOWN]"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -38,50 +15,114 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-732"
|
"value": "Incorrect Permission Assignment for Critical Resource",
|
||||||
|
"cweId": "CWE-732"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenStack Platform 10.0 (Newton)",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.6-2.el7ost",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:3226",
|
"url": "http://www.securityfocus.com/bid/94111",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:3226"
|
"name": "http://www.securityfocus.com/bid/94111"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2121",
|
"url": "https://access.redhat.com/errata/RHSA-2017:3226",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2121"
|
"name": "https://access.redhat.com/errata/RHSA-2017:3226"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "94111",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-2121",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/94111"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-2121"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390588",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1390588"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2121",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Honza Horak (Red Hat) and Remi Collet (Red Hat)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 2.1,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||||||
|
"version": "2.0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-2142",
|
"ID": "CVE-2016-2142",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Red Hat OpenShift Enterprise 3.1 uses world-readable permissions on the /etc/origin/master/master-config.yaml configuration file, which allows local users to obtain Active Directory credentials by reading the file."
|
"value": "An access flaw was discovered in OpenShift; the /etc/origin/master/master-config.yaml configuration file, which could contain Active Directory credentials, was world-readable. A local user could exploit this flaw to obtain authentication credentials from the master-config.yaml file."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,18 +21,78 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Incorrect Permission Assignment for Critical Resource",
|
||||||
|
"cweId": "CWE-732"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenShift Enterprise 3.1",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.1.1.6-6.git.43.f583589.el7aos",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1038",
|
"url": "https://access.redhat.com/errata/RHSA-2016:1038",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1038"
|
"name": "https://access.redhat.com/errata/RHSA-2016:1038"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2016-2142",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2016-2142"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311220",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1311220"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 2.1,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-2149",
|
"ID": "CVE-2016-2149",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Red Hat OpenShift Enterprise 3.2 allows remote authenticated users to read log files from another namespace by using the same name as a previously deleted namespace when creating a new namespace."
|
"value": "It was found that OpenShift Enterprise would disclose log file contents from reclaimed namespaces. An attacker could create a new namespace to access log files present in a previously deleted namespace using the same name."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,18 +21,84 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Improper Authorization",
|
||||||
|
"cweId": "CWE-285"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenShift Container Platform 3.2",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.2.0.20-1.git.0.f44746c.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1064",
|
"url": "https://access.redhat.com/errata/RHSA-2016:1064",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1064"
|
"name": "https://access.redhat.com/errata/RHSA-2016:1064"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2016-2149",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2016-2149"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316267",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1316267"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Wesley Hearn (Red Hat)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-2857",
|
"ID": "CVE-2016-2857",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet."
|
"value": "An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet's checksum, because a QEMU function used the packet's payload length without checking against the data buffer's size. A user inside a guest could use this flaw to crash the QEMU process (denial of service)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,93 +21,333 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Out-of-bounds Read",
|
||||||
|
"cweId": "CWE-125"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.491.el6_8.6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:1.5.3-126.el7_3.3",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.491.el6_8.7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-27.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-27.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-27.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenStack Platform 8.0 (Liberty)",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-27.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat OpenStack Platform 9.0 (Mitaka)",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-27.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-28.el7_3.6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "2:0.12.1.2-2.491.el6_8.6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "10:2.6.0-28.el7_3.6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0334",
|
"url": "http://www.ubuntu.com/usn/USN-2974-1",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0334.html"
|
"name": "http://www.ubuntu.com/usn/USN-2974-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2671",
|
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2671.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0083",
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0309.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0083.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2017-0309.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160303 CVE request Qemu: net: out of bounds read in net_checksum_calculate",
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0334.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/03/03/9"
|
"name": "http://rhn.redhat.com/errata/RHSA-2017-0334.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2706",
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0344.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2706.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2017-0344.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160306 Re: CVE request Qemu: net: out of bounds read in net_checksum_calculate",
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0350.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/03/07/3"
|
"name": "http://rhn.redhat.com/errata/RHSA-2017-0350.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "84130",
|
"url": "https://access.redhat.com/errata/RHSA-2017:0309",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/84130"
|
"name": "https://access.redhat.com/errata/RHSA-2017:0309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0350",
|
"url": "https://access.redhat.com/errata/RHSA-2017:0334",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0350.html"
|
"name": "https://access.redhat.com/errata/RHSA-2017:0334"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2705",
|
"url": "https://access.redhat.com/errata/RHSA-2017:0344",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2705.html"
|
"name": "https://access.redhat.com/errata/RHSA-2017:0344"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2974-1",
|
"url": "https://access.redhat.com/errata/RHSA-2017:0350",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2974-1"
|
"name": "https://access.redhat.com/errata/RHSA-2017:0350"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0309",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2670.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0309.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2670.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2670",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2671.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2670.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2671.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:0344",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2704.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0344.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2704.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2705.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2705.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2706.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2706.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2704",
|
"url": "https://access.redhat.com/errata/RHSA-2016:2670",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2704.html"
|
"name": "https://access.redhat.com/errata/RHSA-2016:2670"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:2671",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:2671"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:2704",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:2704"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:2705",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:2705"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:2706",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2016:2706"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=362786f14a753d8a5256ef97d7c10ed576d6572b",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=362786f14a753d8a5256ef97d7c10ed576d6572b"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0083.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://rhn.redhat.com/errata/RHSA-2017-0083.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/03/03/9",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2016/03/03/9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/03/07/3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2016/03/07/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/84130",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/84130"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:0083",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2017:0083"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2016-2857",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2016-2857"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296567",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296567"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Ling Liu (Qihoo 360 Inc.) for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "ADJACENT_NETWORK",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:P",
|
||||||
|
"version": "2.0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-3070",
|
"ID": "CVE-2016-3070",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move."
|
"value": "A security flaw was found in the Linux kernel that an attempt to move page mapped by AIO ring buffer to the other node triggers NULL pointer dereference at trace_writeback_dirty_page(), because aio_fs_backing_dev_info.dev is 0."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,88 +21,163 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "NULL Pointer Dereference",
|
||||||
|
"cweId": "CWE-476"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-514.rt56.420.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-514.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "USN-3035-3",
|
"url": "http://www.debian.org/security/2016/dsa-3607",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3035-3"
|
"name": "http://www.debian.org/security/2016/dsa-3607"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3035-1",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3035-1"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1308846",
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308846"
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3036-1",
|
"url": "https://access.redhat.com/errata/RHSA-2016:2574",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3036-1"
|
"name": "https://access.redhat.com/errata/RHSA-2016:2574"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2584",
|
"url": "https://access.redhat.com/errata/RHSA-2016:2584",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
|
"name": "https://access.redhat.com/errata/RHSA-2016:2584"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3035-2",
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3035-2"
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2574",
|
"url": "http://www.securityfocus.com/bid/90518",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
|
"name": "http://www.securityfocus.com/bid/90518"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/42cb14b110a5698ccf26ce59c4441722605a3743",
|
"url": "http://www.ubuntu.com/usn/USN-3034-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/42cb14b110a5698ccf26ce59c4441722605a3743"
|
"name": "http://www.ubuntu.com/usn/USN-3034-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3037-1",
|
"url": "http://www.ubuntu.com/usn/USN-3034-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3037-1"
|
"name": "http://www.ubuntu.com/usn/USN-3034-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3607",
|
"url": "http://www.ubuntu.com/usn/USN-3035-1",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3607"
|
"name": "http://www.ubuntu.com/usn/USN-3035-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://security-tracker.debian.org/tracker/CVE-2016-3070",
|
"url": "http://www.ubuntu.com/usn/USN-3035-2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://security-tracker.debian.org/tracker/CVE-2016-3070"
|
"name": "http://www.ubuntu.com/usn/USN-3035-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3034-1",
|
"url": "http://www.ubuntu.com/usn/USN-3035-3",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3034-1"
|
"name": "http://www.ubuntu.com/usn/USN-3035-3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "90518",
|
"url": "http://www.ubuntu.com/usn/USN-3036-1",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/90518"
|
"name": "http://www.ubuntu.com/usn/USN-3036-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743",
|
"url": "http://www.ubuntu.com/usn/USN-3037-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743"
|
"name": "http://www.ubuntu.com/usn/USN-3037-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3034-2",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-3070",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3034-2"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-3070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308846",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1308846"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/42cb14b110a5698ccf26ce59c4441722605a3743",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/42cb14b110a5698ccf26ce59c4441722605a3743"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security-tracker.debian.org/tracker/CVE-2016-3070",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security-tracker.debian.org/tracker/CVE-2016-3070"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Jan Stancek (Red Hat)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "MEDIUM",
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"availabilityImpact": "COMPLETE",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2016-3072",
|
"ID": "CVE-2016-3072",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Multiple SQL injection vulnerabilities in the scoped_search function in app/controllers/katello/api/v2/api_controller.rb in Katello allow remote authenticated users to execute arbitrary SQL commands via the (1) sort_by or (2) sort_order parameter."
|
"value": "An input sanitization flaw was found in the scoped search parameters sort_by and sort_order in the REST API. An authenticated user could use this flaw to perform an SQL injection attack on the Katello back end database."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -44,28 +21,83 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "n/a"
|
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
|
||||||
|
"cweId": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Satellite 6.1",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.2.0.86-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1083",
|
"url": "https://access.redhat.com/errata/RHSA-2016:1083",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1083"
|
"name": "https://access.redhat.com/errata/RHSA-2016:1083"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322050",
|
"url": "https://access.redhat.com/security/cve/CVE-2016-3072",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322050"
|
"name": "https://access.redhat.com/security/cve/CVE-2016-3072"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/Katello/katello/pull/6051",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322050",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/Katello/katello/pull/6051"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1322050"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Katello/katello/pull/6051",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/Katello/katello/pull/6051"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"collateralDamagePotential": "NOT_DEFINED",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"environmentalScore": 0,
|
||||||
|
"exploitability": "NOT_DEFINED",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"remediationLevel": "NOT_DEFINED",
|
||||||
|
"reportConfidence": "NOT_DEFINED",
|
||||||
|
"targetDistribution": "NOT_DEFINED",
|
||||||
|
"temporalScore": 0,
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"version": "2.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,84 +1,363 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14623",
|
"ID": "CVE-2018-14623",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "katello",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "3.10 and older"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The Foreman Project"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable."
|
"value": "A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-89"
|
"value": "Generation of Error Message Containing Sensitive Information",
|
||||||
}
|
"cweId": "CWE-209"
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-209"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.1.14-1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.15.6.34-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:201801241201-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.4-1",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "1:1.15.6.8-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.15.6.4-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.15.6.2-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.1-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.5-15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.4.0-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.5.1-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.5.26-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.0.2-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.5.1-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.13.4.6-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.4.1-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.2-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.2.1.1-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.13.4-3.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.13.4.8-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.16-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.0.5-4.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.9-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.0-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.2-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.6-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.1-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.4-3.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.9-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.10-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.6.9-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:6.3.0-23.0.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:6.3.0.12-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.3.14-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.7.11-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0.13-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.6-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.8-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:5.0.1-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.4.16-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.9-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.11.0.1-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:2.3.0-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.11.0.5-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.8-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.3.3-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.0-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.6-2.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.5-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.6-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.12-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.0.3-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.11.3.5-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.5.58-1.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.2-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:0.1.10-1.fm1_15.el7sat",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623",
|
"url": "https://access.redhat.com/errata/RHSA-2018:0336",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623"
|
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "106224",
|
"url": "http://www.securityfocus.com/bid/106224",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/106224"
|
"name": "http://www.securityfocus.com/bid/106224"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14623",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14623"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623719",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1623719"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Mohamed Tehami for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,101 +1,138 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14649",
|
"ID": "CVE-2018-14649",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "ceph-iscsi-cli",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "[UNKNOWN]"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated attackers to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions."
|
"value": "It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode. An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-77"
|
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
|
||||||
|
"cweId": "CWE-77"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Ceph Storage 2.5 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.0-7.el7cp",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Ceph Storage 3.1",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.7-7.el7cp",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://access.redhat.com/articles/3623521",
|
"url": "http://www.securityfocus.com/bid/105434",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/articles/3623521"
|
"name": "http://www.securityfocus.com/bid/105434"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "105434",
|
"url": "https://access.redhat.com/articles/3623521",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/105434"
|
"name": "https://access.redhat.com/articles/3623521"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b",
|
"url": "https://access.redhat.com/errata/RHSA-2018:2837",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b"
|
"name": "https://access.redhat.com/errata/RHSA-2018:2837"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/ceph/ceph-iscsi-cli/issues/120",
|
"url": "https://access.redhat.com/errata/RHSA-2018:2838",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/ceph/ceph-iscsi-cli/issues/120"
|
"name": "https://access.redhat.com/errata/RHSA-2018:2838"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14649",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2838",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2838"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2837",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2837"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ceph/ceph-iscsi-cli/issues/120",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/ceph/ceph-iscsi-cli/issues/120"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"work_around": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "To stop werkzeug debug mode started by rbd-target-api which is provided by ceph-iscsi-cli:\n\n1. ~]# systemctl stop rbd-target-api\n\n2. ~]# vi /usr/bin/rbd-target-api\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=True, <==== change this to debug=False\n use_evalex=False, <=== add this line to disable debugger code execution\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\nafter changes it should be\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=False, \n use_evalex=False,\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\n3. ~]# systemctl start rbd-target-api\n\n4. Limit exposure of port 5000/tcp: This port should be opened to trusted hosts which require to run 'gwcli'."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14650",
|
"ID": "CVE-2018-14650",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "sos-collector",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "[UNKNOWN]"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -38,44 +15,93 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-732"
|
"value": "Incorrect Permission Assignment for Critical Resource",
|
||||||
|
"cweId": "CWE-732"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:1.5-3.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://github.com/sosreport/sos-collector/commit/72058f9253e7ed8c7243e2ff76a16d97b03d65ed",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3663",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/sosreport/sos-collector/commit/72058f9253e7ed8c7243e2ff76a16d97b03d65ed"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3663"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14650",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14650",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14650"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14650"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3663",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1633243",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3663"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1633243"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14650",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14650"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/sosreport/sos-collector/commit/72058f9253e7ed8c7243e2ff76a16d97b03d65ed",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/sosreport/sos-collector/commit/72058f9253e7ed8c7243e2ff76a16d97b03d65ed"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Riccardo Schirone (Red Hat Product Security)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,96 +1,186 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14654",
|
"ID": "CVE-2018-14654",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "glusterfs",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "through 4.1.4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The Gluster Project"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server."
|
"value": "A flaw was found in the way glusterfs server handles client requests. A remote, authenticated attacker could set arbitrary values for the GF_XATTROP_ENTRY_IN_KEY and GF_XATTROP_ENTRY_OUT_KEY during xattrop file operation resulting in creation and deletion of arbitrary files on glusterfs server node."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-22"
|
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
|
||||||
|
"cweId": "CWE-22"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 7 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.29-1.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-7.3.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20181026.0.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654",
|
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654"
|
"name": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3431",
|
"url": "https://security.gentoo.org/glsa/201904-06",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3431"
|
"name": "https://security.gentoo.org/glsa/201904-06"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3432",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3431",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3432"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3470",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3432",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3470"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3432"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "GENTOO",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3470",
|
||||||
"name": "GLSA-201904-06",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14654",
|
||||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14654"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1631576",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1631576"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,99 +1,186 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14660",
|
"ID": "CVE-2018-14660",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "glusterfs",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "affected versions through 4.1.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "affected versions through 3.1.2"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "[UNKNOWN]"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node."
|
"value": "A flaw was found in glusterfs server which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-400"
|
"value": "Uncontrolled Resource Consumption",
|
||||||
|
"cweId": "CWE-400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 7 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.29-1.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-7.3.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20181026.0.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3431",
|
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3431"
|
"name": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660",
|
"url": "https://security.gentoo.org/glsa/201904-06",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660"
|
"name": "https://security.gentoo.org/glsa/201904-06"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3432",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3431",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3432"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3470",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3432",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3470"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3432"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "GENTOO",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3470",
|
||||||
"name": "GLSA-201904-06",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14660",
|
||||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14660"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635926",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1635926"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,101 +1,191 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-14661",
|
"ID": "CVE-2018-14661",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "glusterfs-server",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "3.8.4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The Gluster Project"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service."
|
"value": "It was found that usage of snprintf function in feature/locks translator of glusterfs server was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-20"
|
"value": "Improper Input Validation",
|
||||||
|
"cweId": "CWE-20"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Native Client for RHEL 7 for Red Hat Storage",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 6",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el6rhs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Gluster Storage 3.4 for RHEL 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.4.1.0-1.el7rhgs",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.12.2-25.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:1.0.29-1.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-7.3.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20181026.0.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3431",
|
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3431"
|
"name": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661",
|
"url": "https://security.gentoo.org/glsa/201904-06",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661"
|
"name": "https://security.gentoo.org/glsa/201904-06"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3431",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3432",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3432",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3432"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3432"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3470",
|
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3470"
|
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "GENTOO",
|
"url": "https://access.redhat.com/errata/RHSA-2018:3470",
|
||||||
"name": "GLSA-201904-06",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-14661",
|
||||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-14661"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636880",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1636880"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,25 +1,81 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2018-16838",
|
"ID": "CVE-2018-16838",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CVE-2018-16838 sssd: improper implementation of GPOs due to too restrictive permissions"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Improper Access Control",
|
||||||
|
"cweId": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "[UNKNOWN]",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "sssd",
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "n/a"
|
"version_value": "0:1.16.4-21.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 8",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:2.2.0-19.el8",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:1.1.9-0.1.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.3.5-0.20190717.0.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.3.5-2.el7ev",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.3.5-20190722.0.el7_7",
|
||||||
|
"version_affected": "!"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -30,68 +86,66 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-284"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2177",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2177"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2437",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2437"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:3651",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:3651"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2018-16838",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2018-16838"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640820",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1640820"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838",
|
"refsource": "MISC",
|
||||||
"refsource": "CONFIRM"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838"
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"name": "openSUSE-SU-2019:1576",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"name": "openSUSE-SU-2019:1589",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"name": "RHSA-2019:2177",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2177"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"name": "RHSA-2019:2437",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"name": "RHSA-2019:3651",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:3651"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": [
|
"cvss": [
|
||||||
[
|
{
|
||||||
{
|
"attackComplexity": "LOW",
|
||||||
"vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
"attackVector": "NETWORK",
|
||||||
"version": "3.0"
|
"availabilityImpact": "NONE",
|
||||||
}
|
"baseScore": 5.4,
|
||||||
]
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"version": "3.0"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,151 +1,257 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-16864",
|
"ID": "CVE-2018-16864",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "systemd",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "through v240"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The systemd Project"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable."
|
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate privileges."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-770"
|
"value": "Allocation of Resources Without Limits or Throttling",
|
||||||
|
"cweId": "CWE-770"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-62.el7_6.2",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-42.el7_4.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-57.el7_5.5",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-8.1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20190129.0.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20190129.0.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name": "106523",
|
|
||||||
"refsource": "BID",
|
|
||||||
"url": "http://www.securityfocus.com/bid/106523"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0342",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0342"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "DSA-4367",
|
|
||||||
"refsource": "DEBIAN",
|
|
||||||
"url": "https://www.debian.org/security/2019/dsa-4367"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0204",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0204"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "USN-3855-1",
|
|
||||||
"refsource": "UBUNTU",
|
|
||||||
"url": "https://usn.ubuntu.com/3855-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0049",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0049"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0271",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0271"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0361",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0361"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "GLSA-201903-07",
|
|
||||||
"refsource": "GENTOO",
|
|
||||||
"url": "https://security.gentoo.org/glsa/201903-07"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
|
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
|
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "http://www.openwall.com/lists/oss-security/2021/07/20/2",
|
||||||
"name": "RHBA-2019:0327",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHBA-2019:0327"
|
"name": "http://www.openwall.com/lists/oss-security/2021/07/20/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "https://security.gentoo.org/glsa/201903-07",
|
||||||
"name": "RHSA-2019:2402",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2402"
|
"name": "https://security.gentoo.org/glsa/201903-07"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/",
|
||||||
"name": "[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2021/07/20/2"
|
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://usn.ubuntu.com/3855-1/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://usn.ubuntu.com/3855-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.debian.org/security/2019/dsa-4367",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.debian.org/security/2019/dsa-4367"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/106523",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/106523"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHBA-2019:0327",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHBA-2019:0327"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0049",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0049"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0204",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0204"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0271",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0271"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0342",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0342"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0361",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2402",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2402"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2018-16864",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2018-16864"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653855",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1653855"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"work_around": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "To increase the time an attacker needs to exploit this flaw you could override the `StartLimitInterval=` (called StartLimitIntervalSec in newer systemd versions) and `StartLimitBurst=` settings. In this way the attack may require much longer to be successful.\n\nTo edit the journald service use `sudo systemctl edit systemd-journald.service` and add:\n```\n[Service]\nStartLimitInterval=120\nStartLimitBurst=3\n```"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Qualys Research Labs for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.4,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,171 +1,271 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-16865",
|
"ID": "CVE-2018-16865",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "systemd",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "through v240"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The systemd Project"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable."
|
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-770"
|
"value": "Allocation of Resources Without Limits or Throttling",
|
||||||
|
"cweId": "CWE-770"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-62.el7_6.2",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-30.el7_3.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-42.el7_4.13",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:219-57.el7_5.5",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-8.1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20190129.0.el7_6",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.2-20190129.0.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0342",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0342"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "106525",
|
|
||||||
"refsource": "BID",
|
|
||||||
"url": "http://www.securityfocus.com/bid/106525"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "DSA-4367",
|
|
||||||
"refsource": "DEBIAN",
|
|
||||||
"url": "https://www.debian.org/security/2019/dsa-4367"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0204",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0204"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "USN-3855-1",
|
|
||||||
"refsource": "UBUNTU",
|
|
||||||
"url": "https://usn.ubuntu.com/3855-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0049",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0049"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0271",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0271"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2019:0361",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0361"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "GLSA-201903-07",
|
|
||||||
"refsource": "GENTOO",
|
|
||||||
"url": "https://security.gentoo.org/glsa/201903-07"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
|
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
|
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "http://www.openwall.com/lists/oss-security/2021/07/20/2",
|
||||||
"name": "RHBA-2019:0327",
|
|
||||||
"url": "https://access.redhat.com/errata/RHBA-2019:0327"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"name": "[oss-security] 20190510 Re: System Down: A systemd-journald exploit",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2019/05/10/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "BUGTRAQ",
|
|
||||||
"name": "20190513 Re: System Down: A systemd-journald exploit",
|
|
||||||
"url": "https://seclists.org/bugtraq/2019/May/25"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html",
|
"name": "http://www.openwall.com/lists/oss-security/2021/07/20/2"
|
||||||
"url": "http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "FULLDISC",
|
"url": "http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html",
|
||||||
"name": "20190513 Re: System Down: A systemd-journald exploit",
|
"refsource": "MISC",
|
||||||
"url": "http://seclists.org/fulldisclosure/2019/May/21"
|
"name": "http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "http://seclists.org/fulldisclosure/2019/May/21",
|
||||||
"name": "RHSA-2019:2402",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2402"
|
"name": "http://seclists.org/fulldisclosure/2019/May/21"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"url": "http://www.openwall.com/lists/oss-security/2019/05/10/4",
|
||||||
"name": "[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2021/07/20/2"
|
"name": "http://www.openwall.com/lists/oss-security/2019/05/10/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://seclists.org/bugtraq/2019/May/25",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://seclists.org/bugtraq/2019/May/25"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.gentoo.org/glsa/201903-07",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.gentoo.org/glsa/201903-07"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://usn.ubuntu.com/3855-1/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://usn.ubuntu.com/3855-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.debian.org/security/2019/dsa-4367",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.debian.org/security/2019/dsa-4367"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHBA-2019:0327",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHBA-2019:0327"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0049",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0049"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0204",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0204"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0271",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0271"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0342",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0342"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:0361",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:0361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2402",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2402"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/106525",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/106525"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2018-16865",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2018-16865"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653861",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1653861"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Red Hat would like to thank Qualys Research Labs for reporting this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,33 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2018-16871",
|
"ID": "CVE-2018-16871",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "A flaw was found in the Linux kernel's NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "NULL Pointer Dereference",
|
||||||
|
"cweId": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
@ -15,11 +36,57 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "kernel:",
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "all 3.x, all 4.x up to 4.20"
|
"version_value": "0:3.10.0-957.27.2.rt56.940.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-957.27.2.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.14.0-115.18.1.el7a",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-693.58.1.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 8",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:4.18.0-193.rt13.51.el8",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:4.18.0-193.el8",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise MRG 2",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "1:3.10.0-693.58.1.rt56.652.el6rt",
|
||||||
|
"version_affected": "!"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -30,73 +97,97 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-476"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:1873",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:1873"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:1891",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:1891"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2696",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2696"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2019:2730",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2019:2730"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0740",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2020:0740"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2020:1567",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2020:1567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2020:1769",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2020:1769"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2018-16871",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2018-16871"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871",
|
"refsource": "MISC",
|
||||||
"refsource": "CONFIRM"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "https://security.netapp.com/advisory/ntap-20211004-0002/",
|
||||||
"name": "RHSA-2019:2696",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2696"
|
"name": "https://security.netapp.com/advisory/ntap-20211004-0002/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "https://support.f5.com/csp/article/K18657134",
|
||||||
"name": "RHSA-2019:2730",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2730"
|
"name": "https://support.f5.com/csp/article/K18657134"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS",
|
||||||
"name": "https://support.f5.com/csp/article/K18657134",
|
"refsource": "MISC",
|
||||||
"url": "https://support.f5.com/csp/article/K18657134"
|
"name": "https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS"
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://support.f5.com/csp/article/K18657134?utm_source=f5support&utm_medium=RSS",
|
|
||||||
"url": "https://support.f5.com/csp/article/K18657134?utm_source=f5support&utm_medium=RSS"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"name": "RHSA-2020:0740",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2020:0740"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20211004-0002/",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20211004-0002/"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Hangbin Liu (Red Hat) and Jasu Liedes (Synopsys SIG)."
|
||||||
|
}
|
||||||
|
],
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": [
|
"cvss": [
|
||||||
[
|
{
|
||||||
{
|
"attackComplexity": "LOW",
|
||||||
"vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
"attackVector": "NETWORK",
|
||||||
"version": "3.0"
|
"availabilityImpact": "HIGH",
|
||||||
}
|
"baseScore": 7.5,
|
||||||
]
|
"baseSeverity": "HIGH",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,86 +1,116 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-16885",
|
"ID": "CVE-2018-16885",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "kernel",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "3.10.x as shipped with Red Hat Enterprise Linux 7"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "The Linux Foundation"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7."
|
"value": "A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length. This can cause a read beyond the buffer boundaries flaw and, in certain cases, cause a memory access fault and a system halt by accessing invalid memory address."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-125"
|
"value": "Out-of-bounds Read",
|
||||||
|
"cweId": "CWE-125"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 7",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-1062.rt56.1022.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "0:3.10.0-1062.el7",
|
||||||
|
"version_affected": "!"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885",
|
"url": "https://access.redhat.com/errata/RHSA-2019:2029",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885"
|
"name": "https://access.redhat.com/errata/RHSA-2019:2029"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "106296",
|
"url": "https://access.redhat.com/errata/RHSA-2019:2043",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/106296"
|
"name": "https://access.redhat.com/errata/RHSA-2019:2043"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "http://www.securityfocus.com/bid/106296",
|
||||||
"name": "RHSA-2019:2043",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2043"
|
"name": "http://www.securityfocus.com/bid/106296"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "https://access.redhat.com/security/cve/CVE-2018-16885",
|
||||||
"name": "RHSA-2019:2029",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2029"
|
"name": "https://access.redhat.com/security/cve/CVE-2018-16885"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661503",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1661503"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was discovered by Paolo Abeni (Red Hat)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "cve@mitre.org",
|
|
||||||
"ID": "CVE-2023-23110",
|
"ID": "CVE-2023-23110",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and earlier, XAVN2001v2 Wireless-N Extenders 0.4.0.7 and earlier, WNR2200 Wireless Routers 1.0.1.102 and earlier, WNR2500 Wireless Routers 1.0.0.34 and earlier, R8900 Smart WiFi Routers 1.0.3.6 and earlier, and R9000 Smart WiFi Routers 1.0.3.6 and earlier."
|
"value": "An exploitable firmware modification vulnerability was discovered in WNR612v2 Wireless Routers firmware version 1.0.0.3 and earlier. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -50,6 +27,30 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a",
|
||||||
|
"version_affected": "?"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
@ -58,49 +59,9 @@
|
|||||||
"name": "https://www.netgear.com/about/security/"
|
"name": "https://www.netgear.com/about/security/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SJCGkb-9o",
|
"url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SJCGkb-9o",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SJCGkb-9o"
|
"name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SJCGkb-9o"
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/r1Z4BX-5i",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/r1Z4BX-5i"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/H1lIcXbco",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/H1lIcXbco"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/ryjVZz-5s",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/ryjVZz-5s"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1t47Ebqj",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1t47Ebqj"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1BNhbWqi",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1BNhbWqi"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/HyZRxmb9s",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/HyZRxmb9s"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkBPIeGco",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkBPIeGco"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1qWglM5o",
|
|
||||||
"url": "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1qWglM5o"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,87 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2023-24574",
|
"ID": "CVE-2023-24574",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "secure@dell.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an \"Uncontrolled Resource Consumption vulnerability\" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resource consumption by creating permanent home directories for unauthenticated users."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-400: Uncontrolled Resource Consumption",
|
||||||
|
"cweId": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Dell",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Enterprise SONiC OS",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "0",
|
||||||
|
"version_affected": "="
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000208165/dsa-2023-039-dell-emc-enterprise-sonic-security-update-for-an-uncontrolled-resource-consumption-vulnerability",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.dell.com/support/kbdoc/en-us/000208165/dsa-2023-039-dell-emc-enterprise-sonic-security-update-for-an-uncontrolled-resource-consumption-vulnerability"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.1.0-dev"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "UNKNOWN"
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user