mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 10:41:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f42d149bda
commit
a7d350d2a5
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4388",
|
"ID": "CVE-2012-4388",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398."
|
"value": "The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -50,62 +27,86 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://security-tracker.debian.org/tracker/CVE-2012-4388",
|
"url": "http://www.ubuntu.com/usn/USN-1569-1",
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://security-tracker.debian.org/tracker/CVE-2012-4388"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20120905 Re: php header() header injection detection bypass",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://openwall.com/lists/oss-security/2012/09/05/15"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "1027463",
|
|
||||||
"refsource": "SECTRACK",
|
|
||||||
"url": "http://www.securitytracker.com/id?1027463"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20120906 Re: Re: php header() header injection detection bypass",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://openwall.com/lists/oss-security/2012/09/07/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugs.php.net/bug.php?id=60227",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.php.net/bug.php?id=60227"
|
"name": "http://www.ubuntu.com/usn/USN-1569-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120829 php header() header injection detection bypass",
|
"url": "http://article.gmane.org/gmane.comp.php.devel/70584",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://openwall.com/lists/oss-security/2012/08/29/5"
|
"name": "http://article.gmane.org/gmane.comp.php.devel/70584"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120901 Re: php header() header injection detection bypass",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://openwall.com/lists/oss-security/2012/09/02/1"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2013:1315",
|
"url": "http://openwall.com/lists/oss-security/2012/08/29/5",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html"
|
"name": "http://openwall.com/lists/oss-security/2012/08/29/5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[internals] 20120203 [PHP-DEV] The case of HTTP response splitting protection in PHP",
|
"url": "http://openwall.com/lists/oss-security/2012/09/02/1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://article.gmane.org/gmane.comp.php.devel/70584"
|
"name": "http://openwall.com/lists/oss-security/2012/09/02/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1569-1",
|
"url": "http://openwall.com/lists/oss-security/2012/09/05/15",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1569-1"
|
"name": "http://openwall.com/lists/oss-security/2012/09/05/15"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2012/09/07/3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://openwall.com/lists/oss-security/2012/09/07/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://security-tracker.debian.org/tracker/CVE-2012-4388",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://security-tracker.debian.org/tracker/CVE-2012-4388"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securitytracker.com/id?1027463",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securitytracker.com/id?1027463"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugs.php.net/bug.php?id=60227",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugs.php.net/bug.php?id=60227"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4398",
|
"ID": "CVE-2012-4398",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,57 +27,81 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0223",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2",
|
"url": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2"
|
"name": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/3"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55077",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1348.html",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/55077"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-1348.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1348",
|
"url": "http://secunia.com/advisories/55077",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1348.html"
|
"name": "http://secunia.com/advisories/55077"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:0481",
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:0566",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/3",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/02/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=853474",
|
"url": "http://www.securityfocus.com/bid/55361",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853474"
|
"name": "http://www.securityfocus.com/bid/55361"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55361",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853474",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/55361"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=853474"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4404",
|
"ID": "CVE-2012-4404",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,52 +27,76 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "USN-1604-1",
|
"url": "http://moinmo.in/SecurityFixes",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1604-1"
|
"name": "http://moinmo.in/SecurityFixes"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50496",
|
"url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/50496"
|
"name": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://moinmo.in/SecurityFixes",
|
"url": "http://secunia.com/advisories/50474",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://moinmo.in/SecurityFixes"
|
"name": "http://secunia.com/advisories/50474"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2538",
|
"url": "http://secunia.com/advisories/50496",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2012/dsa-2538"
|
"name": "http://secunia.com/advisories/50496"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120904 CVE request: moinmoin incorrect ACL evaluation for virtual groups",
|
"url": "http://secunia.com/advisories/50885",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/04/4"
|
"name": "http://secunia.com/advisories/50885"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50885",
|
"url": "http://www.debian.org/security/2012/dsa-2538",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/50885"
|
"name": "http://www.debian.org/security/2012/dsa-2538"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50474",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/04/4",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/50474"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/04/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/05/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120904 Re: CVE request: moinmoin incorrect ACL evaluation for virtual groups",
|
"url": "http://www.ubuntu.com/usn/USN-1604-1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/2"
|
"name": "http://www.ubuntu.com/usn/USN-1604-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CVE-2012-4405 ghostscript, argyllcms: Array index error leading to heap-based bufer OOB write"
|
"value": "Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE: this issue is also described as an array index error."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Out-of-bounds Write",
|
"value": "n/a"
|
||||||
"cweId": "CWE-787"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,27 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 5",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:8.70-14.el5_8.1",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:8.70-14.el6_3.1",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -130,21 +118,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://www.ubuntu.com/usn/USN-1581-1"
|
"name": "http://www.ubuntu.com/usn/USN-1581-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2012:1256",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2012:1256"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2012-4405",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2012-4405"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854227",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=854227"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78411",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78411",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -156,30 +129,5 @@
|
|||||||
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301"
|
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 6.8,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "PARTIAL",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "PARTIAL",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CVE-2012-4406 Openstack-Swift: insecure use of python pickle()"
|
"value": "OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Deserialization of Untrusted Data",
|
"value": "n/a"
|
||||||
"cweId": "CWE-502"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,96 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Native Client for RHEL 5 for Red Hat Storage",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:3.3.0.7rhs-1.el5",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.3.0.7rhs-1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "OpenStack Essex for RHEL 6",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:1.4.8-5.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Storage 2.0",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:1.7.1-1.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.9.0-1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.3.0.7rhs-1.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.4.8-5.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.9.10-21.el6_3.8",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:1.0.0-73.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.3-4.el6_3",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.2-17.2.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.9.6-20.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Storage 2.0 Console",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.0.techpreview1-4",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.9.6-20.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -139,11 +58,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://rhn.redhat.com/errata/RHSA-2013-0691.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-0691.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2013:0691",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2013:0691"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -169,26 +83,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://www.securityfocus.com/bid/55420"
|
"name": "http://www.securityfocus.com/bid/55420"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2012:1379",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2012:1379"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2012-4406",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2012-4406"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugs.launchpad.net/swift/+bug/1006414",
|
"url": "https://bugs.launchpad.net/swift/+bug/1006414",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugs.launchpad.net/swift/+bug/1006414"
|
"name": "https://bugs.launchpad.net/swift/+bug/1006414"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=854757"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -203,31 +102,11 @@
|
|||||||
"url": "https://launchpad.net/swift/+milestone/1.7.0",
|
"url": "https://launchpad.net/swift/+milestone/1.7.0",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://launchpad.net/swift/+milestone/1.7.0"
|
"name": "https://launchpad.net/swift/+milestone/1.7.0"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
{
|
||||||
"accessComplexity": "LOW",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757",
|
||||||
"accessVector": "NETWORK",
|
"refsource": "MISC",
|
||||||
"authentication": "NONE",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=854757"
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 7.5,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "PARTIAL",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "PARTIAL",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,40 +1,17 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4414",
|
"ID": "CVE-2012-4414",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete."
|
"value": "Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -50,67 +27,91 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://mariadb.atlassian.net/browse/MDEV-382",
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://mariadb.atlassian.net/browse/MDEV-382"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/"
|
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:102",
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
|
||||||
"refsource": "MANDRIVA",
|
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "openSUSE-SU-2013:0156",
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "openSUSE-SU-2013:0135",
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "openSUSE-SU-2013:0011",
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "openSUSE-SU-2013:0014",
|
|
||||||
"refsource": "SUSE",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20120911 Multiple SQL injections in MySQL/MariaDB",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852144",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=852144"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://bugs.mysql.com/bug.php?id=66550",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://bugs.mysql.com/bug.php?id=66550"
|
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:150",
|
"url": "http://bugs.mysql.com/bug.php?id=66550",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MISC",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
"name": "http://bugs.mysql.com/bug.php?id=66550"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55498",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/55498"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/4",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/11/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/55498",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/55498"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://mariadb.atlassian.net/browse/MDEV-382",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://mariadb.atlassian.net/browse/MDEV-382"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=852144",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852144"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4415",
|
"ID": "CVE-2012-4415",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,52 +27,76 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "55497",
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html",
|
||||||
"refsource": "BID",
|
|
||||||
"url": "http://www.securityfocus.com/bid/55497"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856743",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856743"
|
"name": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120911 Re: CVE id request: guacd",
|
"url": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/7"
|
"name": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2012-14097",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120911 CVE id request: guacd",
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/3"
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2012-13914",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/3",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/11/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2012-14179",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/7",
|
||||||
"refsource": "FEDORA",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/11/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20120924 CVE-2012-4415: guacamole local root vulnerability",
|
"url": "http://www.securityfocus.com/bid/55497",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "MISC",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html"
|
"name": "http://www.securityfocus.com/bid/55497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856743",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856743"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CVE-2012-4417 GlusterFS: insecure temporary file creation"
|
"value": "GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Insecure Temporary File",
|
"value": "n/a"
|
||||||
"cweId": "CWE-377"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,42 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Native Client for RHEL 5 for Red Hat Storage",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:3.3.0.5rhs-37.el5",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.3.0.5rhs-37.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Storage 2.0",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.3.0.5rhs-37.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.2-17.1.el6rhs",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -96,55 +69,14 @@
|
|||||||
"name": "http://www.securitytracker.com/id?1027756"
|
"name": "http://www.securitytracker.com/id?1027756"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2012:1456",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2012:1456"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2012-4417",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2012-4417"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856341",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856341",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856341"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856341"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "This issue was discovered by Jim Meyering and Kurt Seifried (Red Hat)."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "LOW",
|
|
||||||
"accessVector": "LOCAL",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 2.1,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "PARTIAL",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2012-4418",
|
"ID": "CVE-2012-4418",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,32 +27,56 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120912 Re: CVE Request: Apache Axis2 XML Signature Wrapping Attack",
|
"url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20120912 CVE Request: Apache Axis2 XML Signature Wrapping Attack",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/12/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856755",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856755"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf"
|
"name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55508",
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/12/1",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/55508"
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/12/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/1",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2012/09/13/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/55508",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/55508"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856755",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856755"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1828",
|
"ID": "CVE-2013-1828",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,47 +27,71 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://twitter.com/grsecurity/statuses/309805924749541376",
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://twitter.com/grsecurity/statuses/309805924749541376"
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=726bc6b092da4c093eb74d13c07184b18c1af0f1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24747",
|
"url": "http://grsecurity.net/~spender/sctp.c",
|
||||||
"refsource": "EXPLOIT-DB",
|
|
||||||
"url": "http://www.exploit-db.com/exploits/24747"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20130307 Re: CVE Request -- Linux kernel: sctp: SCTP_GET_ASSOC_STATS stack overflow",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://grsecurity.net/~spender/sctp.c",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://grsecurity.net/~spender/sctp.c"
|
"name": "http://grsecurity.net/~spender/sctp.c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
"url": "http://twitter.com/grsecurity/statuses/309805924749541376",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1"
|
"name": "http://twitter.com/grsecurity/statuses/309805924749541376"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.exploit-db.com/exploits/24747",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.exploit-db.com/exploits/24747"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1838",
|
"ID": "CVE-2013-1838",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,77 +27,101 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[openstack] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0709.html",
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "https://lists.launchpad.net/openstack/msg21892.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "58492",
|
|
||||||
"refsource": "BID",
|
|
||||||
"url": "http://www.securityfocus.com/bid/58492"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugs.launchpad.net/nova/+bug/1125468",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugs.launchpad.net/nova/+bug/1125468"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "USN-1771-1",
|
|
||||||
"refsource": "UBUNTU",
|
|
||||||
"url": "http://ubuntu.com/usn/usn-1771-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://review.openstack.org/#/c/24453/",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://review.openstack.org/#/c/24453/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "52728",
|
|
||||||
"refsource": "SECUNIA",
|
|
||||||
"url": "http://secunia.com/advisories/52728"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919648",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919648"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-0709.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "52580",
|
"url": "http://secunia.com/advisories/52728",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/52580"
|
"name": "http://secunia.com/advisories/52728"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "91303",
|
"url": "http://osvdb.org/91303",
|
||||||
"refsource": "OSVDB",
|
"refsource": "MISC",
|
||||||
"url": "http://osvdb.org/91303"
|
"name": "http://osvdb.org/91303"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://review.openstack.org/#/c/24452/",
|
"url": "http://secunia.com/advisories/52580",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://review.openstack.org/#/c/24452/"
|
"name": "http://secunia.com/advisories/52580"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "nova-fixedips-dos(82877)",
|
"url": "http://ubuntu.com/usn/usn-1771-1",
|
||||||
"refsource": "XF",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877"
|
"name": "http://ubuntu.com/usn/usn-1771-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0709",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/18",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0709.html"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/14/18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://review.openstack.org/#/c/24451/",
|
"url": "http://www.securityfocus.com/bid/58492",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://review.openstack.org/#/c/24451/"
|
"name": "http://www.securityfocus.com/bid/58492"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)",
|
"url": "https://bugs.launchpad.net/nova/+bug/1125468",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/18"
|
"name": "https://bugs.launchpad.net/nova/+bug/1125468"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.launchpad.net/openstack/msg21892.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.launchpad.net/openstack/msg21892.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://review.openstack.org/#/c/24451/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://review.openstack.org/#/c/24451/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://review.openstack.org/#/c/24452/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://review.openstack.org/#/c/24452/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://review.openstack.org/#/c/24453/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://review.openstack.org/#/c/24453/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919648",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919648"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1839",
|
"ID": "CVE-2013-1839",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,37 +27,61 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "58316",
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/58316"
|
"name": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "52588",
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/52588"
|
"name": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt",
|
"url": "http://secunia.com/advisories/52588",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt"
|
"name": "http://secunia.com/advisories/52588"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20130305 Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/11/7",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "MISC",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/11/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20130307 Re: Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc",
|
"url": "http://www.securityfocus.com/bid/58316",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "MISC",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html"
|
"name": "http://www.securityfocus.com/bid/58316"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130311 Re: Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc",
|
"url": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/11/7"
|
"name": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1840",
|
"ID": "CVE-2013-1840",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,62 +27,86 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "openstack-glance-api-info-disclosure(82878)",
|
"url": "http://osvdb.org/91304",
|
||||||
"refsource": "XF",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878"
|
"name": "http://osvdb.org/91304"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://review.openstack.org/#/c/24437/",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://review.openstack.org/#/c/24437/"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-0707.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1764-1",
|
"url": "http://secunia.com/advisories/52565",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1764-1"
|
"name": "http://secunia.com/advisories/52565"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://review.openstack.org/#/c/24438/",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/15",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://review.openstack.org/#/c/24438/"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/14/15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.launchpad.net/glance/+bug/1135541",
|
"url": "http://www.securityfocus.com/bid/58490",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.launchpad.net/glance/+bug/1135541"
|
"name": "http://www.securityfocus.com/bid/58490"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "52565",
|
"url": "http://www.ubuntu.com/usn/USN-1764-1",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/advisories/52565"
|
"name": "http://www.ubuntu.com/usn/USN-1764-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0707",
|
"url": "https://bugs.launchpad.net/glance/+bug/1135541",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html"
|
"name": "https://bugs.launchpad.net/glance/+bug/1135541"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "91304",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878",
|
||||||
"refsource": "OSVDB",
|
"refsource": "MISC",
|
||||||
"url": "http://osvdb.org/91304"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130314 [OSSA 2013-007] Backend credentials leak in Glance v1 API (CVE-2013-1840)",
|
"url": "https://review.openstack.org/#/c/24437/",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/15"
|
"name": "https://review.openstack.org/#/c/24437/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "58490",
|
"url": "https://review.openstack.org/#/c/24438/",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/58490"
|
"name": "https://review.openstack.org/#/c/24438/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://review.openstack.org/#/c/24439/",
|
"url": "https://review.openstack.org/#/c/24439/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://review.openstack.org/#/c/24439/"
|
"name": "https://review.openstack.org/#/c/24439/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1841",
|
"ID": "CVE-2013-1841",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,32 +27,56 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920683",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/04/10",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920683"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/04/10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "58309",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/2",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/58309"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/12/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130304 Reverse lookup issue in Net::Server",
|
"url": "http://www.securityfocus.com/bid/58309",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/04/10"
|
"name": "http://www.securityfocus.com/bid/58309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130311 Re: Reverse lookup issue in Net::Server",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/2"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "netserver-cve20131841-security-bypass(82900)",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920683",
|
||||||
"refsource": "XF",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920683"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1848",
|
"ID": "CVE-2013-1848",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,82 +27,106 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1812-1",
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1812-1"
|
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:176",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MISC",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1051",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1051.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-1026.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0928",
|
"url": "http://www.ubuntu.com/usn/USN-1809-1",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
|
"name": "http://www.ubuntu.com/usn/USN-1809-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1809-1",
|
"url": "http://www.ubuntu.com/usn/USN-1812-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1809-1"
|
"name": "http://www.ubuntu.com/usn/USN-1812-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1814-1",
|
"url": "http://www.ubuntu.com/usn/USN-1813-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1814-1"
|
"name": "http://www.ubuntu.com/usn/USN-1813-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130320 CVE-2013-1848 -- Linux kernel: ext3: format string issues",
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/20/8"
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1813-1",
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1813-1"
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:0925",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1051.html",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-1051.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/20/8",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/20/8"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
"url": "http://www.ubuntu.com/usn/USN-1811-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
"name": "http://www.ubuntu.com/usn/USN-1811-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920783",
|
"url": "http://www.ubuntu.com/usn/USN-1814-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783"
|
"name": "http://www.ubuntu.com/usn/USN-1814-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1026",
|
"url": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html"
|
"name": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1811-1",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1811-1"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920783"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected."
|
"value": "The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Uncontrolled Resource Consumption",
|
"value": "n/a"
|
||||||
"cweId": "CWE-400"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,55 +31,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "n/a",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Subscription Asset Manager 1.4",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:1.4.3.28-1.el6sam_splice",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:3.2.17-1.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:3.2.17-6.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:3.2.17-5.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:3.2.17-2.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:0.6.9-1.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:2.5.4-1.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "1:1.4.5-3.el6sam",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "RHEL 6 Version of OpenShift Enterprise",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "1:3.2.8-6.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -148,56 +108,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
|
"name": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2013:0699",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2013:0699"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2014:1863",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2014:1863"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2013-1854",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2013-1854"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921329",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921329"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain",
|
"url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain"
|
"name": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
|
||||||
"accessComplexity": "MEDIUM",
|
|
||||||
"accessVector": "NETWORK",
|
|
||||||
"authentication": "NONE",
|
|
||||||
"availabilityImpact": "PARTIAL",
|
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
|
||||||
"baseScore": 4.3,
|
|
||||||
"collateralDamagePotential": "NOT_DEFINED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
|
||||||
"environmentalScore": 0,
|
|
||||||
"exploitability": "NOT_DEFINED",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
|
||||||
"remediationLevel": "NOT_DEFINED",
|
|
||||||
"reportConfidence": "NOT_DEFINED",
|
|
||||||
"targetDistribution": "NOT_DEFINED",
|
|
||||||
"temporalScore": 0,
|
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
||||||
"version": "2.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1858",
|
"ID": "CVE-2013-1858",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,37 +27,61 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "[oss-security] 20130314 Re: CLONE_NEWUSER|CLONE_FS root exploit",
|
|
||||||
"refsource": "MLIST",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "http://stealth.openwall.net/xSports/clown-newuser.c",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://stealth.openwall.net/xSports/clown-newuser.c"
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921448",
|
"url": "http://stealth.openwall.net/xSports/clown-newuser.c",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921448"
|
"name": "http://stealth.openwall.net/xSports/clown-newuser.c"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/6",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/14/6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921448",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921448"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-1860",
|
"ID": "CVE-2013-1860",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,82 +27,106 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970",
|
"url": "http://www.ubuntu.com/usn/USN-1809-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970"
|
"name": "http://www.ubuntu.com/usn/USN-1809-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1812-1",
|
"url": "http://www.ubuntu.com/usn/USN-1812-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1812-1"
|
"name": "http://www.ubuntu.com/usn/USN-1812-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
"url": "http://www.ubuntu.com/usn/USN-1813-1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
"name": "http://www.ubuntu.com/usn/USN-1813-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:0328",
|
"url": "http://www.ubuntu.com/usn/USN-1829-1",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
|
"name": "http://www.ubuntu.com/usn/USN-1829-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:176",
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MISC",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1829-1",
|
"url": "http://www.ubuntu.com/usn/USN-1811-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1829-1"
|
"name": "http://www.ubuntu.com/usn/USN-1811-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device",
|
"url": "http://www.ubuntu.com/usn/USN-1814-1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/15/3"
|
"name": "http://www.ubuntu.com/usn/USN-1814-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "58510",
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/58510"
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1809-1",
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1809-1"
|
"name": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1814-1",
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1814-1"
|
"name": "http://rhn.redhat.com/errata/RHSA-2014-0339.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:0339",
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/15/3",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html"
|
"name": "http://www.openwall.com/lists/oss-security/2013/03/15/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1813-1",
|
"url": "http://www.securityfocus.com/bid/58510",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1813-1"
|
"name": "http://www.securityfocus.com/bid/58510"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
"url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
"name": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1811-1",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1811-1"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4351",
|
"ID": "CVE-2013-4351",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,52 +27,76 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1459.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-1459.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1532",
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html"
|
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1987-1",
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url": "http://ubuntu.com/usn/usn-1987-1"
|
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2773",
|
"url": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2773"
|
"name": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130913 Re: GnuPG treats no-usage-permitted keys as all-usages-permitted",
|
"url": "http://ubuntu.com/usn/usn-1987-1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/13/4"
|
"name": "http://ubuntu.com/usn/usn-1987-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1459",
|
"url": "http://www.debian.org/security/2013/dsa-2773",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1459.html"
|
"name": "http://www.debian.org/security/2013/dsa-2773"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1526",
|
"url": "http://www.debian.org/security/2013/dsa-2774",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html"
|
"name": "http://www.debian.org/security/2013/dsa-2774"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2774",
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/13/4",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2774"
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/13/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4354",
|
"ID": "CVE-2013-4354",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,22 +27,46 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130919 Re: OpenStack: Glance image creation in other tenant accounts (CVE-2013-4354)",
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/2",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/3"
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/19/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.launchpad.net/glance/+bug/1226078",
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/3",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.launchpad.net/glance/+bug/1226078"
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/19/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130919 OpenStack: Glance image creation in other tenant accounts (CVE-2013-4354)",
|
"url": "https://bugs.launchpad.net/glance/+bug/1226078",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/2"
|
"name": "https://bugs.launchpad.net/glance/+bug/1226078"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4357",
|
"ID": "CVE-2013-4357",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "eglibc",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "eglibc",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "before 2.14"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,12 +27,86 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "eglibc",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "eglibc",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "before 2.14"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4357",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4357"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/4",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/8",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/01/28/18",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2015/01/28/18"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/21",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2015/01/29/21"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/02/24/3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2015/02/24/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.securityfocus.com/bid/67992",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.securityfocus.com/bid/67992"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2306-1",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.ubuntu.com/usn/USN-2306-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2306-2",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.ubuntu.com/usn/USN-2306-2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2306-3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.ubuntu.com/usn/USN-2306-3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/cve-2013-4357",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/cve-2013-4357"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357",
|
||||||
@ -68,64 +119,14 @@
|
|||||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357"
|
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/cve-2013-4357",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/security/cve/cve-2013-4357"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4357",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2015/01/28/18",
|
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4357"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/28/18"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2015/01/29/21",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/21"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2015/02/24/3",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/02/24/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103",
|
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html",
|
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/4",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/8",
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/8"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.securityfocus.com/bid/67992",
|
|
||||||
"url": "http://www.securityfocus.com/bid/67992"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.ubuntu.com/usn/USN-2306-1",
|
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2306-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.ubuntu.com/usn/USN-2306-2",
|
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2306-2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.ubuntu.com/usn/USN-2306-3",
|
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2306-3"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4359",
|
"ID": "CVE-2013-4359",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,37 +27,61 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/",
|
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3973",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/"
|
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3973"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130916 Re: CVE request: proftpd: mod_sftp/mod_sftp_pam invalid pool allocation during kbdint authentication",
|
"url": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/6"
|
"name": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2767",
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2767"
|
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1031",
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html"
|
"name": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1563",
|
"url": "http://www.debian.org/security/2013/dsa-2767",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html"
|
"name": "http://www.debian.org/security/2013/dsa-2767"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3973",
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/6",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3973"
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4361",
|
"ID": "CVE-2013-4361",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,32 +27,56 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "GLSA-201407-03",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:0446",
|
"url": "http://www.debian.org/security/2014/dsa-3006",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
"name": "http://www.debian.org/security/2014/dsa-3006"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130930 Xen Security Advisory 66 (CVE-2013-4361) - Information leak through fbld instruction emulation",
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/30/3"
|
"name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3006",
|
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2014/dsa-3006"
|
"name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1636",
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/30/3",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
|
"name": "http://www.openwall.com/lists/oss-security/2013/09/30/3"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4362",
|
"ID": "CVE-2013-4362",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,42 +27,66 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "DSA-2765",
|
"url": "http://osvdb.org/97416",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2765"
|
"name": "http://osvdb.org/97416"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "97417",
|
"url": "http://osvdb.org/97417",
|
||||||
"refsource": "OSVDB",
|
"refsource": "MISC",
|
||||||
"url": "http://osvdb.org/97417"
|
"name": "http://osvdb.org/97417"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "97416",
|
"url": "http://savannah.nongnu.org/bugs/?40034",
|
||||||
"refsource": "OSVDB",
|
"refsource": "MISC",
|
||||||
"url": "http://osvdb.org/97416"
|
"name": "http://savannah.nongnu.org/bugs/?40034"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201612-02",
|
"url": "http://seclists.org/oss-sec/2013/q3/627",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "https://security.gentoo.org/glsa/201612-02"
|
"name": "http://seclists.org/oss-sec/2013/q3/627"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130918 Re: CVE request: davfs2 - Unsecure use of system()",
|
"url": "http://www.debian.org/security/2013/dsa-2765",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://seclists.org/oss-sec/2013/q3/627"
|
"name": "http://www.debian.org/security/2013/dsa-2765"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://savannah.nongnu.org/bugs/?40034",
|
"url": "http://www.securityfocus.com/bid/62445",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "http://savannah.nongnu.org/bugs/?40034"
|
"name": "http://www.securityfocus.com/bid/62445"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "62445",
|
"url": "https://security.gentoo.org/glsa/201612-02",
|
||||||
"refsource": "BID",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securityfocus.com/bid/62445"
|
"name": "https://security.gentoo.org/glsa/201612-02"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4364",
|
"ID": "CVE-2013-4364",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,12 +27,36 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4368",
|
"ID": "CVE-2013-4368",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,52 +27,76 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:0470",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201407-03",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20131010 Xen Security Advisory 67 (CVE-2013-4368) - Information leak through outs instruction emulation",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/10"
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "xen-cve20134368-info-disc(87799)",
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html",
|
||||||
"refsource": "XF",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799"
|
"name": "http://rhn.redhat.com/errata/RHSA-2013-1449.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1449",
|
"url": "http://www.debian.org/security/2014/dsa-3006",
|
||||||
"refsource": "REDHAT",
|
"refsource": "MISC",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html"
|
"name": "http://www.debian.org/security/2014/dsa-3006"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:0446",
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
"name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3006",
|
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "MISC",
|
||||||
"url": "http://www.debian.org/security/2014/dsa-3006"
|
"name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:0411",
|
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/10",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
|
"name": "http://www.openwall.com/lists/oss-security/2013/10/10/10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1636",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799",
|
||||||
"refsource": "SUSE",
|
"refsource": "MISC",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2013-4369",
|
"ID": "CVE-2013-4369",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "n/a",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -50,22 +27,46 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "xen-cve20134369-dos(87798)",
|
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
|
||||||
"refsource": "XF",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798"
|
"name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201407-03",
|
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/11",
|
||||||
"refsource": "GENTOO",
|
"refsource": "MISC",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
"name": "http://www.openwall.com/lists/oss-security/2013/10/10/11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20131010 Xen Security Advisory 68 (CVE-2013-4369) - possible null dereference when parsing vif ratelimiting info",
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798",
|
||||||
"refsource": "MLIST",
|
"refsource": "MISC",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/11"
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly impersonate AF_VSOCK messages destined to other clients or leak kernel memory."
|
"value": "A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Use After Free",
|
"value": "CWE-416",
|
||||||
"cweId": "CWE-416"
|
"cweId": "CWE-416"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,24 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "[UNKNOWN]",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
"product_name": "kernel",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:3.10.0-1062.rt56.1022.el7",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-1062.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.14.0-115.16.1.el7a",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -97,16 +89,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2019:4154"
|
"name": "https://access.redhat.com/errata/RHSA-2019:4154"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2018-14625",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2018-14625"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -1,12 +1,33 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2018-14628",
|
"ID": "CVE-2018-14628",
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-862",
|
||||||
|
"cweId": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
@ -19,6 +40,7 @@
|
|||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
|
"version_affected": "=",
|
||||||
"version_value": "All versions from 4.0.0 onwards"
|
"version_value": "All versions from 4.0.0 onwards"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -30,37 +52,17 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-862"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
|
"url": "https://bugzilla.samba.org/show_bug.cgi?id=13595",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.samba.org/show_bug.cgi?id=13595",
|
"name": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
|
||||||
"url": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store."
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system."
|
"value": "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Integer Overflow or Wraparound",
|
"value": "CWE-190",
|
||||||
"cweId": "CWE-190"
|
"cweId": "CWE-190"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,152 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "The Linux Foundation",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "kernel",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.6.32-754.6.3.el6",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "2.6.x, 3.10.x, 4.14.x"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-358.94.1.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-431.93.2.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.6 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-504.76.2.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-504.76.2.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 6.7 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.6.32-573.65.2.el6",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-862.14.4.rt56.821.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-862.14.4.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.2 Advanced Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.76.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.2 Telco Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.76.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-327.76.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.3 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-514.61.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-693.43.1.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise MRG 2",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "1:3.10.0-693.43.1.rt56.630.el6rt",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -270,21 +134,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2018:3643"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3643"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2018-14634",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2018-14634"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -317,18 +166,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"work_around": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread's # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-> structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current->signal->rlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur > limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L <module>\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "Red Hat would like to thank Qualys Research Labs for reporting this issue."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": [
|
"cvss": [
|
||||||
{
|
{
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode. An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges."
|
"value": "It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated attackers to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
|
"value": "CWE-77",
|
||||||
"cweId": "CWE-77"
|
"cweId": "CWE-77"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,27 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "[UNKNOWN]",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Ceph Storage 2.5 for Red Hat Enterprise Linux 7",
|
"product_name": "ceph-iscsi-cli",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:2.0-7.el7cp",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "n/a"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Ceph Storage 3.1",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:2.7-7.el7cp",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -85,16 +74,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2018:2838"
|
"name": "https://access.redhat.com/errata/RHSA-2018:2838"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2018-14649",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2018-14649"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -112,12 +91,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"work_around": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "To stop werkzeug debug mode started by rbd-target-api which is provided by ceph-iscsi-cli:\n\n1. ~]# systemctl stop rbd-target-api\n\n2. ~]# vi /usr/bin/rbd-target-api\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=True, <==== change this to debug=False\n use_evalex=False, <=== add this line to disable debugger code execution\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\nafter changes it should be\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=False, \n use_evalex=False,\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\n3. ~]# systemctl start rbd-target-api\n\n4. Limit exposure of port 5000/tcp: This port should be opened to trusted hosts which require to run 'gwcli'."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": [
|
"cvss": [
|
||||||
{
|
{
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -1,36 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"DATE_PUBLIC": "2018-02-25T00:00:00",
|
|
||||||
"ID": "CVE-2018-1098",
|
"ID": "CVE-2018-1098",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "etcd",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "3.3.1 and earlier"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "Red Hat, Inc."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -45,33 +21,58 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-352"
|
"value": "CWE-352",
|
||||||
|
"cweId": "CWE-352"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat, Inc.",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "etcd",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "3.3.1 and earlier"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714",
|
"url": "https://github.com/coreos/etcd/issues/9353",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714"
|
"name": "https://github.com/coreos/etcd/issues/9353"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/coreos/etcd/issues/9353",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/coreos/etcd/issues/9353"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "FEDORA",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/",
|
||||||
"name": "FEDORA-2019-833466697f",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "FEDORA",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714",
|
||||||
"name": "FEDORA-2019-219b0b0b6a",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "A buffer overflow flaw was found in the zsh shell check path functionality. A local, unprivileged user can create a specially crafted message file, which, if used to set a custom \"you have new mail\" message, leads to code execution in the context of the user who receives the message. If the user affected is privileged, this leads to privilege escalation."
|
"value": "zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,8 +21,8 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Stack-based Buffer Overflow",
|
"value": "CWE-120->CWE-121",
|
||||||
"cweId": "CWE-121"
|
"cweId": "CWE-120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -32,27 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "zsh",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "zsh",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:4.3.11-8.el6",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "through 5.4.2"
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "0:5.0.2-31.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -85,16 +74,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2018:1932"
|
"name": "https://access.redhat.com/errata/RHSA-2018:1932"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2018-1100",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2018-1100"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/",
|
"url": "https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -104,30 +83,11 @@
|
|||||||
"url": "https://usn.ubuntu.com/3764-1/",
|
"url": "https://usn.ubuntu.com/3764-1/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://usn.ubuntu.com/3764-1/"
|
"name": "https://usn.ubuntu.com/3764-1/"
|
||||||
}
|
},
|
||||||
]
|
|
||||||
},
|
|
||||||
"credits": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "This issue was discovered by Richard Maciel Costa (Red Hat)."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
{
|
{
|
||||||
"attackComplexity": "HIGH",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395",
|
||||||
"attackVector": "LOCAL",
|
"refsource": "MISC",
|
||||||
"availabilityImpact": "HIGH",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395"
|
||||||
"baseScore": 7.5,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"scope": "CHANGED",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,35 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "secalert@redhat.com",
|
|
||||||
"ID": "CVE-2018-1114",
|
"ID": "CVE-2018-1114",
|
||||||
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "undertow",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name": "Red Hat"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_type": "CVE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
@ -38,59 +15,92 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
"problemtype_data": [
|
"problemtype_data": [
|
||||||
{
|
{
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CWE-400"
|
"value": "CWE-400",
|
||||||
|
"cweId": "CWE-400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Red Hat",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "undertow",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "=",
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114",
|
"url": "https://access.redhat.com/errata/RHSA-2018:2643",
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2018:2669",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "RHSA-2018:2643",
|
|
||||||
"refsource": "REDHAT",
|
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2643"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "https://issues.jboss.org/browse/UNDERTOW-1338",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://issues.jboss.org/browse/UNDERTOW-1338"
|
"name": "https://access.redhat.com/errata/RHSA-2018:2643"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.openjdk.java.net/browse/JDK-6956385",
|
"url": "https://access.redhat.com/errata/RHSA-2018:2669",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.openjdk.java.net/browse/JDK-6956385"
|
"name": "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"url": "https://access.redhat.com/errata/RHSA-2019:0877",
|
||||||
"name": "RHSA-2019:0877",
|
"refsource": "MISC",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0877"
|
"name": "https://access.redhat.com/errata/RHSA-2019:0877"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugs.openjdk.java.net/browse/JDK-6956385",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugs.openjdk.java.net/browse/JDK-6956385"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issues.jboss.org/browse/UNDERTOW-1338",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://issues.jboss.org/browse/UNDERTOW-1338"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"version": "3.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file."
|
"value": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -21,7 +21,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "Improper Initialization",
|
"value": "CWE-665",
|
||||||
"cweId": "CWE-665"
|
"cweId": "CWE-665"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -32,24 +32,16 @@
|
|||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Red Hat",
|
"vendor_name": "kernel",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 7",
|
"product_name": "vhost",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "0:3.10.0-957.rt56.910.el7",
|
"version_affected": "=",
|
||||||
"version_affected": "!"
|
"version_value": "since 4.8"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:4.14.0-115.el7a",
|
|
||||||
"version_affected": "!"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "0:3.10.0-957.el7",
|
|
||||||
"version_affected": "!"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -82,16 +74,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2018:3096"
|
"name": "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2018-1118",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2018-1118"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user