"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 04:01:20 +00:00
parent f42d149bda
commit a7d350d2a5
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
36 changed files with 1505 additions and 3204 deletions

View File

@ -1,40 +1,17 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4388", "ID": "CVE-2012-4388",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398." "value": "The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398."
} }
] ]
}, },
@ -50,62 +27,86 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://security-tracker.debian.org/tracker/CVE-2012-4388", "url": "http://www.ubuntu.com/usn/USN-1569-1",
"refsource": "CONFIRM",
"url": "http://security-tracker.debian.org/tracker/CVE-2012-4388"
},
{
"name": "[oss-security] 20120905 Re: php header() header injection detection bypass",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2012/09/05/15"
},
{
"name": "1027463",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027463"
},
{
"name": "[oss-security] 20120906 Re: Re: php header() header injection detection bypass",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2012/09/07/3"
},
{
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986",
"refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986"
},
{
"name": "https://bugs.php.net/bug.php?id=60227",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=60227" "name": "http://www.ubuntu.com/usn/USN-1569-1"
}, },
{ {
"name": "[oss-security] 20120829 php header() header injection detection bypass", "url": "http://article.gmane.org/gmane.comp.php.devel/70584",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2012/08/29/5" "name": "http://article.gmane.org/gmane.comp.php.devel/70584"
}, },
{ {
"name": "[oss-security] 20120901 Re: php header() header injection detection bypass", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2012/09/02/1" "name": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html"
}, },
{ {
"name": "SUSE-SU-2013:1315", "url": "http://openwall.com/lists/oss-security/2012/08/29/5",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html" "name": "http://openwall.com/lists/oss-security/2012/08/29/5"
}, },
{ {
"name": "[internals] 20120203 [PHP-DEV] The case of HTTP response splitting protection in PHP", "url": "http://openwall.com/lists/oss-security/2012/09/02/1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://article.gmane.org/gmane.comp.php.devel/70584" "name": "http://openwall.com/lists/oss-security/2012/09/02/1"
}, },
{ {
"name": "USN-1569-1", "url": "http://openwall.com/lists/oss-security/2012/09/05/15",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1569-1" "name": "http://openwall.com/lists/oss-security/2012/09/05/15"
},
{
"url": "http://openwall.com/lists/oss-security/2012/09/07/3",
"refsource": "MISC",
"name": "http://openwall.com/lists/oss-security/2012/09/07/3"
},
{
"url": "http://security-tracker.debian.org/tracker/CVE-2012-4388",
"refsource": "MISC",
"name": "http://security-tracker.debian.org/tracker/CVE-2012-4388"
},
{
"url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986",
"refsource": "MISC",
"name": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986"
},
{
"url": "http://www.securitytracker.com/id?1027463",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1027463"
},
{
"url": "https://bugs.php.net/bug.php?id=60227",
"refsource": "MISC",
"name": "https://bugs.php.net/bug.php?id=60227"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4398", "ID": "CVE-2012-4398",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
}, },
{ {
"name": "RHSA-2013:0223", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2", "url": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2" "name": "http://lkml.indiana.edu/hypermail/linux/kernel/1202.0/03340.html"
}, },
{ {
"name": "[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS", "url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/3" "name": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
}, },
{ {
"name": "55077", "url": "http://rhn.redhat.com/errata/RHSA-2013-1348.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/55077" "name": "http://rhn.redhat.com/errata/RHSA-2013-1348.html"
}, },
{ {
"name": "RHSA-2013:1348", "url": "http://secunia.com/advisories/55077",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1348.html" "name": "http://secunia.com/advisories/55077"
}, },
{ {
"name": "SUSE-SU-2015:0481", "url": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" "name": "http://www.kernel.org/pub/linux/kernel/v3.x/linux-3.4.tar.bz2"
}, },
{ {
"name": "openSUSE-SU-2015:0566", "url": "http://www.openwall.com/lists/oss-security/2012/09/02/3",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" "name": "http://www.openwall.com/lists/oss-security/2012/09/02/3"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=853474", "url": "http://www.securityfocus.com/bid/55361",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853474" "name": "http://www.securityfocus.com/bid/55361"
}, },
{ {
"name": "55361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853474",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/55361" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853474"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4404", "ID": "CVE-2012-4404",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "USN-1604-1", "url": "http://moinmo.in/SecurityFixes",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1604-1" "name": "http://moinmo.in/SecurityFixes"
}, },
{ {
"name": "50496", "url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50496" "name": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16"
}, },
{ {
"name": "http://moinmo.in/SecurityFixes", "url": "http://secunia.com/advisories/50474",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://moinmo.in/SecurityFixes" "name": "http://secunia.com/advisories/50474"
}, },
{ {
"name": "DSA-2538", "url": "http://secunia.com/advisories/50496",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2538" "name": "http://secunia.com/advisories/50496"
}, },
{ {
"name": "[oss-security] 20120904 CVE request: moinmoin incorrect ACL evaluation for virtual groups", "url": "http://secunia.com/advisories/50885",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/09/04/4" "name": "http://secunia.com/advisories/50885"
}, },
{ {
"name": "50885", "url": "http://www.debian.org/security/2012/dsa-2538",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50885" "name": "http://www.debian.org/security/2012/dsa-2538"
}, },
{ {
"name": "50474", "url": "http://www.openwall.com/lists/oss-security/2012/09/04/4",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/50474" "name": "http://www.openwall.com/lists/oss-security/2012/09/04/4"
}, },
{ {
"name": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16", "url": "http://www.openwall.com/lists/oss-security/2012/09/05/2",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16" "name": "http://www.openwall.com/lists/oss-security/2012/09/05/2"
}, },
{ {
"name": "[oss-security] 20120904 Re: CVE request: moinmoin incorrect ACL evaluation for virtual groups", "url": "http://www.ubuntu.com/usn/USN-1604-1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/2" "name": "http://www.ubuntu.com/usn/USN-1604-1"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2012-4405 ghostscript, argyllcms: Array index error leading to heap-based bufer OOB write" "value": "Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE: this issue is also described as an array index error."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Out-of-bounds Write", "value": "n/a"
"cweId": "CWE-787"
} }
] ]
} }
@ -32,27 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:8.70-14.el5_8.1", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:8.70-14.el6_3.1",
"version_affected": "!"
} }
] ]
} }
@ -130,21 +118,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-1581-1" "name": "http://www.ubuntu.com/usn/USN-1581-1"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2012:1256",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1256"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-4405",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-4405"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854227",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=854227"
},
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78411", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78411",
"refsource": "MISC", "refsource": "MISC",
@ -156,30 +129,5 @@
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301" "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2012-4406 Openstack-Swift: insecure use of python pickle()" "value": "OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Deserialization of Untrusted Data", "value": "n/a"
"cweId": "CWE-502"
} }
] ]
} }
@ -32,96 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Native Client for RHEL 5 for Red Hat Storage", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.3.0.7rhs-1.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
"version": {
"version_data": [
{
"version_value": "0:3.3.0.7rhs-1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "OpenStack Essex for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:1.4.8-5.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Storage 2.0",
"version": {
"version_data": [
{
"version_value": "0:1.7.1-1.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:0.9.0-1.el6",
"version_affected": "!"
},
{
"version_value": "0:3.3.0.7rhs-1.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:1.4.8-5.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:0.9.10-21.el6_3.8",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-73.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:2.3-4.el6_3",
"version_affected": "!"
},
{
"version_value": "0:2.2-17.2.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:4.9.6-20.el6rhs",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Storage 2.0 Console",
"version": {
"version_data": [
{
"version_value": "0:2.0.techpreview1-4",
"version_affected": "!"
},
{
"version_value": "0:4.9.6-20.el6rhs",
"version_affected": "!"
} }
] ]
} }
@ -139,11 +58,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2013-0691.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-0691.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2013:0691",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0691"
},
{ {
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html",
"refsource": "MISC", "refsource": "MISC",
@ -169,26 +83,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55420" "name": "http://www.securityfocus.com/bid/55420"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2012:1379",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1379"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-4406",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-4406"
},
{ {
"url": "https://bugs.launchpad.net/swift/+bug/1006414", "url": "https://bugs.launchpad.net/swift/+bug/1006414",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugs.launchpad.net/swift/+bug/1006414" "name": "https://bugs.launchpad.net/swift/+bug/1006414"
}, },
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=854757"
},
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79140",
"refsource": "MISC", "refsource": "MISC",
@ -203,31 +102,11 @@
"url": "https://launchpad.net/swift/+milestone/1.7.0", "url": "https://launchpad.net/swift/+milestone/1.7.0",
"refsource": "MISC", "refsource": "MISC",
"name": "https://launchpad.net/swift/+milestone/1.7.0" "name": "https://launchpad.net/swift/+milestone/1.7.0"
} },
]
},
"impact": {
"cvss": [
{ {
"accessComplexity": "LOW", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854757",
"accessVector": "NETWORK", "refsource": "MISC",
"authentication": "NONE", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=854757"
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }

View File

@ -1,40 +1,17 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4414", "ID": "CVE-2012-4414",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete." "value": "Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete."
} }
] ]
}, },
@ -50,67 +27,91 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://mariadb.atlassian.net/browse/MDEV-382", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"refsource": "CONFIRM",
"url": "https://mariadb.atlassian.net/browse/MDEV-382"
},
{
"name": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}, },
{ {
"name": "MDVSA-2013:102", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102"
},
{
"name": "openSUSE-SU-2013:0156",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html"
},
{
"name": "openSUSE-SU-2013:0135",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html"
},
{
"name": "openSUSE-SU-2013:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html"
},
{
"name": "openSUSE-SU-2013:0014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html"
},
{
"name": "[oss-security] 20120911 Multiple SQL injections in MySQL/MariaDB",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852144",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=852144"
},
{
"name": "http://bugs.mysql.com/bug.php?id=66550",
"refsource": "MISC", "refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=66550" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102"
}, },
{ {
"name": "MDVSA-2013:150", "url": "http://bugs.mysql.com/bug.php?id=66550",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" "name": "http://bugs.mysql.com/bug.php?id=66550"
}, },
{ {
"name": "55498", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/55498" "name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html"
},
{
"url": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/",
"refsource": "MISC",
"name": "http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/09/11/4"
},
{
"url": "http://www.securityfocus.com/bid/55498",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55498"
},
{
"url": "https://mariadb.atlassian.net/browse/MDEV-382",
"refsource": "MISC",
"name": "https://mariadb.atlassian.net/browse/MDEV-382"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=852144",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=852144"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4415", "ID": "CVE-2012-4415",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "55497", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55497"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856743",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856743" "name": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html"
}, },
{ {
"name": "[oss-security] 20120911 Re: CVE id request: guacd", "url": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/7" "name": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac"
}, },
{ {
"name": "FEDORA-2012-14097", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html"
}, },
{ {
"name": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html"
}, },
{ {
"name": "[oss-security] 20120911 CVE id request: guacd", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/09/11/3" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html"
}, },
{ {
"name": "FEDORA-2012-13914", "url": "http://www.openwall.com/lists/oss-security/2012/09/11/3",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html" "name": "http://www.openwall.com/lists/oss-security/2012/09/11/3"
}, },
{ {
"name": "FEDORA-2012-14179", "url": "http://www.openwall.com/lists/oss-security/2012/09/11/7",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html" "name": "http://www.openwall.com/lists/oss-security/2012/09/11/7"
}, },
{ {
"name": "20120924 CVE-2012-4415: guacamole local root vulnerability", "url": "http://www.securityfocus.com/bid/55497",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0107.html" "name": "http://www.securityfocus.com/bid/55497"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856743",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856743"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2012-4417 GlusterFS: insecure temporary file creation" "value": "GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Insecure Temporary File", "value": "n/a"
"cweId": "CWE-377"
} }
] ]
} }
@ -32,42 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Native Client for RHEL 5 for Red Hat Storage", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.3.0.5rhs-37.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Native Client for RHEL 6 for Red Hat Storage",
"version": {
"version_data": [
{
"version_value": "0:3.3.0.5rhs-37.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Storage 2.0",
"version": {
"version_data": [
{
"version_value": "0:3.3.0.5rhs-37.el6rhs",
"version_affected": "!"
},
{
"version_value": "0:2.2-17.1.el6rhs",
"version_affected": "!"
} }
] ]
} }
@ -96,55 +69,14 @@
"name": "http://www.securitytracker.com/id?1027756" "name": "http://www.securitytracker.com/id?1027756"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2012:1456", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:1456" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2012-4417",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2012-4417"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856341",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856341" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=856341"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80074"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Jim Meyering and Kurt Seifried (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4418", "ID": "CVE-2012-4418",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "[oss-security] 20120912 Re: CVE Request: Apache Axis2 XML Signature Wrapping Attack", "url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/1"
},
{
"name": "[oss-security] 20120912 CVE Request: Apache Axis2 XML Signature Wrapping Attack",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/12/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856755",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856755"
},
{
"name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf" "name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf"
}, },
{ {
"name": "55508", "url": "http://www.openwall.com/lists/oss-security/2012/09/12/1",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/55508" "name": "http://www.openwall.com/lists/oss-security/2012/09/12/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/09/13/1"
},
{
"url": "http://www.securityfocus.com/bid/55508",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/55508"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856755",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856755"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1828", "ID": "CVE-2013-1828",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://twitter.com/grsecurity/statuses/309805924749541376", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=726bc6b092da4c093eb74d13c07184b18c1af0f1",
"refsource": "MISC", "refsource": "MISC",
"url": "http://twitter.com/grsecurity/statuses/309805924749541376" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=726bc6b092da4c093eb74d13c07184b18c1af0f1"
}, },
{ {
"name": "24747", "url": "http://grsecurity.net/~spender/sctp.c",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24747"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
},
{
"name": "[oss-security] 20130307 Re: CVE Request -- Linux kernel: sctp: SCTP_GET_ASSOC_STATS stack overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
},
{
"name": "http://grsecurity.net/~spender/sctp.c",
"refsource": "MISC", "refsource": "MISC",
"url": "http://grsecurity.net/~spender/sctp.c" "name": "http://grsecurity.net/~spender/sctp.c"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1", "url": "http://twitter.com/grsecurity/statuses/309805924749541376",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1" "name": "http://twitter.com/grsecurity/statuses/309805924749541376"
},
{
"url": "http://www.exploit-db.com/exploits/24747",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24747"
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
},
{
"url": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1838", "ID": "CVE-2013-1838",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,77 +27,101 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "[openstack] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)", "url": "http://rhn.redhat.com/errata/RHSA-2013-0709.html",
"refsource": "MLIST",
"url": "https://lists.launchpad.net/openstack/msg21892.html"
},
{
"name": "58492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58492"
},
{
"name": "https://bugs.launchpad.net/nova/+bug/1125468",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/nova/+bug/1125468"
},
{
"name": "USN-1771-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1771-1"
},
{
"name": "https://review.openstack.org/#/c/24453/",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/#/c/24453/"
},
{
"name": "52728",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52728"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919648",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919648" "name": "http://rhn.redhat.com/errata/RHSA-2013-0709.html"
}, },
{ {
"name": "52580", "url": "http://secunia.com/advisories/52728",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/52580" "name": "http://secunia.com/advisories/52728"
}, },
{ {
"name": "91303", "url": "http://osvdb.org/91303",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/91303" "name": "http://osvdb.org/91303"
}, },
{ {
"name": "https://review.openstack.org/#/c/24452/", "url": "http://secunia.com/advisories/52580",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://review.openstack.org/#/c/24452/" "name": "http://secunia.com/advisories/52580"
}, },
{ {
"name": "nova-fixedips-dos(82877)", "url": "http://ubuntu.com/usn/usn-1771-1",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877" "name": "http://ubuntu.com/usn/usn-1771-1"
}, },
{ {
"name": "RHSA-2013:0709", "url": "http://www.openwall.com/lists/oss-security/2013/03/14/18",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0709.html" "name": "http://www.openwall.com/lists/oss-security/2013/03/14/18"
}, },
{ {
"name": "https://review.openstack.org/#/c/24451/", "url": "http://www.securityfocus.com/bid/58492",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://review.openstack.org/#/c/24451/" "name": "http://www.securityfocus.com/bid/58492"
}, },
{ {
"name": "[oss-security] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)", "url": "https://bugs.launchpad.net/nova/+bug/1125468",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/18" "name": "https://bugs.launchpad.net/nova/+bug/1125468"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82877"
},
{
"url": "https://lists.launchpad.net/openstack/msg21892.html",
"refsource": "MISC",
"name": "https://lists.launchpad.net/openstack/msg21892.html"
},
{
"url": "https://review.openstack.org/#/c/24451/",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/24451/"
},
{
"url": "https://review.openstack.org/#/c/24452/",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/24452/"
},
{
"url": "https://review.openstack.org/#/c/24453/",
"refsource": "MISC",
"name": "https://review.openstack.org/#/c/24453/"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919648",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919648"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1839", "ID": "CVE-2013-1839",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "58316", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/58316" "name": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html"
}, },
{ {
"name": "52588", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/52588" "name": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html"
}, },
{ {
"name": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt", "url": "http://secunia.com/advisories/52588",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt" "name": "http://secunia.com/advisories/52588"
}, },
{ {
"name": "20130305 Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc", "url": "http://www.openwall.com/lists/oss-security/2013/03/11/7",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0025.html" "name": "http://www.openwall.com/lists/oss-security/2013/03/11/7"
}, },
{ {
"name": "20130307 Re: Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc", "url": "http://www.securityfocus.com/bid/58316",
"refsource": "BUGTRAQ", "refsource": "MISC",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0069.html" "name": "http://www.securityfocus.com/bid/58316"
}, },
{ {
"name": "[oss-security] 20130311 Re: Squid 3.2.7 DoS (loop, 100% cpu) strHdrAcptLangGetItem() at errorpage.cc", "url": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/11/7" "name": "http://www.squid-cache.org/Advisories/SQUID-2013_1.txt"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1840", "ID": "CVE-2013-1840",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,62 +27,86 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "openstack-glance-api-info-disclosure(82878)", "url": "http://osvdb.org/91304",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878" "name": "http://osvdb.org/91304"
}, },
{ {
"name": "https://review.openstack.org/#/c/24437/", "url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://review.openstack.org/#/c/24437/" "name": "http://rhn.redhat.com/errata/RHSA-2013-0707.html"
}, },
{ {
"name": "USN-1764-1", "url": "http://secunia.com/advisories/52565",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1764-1" "name": "http://secunia.com/advisories/52565"
}, },
{ {
"name": "https://review.openstack.org/#/c/24438/", "url": "http://www.openwall.com/lists/oss-security/2013/03/14/15",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://review.openstack.org/#/c/24438/" "name": "http://www.openwall.com/lists/oss-security/2013/03/14/15"
}, },
{ {
"name": "https://bugs.launchpad.net/glance/+bug/1135541", "url": "http://www.securityfocus.com/bid/58490",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugs.launchpad.net/glance/+bug/1135541" "name": "http://www.securityfocus.com/bid/58490"
}, },
{ {
"name": "52565", "url": "http://www.ubuntu.com/usn/USN-1764-1",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/52565" "name": "http://www.ubuntu.com/usn/USN-1764-1"
}, },
{ {
"name": "RHSA-2013:0707", "url": "https://bugs.launchpad.net/glance/+bug/1135541",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0707.html" "name": "https://bugs.launchpad.net/glance/+bug/1135541"
}, },
{ {
"name": "91304", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/91304" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82878"
}, },
{ {
"name": "[oss-security] 20130314 [OSSA 2013-007] Backend credentials leak in Glance v1 API (CVE-2013-1840)", "url": "https://review.openstack.org/#/c/24437/",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/15" "name": "https://review.openstack.org/#/c/24437/"
}, },
{ {
"name": "58490", "url": "https://review.openstack.org/#/c/24438/",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/58490" "name": "https://review.openstack.org/#/c/24438/"
}, },
{ {
"name": "https://review.openstack.org/#/c/24439/", "url": "https://review.openstack.org/#/c/24439/",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://review.openstack.org/#/c/24439/" "name": "https://review.openstack.org/#/c/24439/"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1841", "ID": "CVE-2013-1841",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920683", "url": "http://www.openwall.com/lists/oss-security/2013/03/04/10",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920683" "name": "http://www.openwall.com/lists/oss-security/2013/03/04/10"
}, },
{ {
"name": "58309", "url": "http://www.openwall.com/lists/oss-security/2013/03/12/2",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/58309" "name": "http://www.openwall.com/lists/oss-security/2013/03/12/2"
}, },
{ {
"name": "[oss-security] 20130304 Reverse lookup issue in Net::Server", "url": "http://www.securityfocus.com/bid/58309",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/04/10" "name": "http://www.securityfocus.com/bid/58309"
}, },
{ {
"name": "[oss-security] 20130311 Re: Reverse lookup issue in Net::Server", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/2" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900"
}, },
{ {
"name": "netserver-cve20131841-security-bypass(82900)", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920683",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82900" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=920683"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1848", "ID": "CVE-2013-1848",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,82 +27,106 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc" "name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
}, },
{ {
"name": "USN-1812-1", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1812-1" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
}, },
{ {
"name": "MDVSA-2013:176", "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" "name": "http://rhn.redhat.com/errata/RHSA-2013-0928.html"
}, },
{ {
"name": "RHSA-2013:1051", "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1051.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-1026.html"
}, },
{ {
"name": "RHSA-2013:0928", "url": "http://www.ubuntu.com/usn/USN-1809-1",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" "name": "http://www.ubuntu.com/usn/USN-1809-1"
}, },
{ {
"name": "USN-1809-1", "url": "http://www.ubuntu.com/usn/USN-1812-1",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1809-1" "name": "http://www.ubuntu.com/usn/USN-1812-1"
}, },
{ {
"name": "USN-1814-1", "url": "http://www.ubuntu.com/usn/USN-1813-1",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1814-1" "name": "http://www.ubuntu.com/usn/USN-1813-1"
}, },
{ {
"name": "[oss-security] 20130320 CVE-2013-1848 -- Linux kernel: ext3: format string issues", "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/20/8" "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
}, },
{ {
"name": "USN-1813-1", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1813-1" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
}, },
{ {
"name": "openSUSE-SU-2013:0925", "url": "http://rhn.redhat.com/errata/RHSA-2013-1051.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" "name": "http://rhn.redhat.com/errata/RHSA-2013-1051.html"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d0c2d10dd72c5292eda7a06231056a4c972e4cc", "url": "http://www.openwall.com/lists/oss-security/2013/03/20/8",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d0c2d10dd72c5292eda7a06231056a4c972e4cc" "name": "http://www.openwall.com/lists/oss-security/2013/03/20/8"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4", "url": "http://www.ubuntu.com/usn/USN-1811-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4" "name": "http://www.ubuntu.com/usn/USN-1811-1"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=920783", "url": "http://www.ubuntu.com/usn/USN-1814-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783" "name": "http://www.ubuntu.com/usn/USN-1814-1"
}, },
{ {
"name": "RHSA-2013:1026", "url": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" "name": "https://github.com/torvalds/linux/commit/8d0c2d10dd72c5292eda7a06231056a4c972e4cc"
}, },
{ {
"name": "USN-1811-1", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920783",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1811-1" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=920783"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected." "value": "The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Uncontrolled Resource Consumption", "value": "n/a"
"cweId": "CWE-400"
} }
] ]
} }
@ -32,55 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Subscription Asset Manager 1.4", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:1.4.3.28-1.el6sam_splice", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
},
{
"version_value": "1:3.2.17-1.el6sam",
"version_affected": "!"
},
{
"version_value": "1:3.2.17-6.el6sam",
"version_affected": "!"
},
{
"version_value": "1:3.2.17-5.el6sam",
"version_affected": "!"
},
{
"version_value": "1:3.2.17-2.el6sam",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el6sam",
"version_affected": "!"
},
{
"version_value": "0:2.5.4-1.el6sam",
"version_affected": "!"
},
{
"version_value": "1:1.4.5-3.el6sam",
"version_affected": "!"
}
]
}
},
{
"product_name": "RHEL 6 Version of OpenShift Enterprise",
"version": {
"version_data": [
{
"version_value": "1:3.2.8-6.el6",
"version_affected": "!"
} }
] ]
} }
@ -148,56 +108,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" "name": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2013:0699",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0699"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1863",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1863"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-1854",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-1854"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921329",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921329"
},
{ {
"url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain", "url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain",
"refsource": "MISC", "refsource": "MISC",
"name": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain" "name": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain"
} }
] ]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
} }
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1858", "ID": "CVE-2013-1858",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e66eded8309ebf679d3d3c1f5820d1f2ca332c71", "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
},
{
"name": "[oss-security] 20130314 Re: CLONE_NEWUSER|CLONE_FS root exploit",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/6"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
},
{
"name": "http://stealth.openwall.net/xSports/clown-newuser.c",
"refsource": "MISC", "refsource": "MISC",
"url": "http://stealth.openwall.net/xSports/clown-newuser.c" "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921448", "url": "http://stealth.openwall.net/xSports/clown-newuser.c",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921448" "name": "http://stealth.openwall.net/xSports/clown-newuser.c"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/03/14/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/03/14/6"
},
{
"url": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/e66eded8309ebf679d3d3c1f5820d1f2ca332c71"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921448",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921448"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1860", "ID": "CVE-2013-1860",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,82 +27,106 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa" "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970", "url": "http://www.ubuntu.com/usn/USN-1809-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970" "name": "http://www.ubuntu.com/usn/USN-1809-1"
}, },
{ {
"name": "USN-1812-1", "url": "http://www.ubuntu.com/usn/USN-1812-1",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1812-1" "name": "http://www.ubuntu.com/usn/USN-1812-1"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa", "url": "http://www.ubuntu.com/usn/USN-1813-1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa" "name": "http://www.ubuntu.com/usn/USN-1813-1"
}, },
{ {
"name": "RHSA-2014:0328", "url": "http://www.ubuntu.com/usn/USN-1829-1",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html" "name": "http://www.ubuntu.com/usn/USN-1829-1"
}, },
{ {
"name": "MDVSA-2013:176", "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
"refsource": "MANDRIVA", "refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" "name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
}, },
{ {
"name": "USN-1829-1", "url": "http://www.ubuntu.com/usn/USN-1811-1",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1829-1" "name": "http://www.ubuntu.com/usn/USN-1811-1"
}, },
{ {
"name": "[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device", "url": "http://www.ubuntu.com/usn/USN-1814-1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/03/15/3" "name": "http://www.ubuntu.com/usn/USN-1814-1"
}, },
{ {
"name": "58510", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/58510" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa"
}, },
{ {
"name": "USN-1809-1", "url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1809-1" "name": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
}, },
{ {
"name": "USN-1814-1", "url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1814-1" "name": "http://rhn.redhat.com/errata/RHSA-2014-0339.html"
}, },
{ {
"name": "RHSA-2014:0339", "url": "http://www.openwall.com/lists/oss-security/2013/03/15/3",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html" "name": "http://www.openwall.com/lists/oss-security/2013/03/15/3"
}, },
{ {
"name": "USN-1813-1", "url": "http://www.securityfocus.com/bid/58510",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1813-1" "name": "http://www.securityfocus.com/bid/58510"
}, },
{ {
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4", "url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4" "name": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa"
}, },
{ {
"name": "USN-1811-1", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-1811-1" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4351", "ID": "CVE-2013-4351",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138", "url": "http://rhn.redhat.com/errata/RHSA-2013-1459.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138" "name": "http://rhn.redhat.com/errata/RHSA-2013-1459.html"
}, },
{ {
"name": "openSUSE-SU-2013:1532", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html"
}, },
{ {
"name": "USN-1987-1", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html",
"refsource": "UBUNTU", "refsource": "MISC",
"url": "http://ubuntu.com/usn/usn-1987-1" "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html"
}, },
{ {
"name": "DSA-2773", "url": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2773" "name": "http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138"
}, },
{ {
"name": "[oss-security] 20130913 Re: GnuPG treats no-usage-permitted keys as all-usages-permitted", "url": "http://ubuntu.com/usn/usn-1987-1",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/09/13/4" "name": "http://ubuntu.com/usn/usn-1987-1"
}, },
{ {
"name": "RHSA-2013:1459", "url": "http://www.debian.org/security/2013/dsa-2773",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1459.html" "name": "http://www.debian.org/security/2013/dsa-2773"
}, },
{ {
"name": "openSUSE-SU-2013:1526", "url": "http://www.debian.org/security/2013/dsa-2774",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html" "name": "http://www.debian.org/security/2013/dsa-2774"
}, },
{ {
"name": "DSA-2774", "url": "http://www.openwall.com/lists/oss-security/2013/09/13/4",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2774" "name": "http://www.openwall.com/lists/oss-security/2013/09/13/4"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4354", "ID": "CVE-2013-4354",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "[oss-security] 20130919 Re: OpenStack: Glance image creation in other tenant accounts (CVE-2013-4354)", "url": "http://www.openwall.com/lists/oss-security/2013/09/19/2",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/3" "name": "http://www.openwall.com/lists/oss-security/2013/09/19/2"
}, },
{ {
"name": "https://bugs.launchpad.net/glance/+bug/1226078", "url": "http://www.openwall.com/lists/oss-security/2013/09/19/3",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugs.launchpad.net/glance/+bug/1226078" "name": "http://www.openwall.com/lists/oss-security/2013/09/19/3"
}, },
{ {
"name": "[oss-security] 20130919 OpenStack: Glance image creation in other tenant accounts (CVE-2013-4354)", "url": "https://bugs.launchpad.net/glance/+bug/1226078",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/09/19/2" "name": "https://bugs.launchpad.net/glance/+bug/1226078"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4357", "ID": "CVE-2013-4357",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "eglibc",
"product": {
"product_data": [
{
"product_name": "eglibc",
"version": {
"version_data": [
{
"version_value": "before 2.14"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,86 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "eglibc",
"product": {
"product_data": [
{
"product_name": "eglibc",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before 2.14"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4357", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4357" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/01/28/18",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/01/28/18"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/21",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/01/29/21"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/02/24/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/02/24/3"
},
{
"url": "http://www.securityfocus.com/bid/67992",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/67992"
},
{
"url": "http://www.ubuntu.com/usn/USN-2306-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-1"
},
{
"url": "http://www.ubuntu.com/usn/USN-2306-2",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-2"
},
{
"url": "http://www.ubuntu.com/usn/USN-2306-3",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-3"
},
{
"url": "https://access.redhat.com/security/cve/cve-2013-4357",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2013-4357"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357",
@ -68,64 +119,14 @@
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357" "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357"
}, },
{ {
"url": "https://access.redhat.com/security/cve/cve-2013-4357", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2013-4357" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103"
}, },
{ {
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4357",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/01/28/18", "name": "https://security-tracker.debian.org/tracker/CVE-2013-4357"
"url": "http://www.openwall.com/lists/oss-security/2015/01/28/18"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/01/29/21",
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/21"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/02/24/3",
"url": "http://www.openwall.com/lists/oss-security/2015/02/24/3"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95103"
},
{
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/4",
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/4"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/09/17/8",
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/8"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/67992",
"url": "http://www.securityfocus.com/bid/67992"
},
{
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-1",
"url": "http://www.ubuntu.com/usn/USN-2306-1"
},
{
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-2",
"url": "http://www.ubuntu.com/usn/USN-2306-2"
},
{
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2306-3",
"url": "http://www.ubuntu.com/usn/USN-2306-3"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4359", "ID": "CVE-2013-4359",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/", "url": "http://bugs.proftpd.org/show_bug.cgi?id=3973",
"refsource": "MISC", "refsource": "MISC",
"url": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/" "name": "http://bugs.proftpd.org/show_bug.cgi?id=3973"
}, },
{ {
"name": "[oss-security] 20130916 Re: CVE request: proftpd: mod_sftp/mod_sftp_pam invalid pool allocation during kbdint authentication", "url": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/09/17/6" "name": "http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/"
}, },
{ {
"name": "DSA-2767", "url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2767" "name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html"
}, },
{ {
"name": "openSUSE-SU-2015:1031", "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html" "name": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html"
}, },
{ {
"name": "openSUSE-SU-2013:1563", "url": "http://www.debian.org/security/2013/dsa-2767",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html" "name": "http://www.debian.org/security/2013/dsa-2767"
}, },
{ {
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3973", "url": "http://www.openwall.com/lists/oss-security/2013/09/17/6",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3973" "name": "http://www.openwall.com/lists/oss-security/2013/09/17/6"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4361", "ID": "CVE-2013-4361",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "GLSA-201407-03", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://www.debian.org/security/2014/dsa-3006",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://www.debian.org/security/2014/dsa-3006"
}, },
{ {
"name": "[oss-security] 20130930 Xen Security Advisory 66 (CVE-2013-4361) - Information leak through fbld instruction emulation", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/09/30/3" "name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
}, },
{ {
"name": "DSA-3006", "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2014/dsa-3006" "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
}, },
{ {
"name": "openSUSE-SU-2013:1636", "url": "http://www.openwall.com/lists/oss-security/2013/09/30/3",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" "name": "http://www.openwall.com/lists/oss-security/2013/09/30/3"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4362", "ID": "CVE-2013-4362",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,42 +27,66 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "DSA-2765", "url": "http://osvdb.org/97416",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2765" "name": "http://osvdb.org/97416"
}, },
{ {
"name": "97417", "url": "http://osvdb.org/97417",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/97417" "name": "http://osvdb.org/97417"
}, },
{ {
"name": "97416", "url": "http://savannah.nongnu.org/bugs/?40034",
"refsource": "OSVDB", "refsource": "MISC",
"url": "http://osvdb.org/97416" "name": "http://savannah.nongnu.org/bugs/?40034"
}, },
{ {
"name": "GLSA-201612-02", "url": "http://seclists.org/oss-sec/2013/q3/627",
"refsource": "GENTOO", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201612-02" "name": "http://seclists.org/oss-sec/2013/q3/627"
}, },
{ {
"name": "[oss-security] 20130918 Re: CVE request: davfs2 - Unsecure use of system()", "url": "http://www.debian.org/security/2013/dsa-2765",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://seclists.org/oss-sec/2013/q3/627" "name": "http://www.debian.org/security/2013/dsa-2765"
}, },
{ {
"name": "http://savannah.nongnu.org/bugs/?40034", "url": "http://www.securityfocus.com/bid/62445",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://savannah.nongnu.org/bugs/?40034" "name": "http://www.securityfocus.com/bid/62445"
}, },
{ {
"name": "62445", "url": "https://security.gentoo.org/glsa/201612-02",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/62445" "name": "https://security.gentoo.org/glsa/201612-02"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4364", "ID": "CVE-2013-4364",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,12 +27,36 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1009734"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4368", "ID": "CVE-2013-4368",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,52 +27,76 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "SUSE-SU-2014:0470", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
}, },
{ {
"name": "GLSA-201407-03", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"
}, },
{ {
"name": "[oss-security] 20131010 Xen Security Advisory 67 (CVE-2013-4368) - Information leak through outs instruction emulation", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/10" "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html"
}, },
{ {
"name": "xen-cve20134368-info-disc(87799)", "url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799" "name": "http://rhn.redhat.com/errata/RHSA-2013-1449.html"
}, },
{ {
"name": "RHSA-2013:1449", "url": "http://www.debian.org/security/2014/dsa-3006",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html" "name": "http://www.debian.org/security/2014/dsa-3006"
}, },
{ {
"name": "SUSE-SU-2014:0446", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" "name": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html"
}, },
{ {
"name": "DSA-3006", "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2014/dsa-3006" "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
}, },
{ {
"name": "SUSE-SU-2014:0411", "url": "http://www.openwall.com/lists/oss-security/2013/10/10/10",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" "name": "http://www.openwall.com/lists/oss-security/2013/10/10/10"
}, },
{ {
"name": "openSUSE-SU-2013:1636", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87799"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4369", "ID": "CVE-2013-4369",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,22 +27,46 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "xen-cve20134369-dos(87798)", "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml",
"refsource": "XF", "refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798" "name": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
}, },
{ {
"name": "GLSA-201407-03", "url": "http://www.openwall.com/lists/oss-security/2013/10/10/11",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" "name": "http://www.openwall.com/lists/oss-security/2013/10/10/11"
}, },
{ {
"name": "[oss-security] 20131010 Xen Security Advisory 68 (CVE-2013-4369) - possible null dereference when parsing vif ratelimiting info", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/11" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87798"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly impersonate AF_VSOCK messages destined to other clients or leak kernel memory." "value": "A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients."
} }
] ]
}, },
@ -21,7 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Use After Free", "value": "CWE-416",
"cweId": "CWE-416" "cweId": "CWE-416"
} }
] ]
@ -32,24 +32,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "[UNKNOWN]",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 7", "product_name": "kernel",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.10.0-1062.rt56.1022.el7", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
},
{
"version_value": "0:3.10.0-1062.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.16.1.el7a",
"version_affected": "!"
} }
] ]
} }
@ -97,16 +89,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4154" "name": "https://access.redhat.com/errata/RHSA-2019:4154"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2018-14625",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-14625"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625",
"refsource": "MISC", "refsource": "MISC",

View File

@ -1,12 +1,33 @@
{ {
"data_version": "4.0",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2018-14628", "ID": "CVE-2018-14628",
"ASSIGNER": "secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"description": {
"description_data": [
{
"lang": "eng",
"value": "An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862",
"cweId": "CWE-862"
}
]
}
]
},
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
@ -19,6 +40,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=",
"version_value": "All versions from 4.0.0 onwards" "version_value": "All versions from 4.0.0 onwards"
} }
] ]
@ -30,37 +52,17 @@
] ]
} }
}, },
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862"
}
]
}
]
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://bugzilla.samba.org/show_bug.cgi?id=13595",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.samba.org/show_bug.cgi?id=13595", "name": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
"url": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store."
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system." "value": "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable."
} }
] ]
}, },
@ -21,7 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Integer Overflow or Wraparound", "value": "CWE-190",
"cweId": "CWE-190" "cweId": "CWE-190"
} }
] ]
@ -32,152 +32,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "The Linux Foundation",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "kernel",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.6.32-754.6.3.el6", "version_affected": "=",
"version_affected": "!" "version_value": "2.6.x, 3.10.x, 4.14.x"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-358.94.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-431.93.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.6 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-504.76.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-504.76.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.7 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-573.65.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-862.14.4.rt56.821.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-862.14.4.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.76.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.76.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.76.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.61.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.43.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
"version": {
"version_data": [
{
"version_value": "1:3.10.0-693.43.1.rt56.630.el6rt",
"version_affected": "!"
} }
] ]
} }
@ -270,21 +134,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:3643" "name": "https://access.redhat.com/errata/RHSA-2018:3643"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2018-14634",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-14634"
},
{
"url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy",
"refsource": "MISC",
"name": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634",
"refsource": "MISC", "refsource": "MISC",
@ -317,18 +166,6 @@
} }
] ]
}, },
"work_around": [
{
"lang": "en",
"value": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread's # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-> structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current->signal->rlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur > limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L <module>\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Qualys Research Labs for reporting this issue."
}
],
"impact": { "impact": {
"cvss": [ "cvss": [
{ {

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode. An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges." "value": "It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated attackers to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions."
} }
] ]
}, },
@ -21,7 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')", "value": "CWE-77",
"cweId": "CWE-77" "cweId": "CWE-77"
} }
] ]
@ -32,27 +32,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "[UNKNOWN]",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Ceph Storage 2.5 for Red Hat Enterprise Linux 7", "product_name": "ceph-iscsi-cli",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.0-7.el7cp", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
}
]
}
},
{
"product_name": "Red Hat Ceph Storage 3.1",
"version": {
"version_data": [
{
"version_value": "0:2.7-7.el7cp",
"version_affected": "!"
} }
] ]
} }
@ -85,16 +74,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:2838" "name": "https://access.redhat.com/errata/RHSA-2018:2838"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2018-14649",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-14649"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1632078"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649",
"refsource": "MISC", "refsource": "MISC",
@ -112,12 +91,6 @@
} }
] ]
}, },
"work_around": [
{
"lang": "en",
"value": "To stop werkzeug debug mode started by rbd-target-api which is provided by ceph-iscsi-cli:\n\n1. ~]# systemctl stop rbd-target-api\n\n2. ~]# vi /usr/bin/rbd-target-api\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=True, <==== change this to debug=False\n use_evalex=False, <=== add this line to disable debugger code execution\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\nafter changes it should be\n\n# Start the API server\n...\n737 app.run(host='0.0.0.0',\n738 port=settings.config.api_port,\n739 debug=False, \n use_evalex=False,\n740 use_reloader=False,\n741 ssl_context=context)\n...\n\n3. ~]# systemctl start rbd-target-api\n\n4. Limit exposure of port 5000/tcp: This port should be opened to trusted hosts which require to run 'gwcli'."
}
],
"impact": { "impact": {
"cvss": [ "cvss": [
{ {

File diff suppressed because it is too large Load Diff

View File

@ -1,36 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"DATE_PUBLIC": "2018-02-25T00:00:00",
"ID": "CVE-2018-1098", "ID": "CVE-2018-1098",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "etcd",
"version": {
"version_data": [
{
"version_value": "3.3.1 and earlier"
}
]
}
}
]
},
"vendor_name": "Red Hat, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -45,33 +21,58 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-352" "value": "CWE-352",
"cweId": "CWE-352"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat, Inc.",
"product": {
"product_data": [
{
"product_name": "etcd",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.3.1 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714", "url": "https://github.com/coreos/etcd/issues/9353",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714" "name": "https://github.com/coreos/etcd/issues/9353"
}, },
{ {
"name": "https://github.com/coreos/etcd/issues/9353", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/coreos/etcd/issues/9353" "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/"
}, },
{ {
"refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/",
"name": "FEDORA-2019-833466697f", "refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/" "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/"
}, },
{ {
"refsource": "FEDORA", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714",
"name": "FEDORA-2019-219b0b0b6a", "refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1552714"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A buffer overflow flaw was found in the zsh shell check path functionality. A local, unprivileged user can create a specially crafted message file, which, if used to set a custom \"you have new mail\" message, leads to code execution in the context of the user who receives the message. If the user affected is privileged, this leads to privilege escalation." "value": "zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user."
} }
] ]
}, },
@ -21,8 +21,8 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Stack-based Buffer Overflow", "value": "CWE-120->CWE-121",
"cweId": "CWE-121" "cweId": "CWE-120"
} }
] ]
} }
@ -32,27 +32,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "zsh",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "zsh",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:4.3.11-8.el6", "version_affected": "=",
"version_affected": "!" "version_value": "through 5.4.2"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:5.0.2-31.el7",
"version_affected": "!"
} }
] ]
} }
@ -85,16 +74,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:1932" "name": "https://access.redhat.com/errata/RHSA-2018:1932"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2018-1100",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-1100"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395"
},
{ {
"url": "https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/", "url": "https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/",
"refsource": "MISC", "refsource": "MISC",
@ -104,30 +83,11 @@
"url": "https://usn.ubuntu.com/3764-1/", "url": "https://usn.ubuntu.com/3764-1/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://usn.ubuntu.com/3764-1/" "name": "https://usn.ubuntu.com/3764-1/"
} },
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Richard Maciel Costa (Red Hat)."
}
],
"impact": {
"cvss": [
{ {
"attackComplexity": "HIGH", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395",
"attackVector": "LOCAL", "refsource": "MISC",
"availabilityImpact": "HIGH", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1563395"
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-1114", "ID": "CVE-2018-1114",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "undertow",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -38,59 +15,92 @@
} }
] ]
}, },
"impact": {
"cvss": [
[
{
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
]
},
"problemtype": { "problemtype": {
"problemtype_data": [ "problemtype_data": [
{ {
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-400" "value": "CWE-400",
"cweId": "CWE-400"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "undertow",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114", "url": "https://access.redhat.com/errata/RHSA-2018:2643",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114"
},
{
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name": "RHSA-2018:2643",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2643"
},
{
"name": "https://issues.jboss.org/browse/UNDERTOW-1338",
"refsource": "MISC", "refsource": "MISC",
"url": "https://issues.jboss.org/browse/UNDERTOW-1338" "name": "https://access.redhat.com/errata/RHSA-2018:2643"
}, },
{ {
"name": "https://bugs.openjdk.java.net/browse/JDK-6956385", "url": "https://access.redhat.com/errata/RHSA-2018:2669",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.openjdk.java.net/browse/JDK-6956385" "name": "https://access.redhat.com/errata/RHSA-2018:2669"
}, },
{ {
"refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0877",
"name": "RHSA-2019:0877", "refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2019:0877" "name": "https://access.redhat.com/errata/RHSA-2019:0877"
},
{
"url": "https://bugs.openjdk.java.net/browse/JDK-6956385",
"refsource": "MISC",
"name": "https://bugs.openjdk.java.net/browse/JDK-6956385"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114"
},
{
"url": "https://issues.jboss.org/browse/UNDERTOW-1338",
"refsource": "MISC",
"name": "https://issues.jboss.org/browse/UNDERTOW-1338"
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file." "value": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file."
} }
] ]
}, },
@ -21,7 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Initialization", "value": "CWE-665",
"cweId": "CWE-665" "cweId": "CWE-665"
} }
] ]
@ -32,24 +32,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "kernel",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 7", "product_name": "vhost",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:3.10.0-957.rt56.910.el7", "version_affected": "=",
"version_affected": "!" "version_value": "since 4.8"
},
{
"version_value": "0:4.14.0-115.el7a",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-957.el7",
"version_affected": "!"
} }
] ]
} }
@ -82,16 +74,6 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:3096" "name": "https://access.redhat.com/errata/RHSA-2018:3096"
}, },
{
"url": "https://access.redhat.com/security/cve/CVE-2018-1118",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2018-1118"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118",
"refsource": "MISC", "refsource": "MISC",