From 9ecd0adca8a3334e51a9952349e7a8fef8146ce4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 8 Nov 2019 15:01:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/1xxx/CVE-2013-1820.json | 60 ++++++++++++++++++++++++++++++++-- 2019/10xxx/CVE-2019-10219.json | 5 +-- 2019/10xxx/CVE-2019-10222.json | 9 +++-- 2019/14xxx/CVE-2019-14824.json | 5 +-- 2019/14xxx/CVE-2019-14860.json | 3 +- 2019/3xxx/CVE-2019-3866.json | 5 +-- 6 files changed, 74 insertions(+), 13 deletions(-) diff --git a/2013/1xxx/CVE-2013-1820.json b/2013/1xxx/CVE-2013-1820.json index 930ff613303..b4e20526b73 100644 --- a/2013/1xxx/CVE-2013-1820.json +++ b/2013/1xxx/CVE-2013-1820.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1820", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "tuned", + "version": { + "version_data": [ + { + "version_value": "2.10.0-1" + } + ] + } + } + ] + }, + "vendor_name": "tuned" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "tuned before 2.x allows local users to kill running processes due to insecure permissions with tuned's ktune service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Insecure Permissions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security-tracker.debian.org/tracker/CVE-2013-1820", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2013-1820" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1820", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1820" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=918233", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=918233" } ] } diff --git a/2019/10xxx/CVE-2019-10219.json b/2019/10xxx/CVE-2019-10219.json index 186fb8d975f..7d4edb5a00c 100644 --- a/2019/10xxx/CVE-2019-10219.json +++ b/2019/10xxx/CVE-2019-10219.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10219", - "ASSIGNER": "msiddiqu@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -68,4 +69,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10222.json b/2019/10xxx/CVE-2019-10222.json index b429f67e3f7..e49d43e623e 100644 --- a/2019/10xxx/CVE-2019-10222.json +++ b/2019/10xxx/CVE-2019-10222.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10222", - "ASSIGNER": "msiddiqu@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://tracker.ceph.com/issues/40018" + "url": "https://tracker.ceph.com/issues/40018", + "refsource": "MISC", + "name": "https://tracker.ceph.com/issues/40018" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222", @@ -71,4 +74,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14824.json b/2019/14xxx/CVE-2019-14824.json index a133143cefd..a01d4d0e06a 100644 --- a/2019/14xxx/CVE-2019-14824.json +++ b/2019/14xxx/CVE-2019-14824.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14824", - "ASSIGNER": "darunesh@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -68,4 +69,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14860.json b/2019/14xxx/CVE-2019-14860.json index 918d03abd91..b10e0f2bb78 100644 --- a/2019/14xxx/CVE-2019-14860.json +++ b/2019/14xxx/CVE-2019-14860.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14860", - "ASSIGNER": "darunesh@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/3xxx/CVE-2019-3866.json b/2019/3xxx/CVE-2019-3866.json index 7ba51480cae..89112f720cf 100644 --- a/2019/3xxx/CVE-2019-3866.json +++ b/2019/3xxx/CVE-2019-3866.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3866", - "ASSIGNER": "darunesh@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -54,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "An information-exposure vulnerability was discovered where openstack-mistral's undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information." + "value": "An information-exposure vulnerability was discovered where openstack-mistral's undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information." } ] },