"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-02 21:01:49 +00:00
parent 53e05e5467
commit c761cbb5b9
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
28 changed files with 4948 additions and 1969 deletions

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3728",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/."
"value": "It was found that the \u201cvariant\u201d parameter in the TFTP API of Foreman was passed to the eval() function. An attacker could possibly use this flaw to execute arbitrary code with the privileges of the Foreman user."
}
]
},
@ -44,38 +21,635 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.2 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el6sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el6",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el6_6sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-9.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el6",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el6",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.10.0-1.el6_6sat",
"version_affected": "!"
},
{
"version_value": "1:1.3.6-27.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.3-18.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el6sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el6sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el6sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el6sat",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Satellite 6.2 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:0.9.54.7-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.49-1.el7sat",
"version_affected": "!"
},
{
"version_value": "1:1.11.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.11.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-5.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.56-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8-3.el7",
"version_affected": "!"
},
{
"version_value": "0:2016.5-3.atomic.el7",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.1.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.8.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.8.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.3-10.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.2.1-1.20140510git08b00d9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30-11.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4-13.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9-16.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-5.el7",
"version_affected": "!"
},
{
"version_value": "0:0.30-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.14-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.3-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.5-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.2-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0-21.1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.2.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.2.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.8.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.1.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.1.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.3.17-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0.11-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.14.6-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.25-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.11-4.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.5.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.10.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.22.23-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.0.68-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.4.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.30.0-7.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/theforeman/smart-proxy/commit/eef532aa668d656b9d61d9c6edf7c2505f3f43c7",
"refsource": "CONFIRM",
"url": "https://github.com/theforeman/smart-proxy/commit/eef532aa668d656b9d61d9c6edf7c2505f3f43c7"
"url": "https://access.redhat.com/errata/RHBA-2016:1501",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHBA-2016:1501"
},
{
"name": "[oss-security] 20160519 CVE-2016-3728: remote code execution in Foreman smart proxy TFTP API",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/2"
"url": "http://projects.theforeman.org/issues/14931",
"refsource": "MISC",
"name": "http://projects.theforeman.org/issues/14931"
},
{
"name": "http://projects.theforeman.org/issues/14931",
"refsource": "CONFIRM",
"url": "http://projects.theforeman.org/issues/14931"
"url": "http://theforeman.org/security.html#2016-3728",
"refsource": "MISC",
"name": "http://theforeman.org/security.html#2016-3728"
},
{
"name": "http://theforeman.org/security.html#2016-3728",
"refsource": "CONFIRM",
"url": "http://theforeman.org/security.html#2016-3728"
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/19/2"
},
{
"name": "RHBA-2016:1501",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHBA-2016:1501"
"url": "https://access.redhat.com/security/cve/CVE-2016-3728",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3728"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333378",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333378"
},
{
"url": "https://github.com/theforeman/smart-proxy/commit/eef532aa668d656b9d61d9c6edf7c2505f3f43c7",
"refsource": "MISC",
"name": "https://github.com/theforeman/smart-proxy/commit/eef532aa668d656b9d61d9c6edf7c2505f3f43c7"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank the Foreman project for reporting this issue. Upstream acknowledges Lukas Zapletal (Red Hat) as the original reporter."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3738",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod."
"value": "A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and escalate their privileges."
}
]
},
@ -44,18 +21,88 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Access Control",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift Container Platform 3.2",
"version": {
"version_data": [
{
"version_value": "0:3.2.0.44-1.git.0.a4463d9.el7",
"version_affected": "!"
},
{
"version_value": "0:1.4.7-1.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1094",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1094"
"url": "https://access.redhat.com/errata/RHSA-2016:1094",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1094"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-3738",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-3738"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333461",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1333461"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by David Eads (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4428",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in OpenStack Dashboard (Horizon) 8.0.1 and earlier and 9.0.0 through 9.0.1 allows remote authenticated users to inject arbitrary web script or HTML by injecting an AngularJS template in a dashboard form."
"value": "A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen)."
}
]
},
@ -44,73 +21,183 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"version": {
"version_data": [
{
"version_value": "0:2014.1.5-4.el6ost",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2014.1.5-4.el7ost",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2014.2.3-9.el7ost",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2015.1.4-1.el7ost",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"version": {
"version_data": [
{
"version_value": "1:8.0.1-4.el7ost",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:1268",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1268"
"url": "http://www.debian.org/security/2016/dsa-3617",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3617"
},
{
"name": "RHSA-2016:1270",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1270"
"url": "http://www.openwall.com/lists/oss-security/2016/06/17/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/06/17/4"
},
{
"name": "DSA-3617",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3617"
"url": "https://access.redhat.com/errata/RHSA-2016:1268",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1268"
},
{
"name": "RHSA-2016:1272",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1272"
"url": "https://access.redhat.com/errata/RHSA-2016:1269",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1269"
},
{
"name": "https://security.openstack.org/ossa/OSSA-2016-010.html",
"refsource": "CONFIRM",
"url": "https://security.openstack.org/ossa/OSSA-2016-010.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1270",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1270"
},
{
"name": "https://review.openstack.org/329997",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329997"
"url": "https://access.redhat.com/errata/RHSA-2016:1271",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1271"
},
{
"name": "https://bugs.launchpad.net/horizon/+bug/1567673",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/horizon/+bug/1567673"
"url": "https://access.redhat.com/errata/RHSA-2016:1272",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1272"
},
{
"name": "RHSA-2016:1269",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1269"
"url": "https://access.redhat.com/security/cve/CVE-2016-4428",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4428"
},
{
"name": "[oss-security] 20160617 [OSSA-2016-010] XSS in Horizon client side template (CVE-2016-4428)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/17/4"
"url": "https://bugs.launchpad.net/horizon/+bug/1567673",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/horizon/+bug/1567673"
},
{
"name": "RHSA-2016:1271",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1271"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343982",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343982"
},
{
"name": "https://review.openstack.org/329998",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329998"
"url": "https://review.openstack.org/329996",
"refsource": "MISC",
"name": "https://review.openstack.org/329996"
},
{
"name": "https://review.openstack.org/329996",
"refsource": "CONFIRM",
"url": "https://review.openstack.org/329996"
"url": "https://review.openstack.org/329997",
"refsource": "MISC",
"name": "https://review.openstack.org/329997"
},
{
"url": "https://review.openstack.org/329998",
"refsource": "MISC",
"name": "https://review.openstack.org/329998"
},
{
"url": "https://security.openstack.org/ossa/OSSA-2016-010.html",
"refsource": "MISC",
"name": "https://security.openstack.org/ossa/OSSA-2016-010.html"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4447",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName."
"value": "CVE-2016-4447 libxml2: Heap-based buffer underreads due to xmlParseName"
}
]
},
@ -44,148 +21,224 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.6-21.el6_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:2.9.1-6.el7_2.3",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://xmlsoft.org/news.html",
"refsource": "MISC",
"name": "http://xmlsoft.org/news.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "SSA:2016-148-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "90864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90864"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name": "[oss-security] 20160525 3 libxml2 issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name": "DSA-3593",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2016/dsa-3593"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
"url": "http://www.securitytracker.com/id/1036348",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036348"
},
{
"name": "https://support.apple.com/HT206901",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206901"
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722",
"refsource": "MISC",
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
},
{
"name": "USN-2994-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2994-1"
"url": "http://www.ubuntu.com/usn/USN-2994-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-2994-1"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1292",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83"
"url": "https://access.redhat.com/errata/RHSA-2016:2957",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2957"
},
{
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "MISC",
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
},
{
"name": "APPLE-SA-2016-07-18-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "MISC",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
"url": "https://support.apple.com/HT206899",
"refsource": "MISC",
"name": "https://support.apple.com/HT206899"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"url": "https://support.apple.com/HT206901",
"refsource": "MISC",
"name": "https://support.apple.com/HT206901"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
"url": "https://support.apple.com/HT206902",
"refsource": "MISC",
"name": "https://support.apple.com/HT206902"
},
{
"name": "1036348",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036348"
"url": "https://support.apple.com/HT206903",
"refsource": "MISC",
"name": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
"url": "https://support.apple.com/HT206904",
"refsource": "MISC",
"name": "https://support.apple.com/HT206904"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
"url": "https://support.apple.com/HT206905",
"refsource": "MISC",
"name": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
"url": "https://www.debian.org/security/2016/dsa-3593",
"refsource": "MISC",
"name": "https://www.debian.org/security/2016/dsa-3593"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
"url": "https://www.tenable.com/security/tns-2016-18",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "https://support.apple.com/HT206899",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206899"
"url": "http://www.securityfocus.com/bid/90864",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90864"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4447",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4447"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686"
},
{
"url": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4448",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors."
"value": "CVE-2016-4448 libxml2: Format string vulnerability"
}
]
},
@ -44,148 +21,219 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Use of Externally-Controlled Format String",
"cweId": "CWE-134"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.7.6-21.el6_8.1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:2.9.1-6.el7_2.3",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://xmlsoft.org/news.html",
"refsource": "MISC",
"name": "http://xmlsoft.org/news.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "SSA:2016-148-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "RHSA-2016:1292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1292"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
},
{
"name": "[oss-security] 20160525 3 libxml2 issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
},
{
"name": "90856",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/90856"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9"
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html",
"refsource": "MISC",
"name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
},
{
"name": "APPLE-SA-2016-07-18-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
},
{
"name": "APPLE-SA-2016-07-18-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
"url": "http://www.openwall.com/lists/oss-security/2016/05/25/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/05/25/2"
},
{
"name": "APPLE-SA-2016-07-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "http://xmlsoft.org/news.html",
"refsource": "CONFIRM",
"url": "http://xmlsoft.org/news.html"
"url": "http://www.securitytracker.com/id/1036348",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036348"
},
{
"name": "https://support.apple.com/HT206901",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206901"
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722",
"refsource": "MISC",
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1292",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1292"
},
{
"name": "APPLE-SA-2016-07-18-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
"url": "https://access.redhat.com/errata/RHSA-2016:2957",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2957"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700"
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "MISC",
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
},
{
"name": "APPLE-SA-2016-07-18-6",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170",
"refsource": "MISC",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10170"
},
{
"name": "https://www.tenable.com/security/tns-2016-18",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-18"
"url": "https://support.apple.com/HT206899",
"refsource": "MISC",
"name": "https://support.apple.com/HT206899"
},
{
"name": "RHSA-2016:2957",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html"
"url": "https://support.apple.com/HT206901",
"refsource": "MISC",
"name": "https://support.apple.com/HT206901"
},
{
"name": "https://support.apple.com/HT206905",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206905"
"url": "https://support.apple.com/HT206902",
"refsource": "MISC",
"name": "https://support.apple.com/HT206902"
},
{
"name": "1036348",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036348"
"url": "https://support.apple.com/HT206903",
"refsource": "MISC",
"name": "https://support.apple.com/HT206903"
},
{
"name": "https://support.apple.com/HT206903",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206903"
"url": "https://support.apple.com/HT206904",
"refsource": "MISC",
"name": "https://support.apple.com/HT206904"
},
{
"name": "https://support.apple.com/HT206902",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206902"
"url": "https://support.apple.com/HT206905",
"refsource": "MISC",
"name": "https://support.apple.com/HT206905"
},
{
"name": "https://support.apple.com/HT206904",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206904"
"url": "https://www.tenable.com/security/tns-2016-18",
"refsource": "MISC",
"name": "https://www.tenable.com/security/tns-2016-18"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709"
"url": "http://www.securityfocus.com/bid/90856",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/90856"
},
{
"name": "https://support.apple.com/HT206899",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT206899"
"url": "https://access.redhat.com/security/cve/CVE-2016-4448",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4448"
},
{
"name": "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700"
},
{
"url": "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9"
},
{
"url": "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4455",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Subscription Manager package (aka subscription-manager) before 1.17.7-1 for Candlepin uses weak permissions (755) for subscription-manager cache directories, which allows local users to obtain sensitive information by reading files in the directories."
"value": "It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack."
}
]
},
@ -44,53 +21,165 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.18.6-1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.18.10-1.el6",
"version_affected": "!"
},
{
"version_value": "0:2.0.34-1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.17.9-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.17.15-1.el7",
"version_affected": "!"
},
{
"version_value": "0:2.0.31-1.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1340525",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340525"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2592.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2592.html"
},
{
"name": "1038083",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038083"
"url": "http://rhn.redhat.com/errata/RHSA-2017-0698.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2017-0698.html"
},
{
"name": "[oss-security] 20161026 CVE-2016-4455: subscription-manager: incorrect permisions in /var/lib/rhsm/",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/26/5"
"url": "http://www.openwall.com/lists/oss-security/2016/10/26/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/10/26/5"
},
{
"name": "93926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93926"
"url": "http://www.securityfocus.com/bid/93926",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/93926"
},
{
"name": "RHSA-2016:2592",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2592.html"
"url": "http://www.securitytracker.com/id/1038083",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1038083"
},
{
"name": "https://github.com/candlepin/subscription-manager/commit/9dec31",
"refsource": "CONFIRM",
"url": "https://github.com/candlepin/subscription-manager/commit/9dec31"
"url": "https://access.redhat.com/errata/RHSA-2016:2592",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2592"
},
{
"name": "https://github.com/candlepin/subscription-manager/blob/subscription-manager-1.17.7-1/subscription-manager.spec",
"refsource": "CONFIRM",
"url": "https://github.com/candlepin/subscription-manager/blob/subscription-manager-1.17.7-1/subscription-manager.spec"
"url": "https://access.redhat.com/errata/RHSA-2017:0698",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2017:0698"
},
{
"name": "RHSA-2017:0698",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0698.html"
"url": "https://access.redhat.com/security/cve/CVE-2016-4455",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4455"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340525",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1340525"
},
{
"url": "https://github.com/candlepin/subscription-manager/blob/subscription-manager-1.17.7-1/subscription-manager.spec",
"refsource": "MISC",
"name": "https://github.com/candlepin/subscription-manager/blob/subscription-manager-1.17.7-1/subscription-manager.spec"
},
{
"url": "https://github.com/candlepin/subscription-manager/commit/9dec31",
"refsource": "MISC",
"name": "https://github.com/candlepin/subscription-manager/commit/9dec31"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Robert Scheck for reporting this issue."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.7,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4470",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command."
"value": "A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation."
}
]
},
@ -44,253 +21,454 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Incorrect Check of Function Return Value",
"cweId": "CWE-253"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-642.6.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-358.75.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-431.74.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-504.54.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.7 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-573.35.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.28.2.rt56.234.el7_2",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-327.28.2.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.1 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-229.40.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
"version": {
"version_data": [
{
"version_value": "1:3.10.0-327.rt56.194.el6rt",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
"url": "http://www.debian.org/security/2016/dsa-3607",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3607"
},
{
"name": "SUSE-SU-2016:2010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
},
{
"name": "SUSE-SU-2016:2011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
},
{
"name": "USN-3054-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3054-1"
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "SUSE-SU-2016:2003",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1532.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1532.html"
},
{
"name": "RHSA-2016:1657",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1539.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1539.html"
},
{
"name": "SUSE-SU-2016:1994",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1541.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1541.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1532",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1532"
},
{
"name": "USN-3051-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3051-1"
"url": "https://access.redhat.com/errata/RHSA-2016:1539",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1539"
},
{
"name": "RHSA-2016:2128",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html"
"url": "https://access.redhat.com/errata/RHSA-2016:1541",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1541"
},
{
"name": "SUSE-SU-2016:1961",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
},
{
"name": "RHSA-2016:2133",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
},
{
"name": "SUSE-SU-2016:2001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
},
{
"name": "SUSE-SU-2016:1985",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
},
{
"name": "USN-3053-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3053-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
},
{
"name": "openSUSE-SU-2016:2184",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
},
{
"name": "SUSE-SU-2016:1998",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
},
{
"name": "USN-3055-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3055-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
},
{
"name": "SUSE-SU-2016:2006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
},
{
"name": "USN-3056-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3056-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
},
{
"name": "USN-3052-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3052-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
},
{
"name": "USN-3049-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3049-1"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html"
},
{
"name": "RHSA-2016:1541",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1541.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
},
{
"name": "SUSE-SU-2016:2014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
},
{
"name": "SUSE-SU-2016:2018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
},
{
"name": "DSA-3607",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3607"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"
},
{
"name": "RHSA-2016:1539",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1539.html"
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource": "MISC",
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a",
"refsource": "MISC",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a"
},
{
"name": "RHSA-2016:1532",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1532.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html"
},
{
"name": "RHSA-2016:2006",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2006.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html"
},
{
"name": "SUSE-SU-2016:2009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-1657.html"
},
{
"name": "[oss-security] 20160615 CVE-2016-4470: Linux kernel Uninitialized variable in request_key handling user controlled kfree().",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/15/11"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2006.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2006.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2074.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2074.html"
},
{
"name": "USN-3050-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3050-1"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2076.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2076.html"
},
{
"name": "SUSE-SU-2016:2005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2128.html"
},
{
"name": "SUSE-SU-2016:2007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2133.html"
},
{
"name": "SUSE-SU-2016:1999",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html"
"url": "http://www.openwall.com/lists/oss-security/2016/06/15/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/06/15/11"
},
{
"name": "SUSE-SU-2016:2000",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
"url": "http://www.securitytracker.com/id/1036763",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036763"
},
{
"name": "RHSA-2016:2076",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2076.html"
"url": "http://www.ubuntu.com/usn/USN-3049-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3049-1"
},
{
"name": "USN-3057-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3057-1"
"url": "http://www.ubuntu.com/usn/USN-3050-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3050-1"
},
{
"name": "SUSE-SU-2016:1995",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
"url": "http://www.ubuntu.com/usn/USN-3051-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3051-1"
},
{
"name": "RHSA-2016:2074",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2074.html"
"url": "http://www.ubuntu.com/usn/USN-3052-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3052-1"
},
{
"name": "SUSE-SU-2016:2105",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"
"url": "http://www.ubuntu.com/usn/USN-3053-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3053-1"
},
{
"name": "SUSE-SU-2016:2002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
"url": "http://www.ubuntu.com/usn/USN-3054-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3054-1"
},
{
"name": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a"
"url": "http://www.ubuntu.com/usn/USN-3055-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3055-1"
},
{
"name": "SUSE-SU-2016:1937",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"
"url": "http://www.ubuntu.com/usn/USN-3056-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3056-1"
},
{
"url": "http://www.ubuntu.com/usn/USN-3057-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3057-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:1657",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:1657"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2006",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2006"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2074",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2074"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2076",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2076"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2128",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2128"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2133",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2133"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4470",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4470"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"url": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by David Howells (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4971",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource."
"value": "It was found that wget used a file name provided by the server for the downloaded file when following a HTTP redirect to a FTP server resource. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client."
}
]
},
@ -44,78 +21,164 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "External Control of File Name or Path",
"cweId": "CWE-73"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.14-13.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "[info-gnu] 20160609 GNU wget 1.18 released",
"refsource": "MLIST",
"url": "http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html"
},
{
"name": "GLSA-201610-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-11"
},
{
"name": "openSUSE-SU-2016:2027",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html"
},
{
"name": "40064",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40064/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1",
"refsource": "CONFIRM",
"url": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1"
},
{
"name": "RHSA-2016:2587",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2587.html"
},
{
"name": "1036133",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036133"
},
{
"name": "USN-3012-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3012-1"
},
{
"name": "91530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91530"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-4971",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-4971"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"url": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1",
"refsource": "MISC",
"name": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1"
},
{
"url": "http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html",
"refsource": "MISC",
"name": "http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html"
},
{
"url": "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2587.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2587.html"
},
{
"url": "http://www.securityfocus.com/bid/91530",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/91530"
},
{
"url": "http://www.securitytracker.com/id/1036133",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036133"
},
{
"url": "http://www.ubuntu.com/usn/USN-3012-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3012-1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2587",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2587"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4971",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4971"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343666"
},
{
"url": "https://security.gentoo.org/glsa/201610-11",
"refsource": "MISC",
"name": "https://security.gentoo.org/glsa/201610-11"
},
{
"url": "https://security.paloaltonetworks.com/CVE-2016-4971",
"refsource": "MISC",
"name": "https://security.paloaltonetworks.com/CVE-2016-4971"
},
{
"url": "https://www.exploit-db.com/exploits/40064/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/40064/"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Use wget with \"-O\" option to explicitly specify the output filename."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank GNU wget project for reporting this issue. Upstream acknowledges Dawid Golunski as the original reporter."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4992",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to infer the existence of RDN component objects."
"value": "An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not."
}
]
},
@ -44,28 +21,124 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "0:1.2.11.15-84.el6_8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:1.3.5.10-11.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2594.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2594.html"
},
{
"name": "RHSA-2016:2594",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2594.html"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2765.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2765.html"
},
{
"name": "RHSA-2016:2765",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2765.html"
"url": "https://access.redhat.com/errata/RHSA-2016:2594",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2594"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:2765",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2765"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2016-4992",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4992"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Martin Basti (Red Hat) and Petr Spacek (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4994",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file."
"value": "Multiple use-after-free vulnerabilities were found in GIMP in the channel and layer properties parsing process when loading XCF files. An attacker could create a specially crafted XCF file which could cause GIMP to crash."
}
]
},
@ -44,58 +21,141 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Use After Free",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "2:2.8.16-3.el7",
"version_affected": "!"
},
{
"version_value": "0:2.8.2-1.el7",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "1036226",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036226"
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html"
},
{
"name": "https://git.gnome.org/browse/gimp/commit/?id=e82aaa4b4ee0703c879e35ea9321fff6be3e9b6f",
"refsource": "CONFIRM",
"url": "https://git.gnome.org/browse/gimp/commit/?id=e82aaa4b4ee0703c879e35ea9321fff6be3e9b6f"
"url": "http://rhn.redhat.com/errata/RHSA-2016-2589.html",
"refsource": "MISC",
"name": "http://rhn.redhat.com/errata/RHSA-2016-2589.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=767873",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=767873"
"url": "http://www.debian.org/security/2016/dsa-3612",
"refsource": "MISC",
"name": "http://www.debian.org/security/2016/dsa-3612"
},
{
"name": "openSUSE-SU-2016:1727",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html"
"url": "http://www.securityfocus.com/bid/91425",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/91425"
},
{
"name": "91425",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91425"
"url": "http://www.securitytracker.com/id/1036226",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1036226"
},
{
"name": "DSA-3612",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3612"
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.431987",
"refsource": "MISC",
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.431987"
},
{
"name": "USN-3025-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3025-1"
"url": "http://www.ubuntu.com/usn/USN-3025-1",
"refsource": "MISC",
"name": "http://www.ubuntu.com/usn/USN-3025-1"
},
{
"name": "SSA:2016-203-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.431987"
"url": "https://access.redhat.com/errata/RHSA-2016:2589",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2016:2589"
},
{
"name": "RHSA-2016:2589",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2589.html"
"url": "https://access.redhat.com/security/cve/CVE-2016-4994",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4994"
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=767873",
"refsource": "MISC",
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=767873"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348617",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348617"
},
{
"url": "https://git.gnome.org/browse/gimp/commit/?id=e82aaa4b4ee0703c879e35ea9321fff6be3e9b6f",
"refsource": "MISC",
"name": "https://git.gnome.org/browse/gimp/commit/?id=e82aaa4b4ee0703c879e35ea9321fff6be3e9b6f"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4995",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Foreman before 1.11.4 and 1.12.x before 1.12.1 does not properly restrict access to preview provisioning templates, which allows remote authenticated users with permission to view some hosts to obtain sensitive host configuration information via a URL with a hostname."
"value": "A flaw was found in foreman's handling of template previews. An attacker with permissions to preview host templates can access the template preview for any host if they are able to guess the host name, disclosing potentially sensitive information."
}
]
},
@ -44,33 +21,369 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.1.14-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.34-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:201801241201-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.4-1",
"version_affected": "!"
},
{
"version_value": "1:1.15.6.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5-15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.26-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.0.5-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.9-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0-23.0.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0.12-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.14-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.11-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.13-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.8-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.5-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.12-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.58-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.fm1_15.el7sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://theforeman.org/security.html#2016-4995",
"refsource": "CONFIRM",
"url": "https://theforeman.org/security.html#2016-4995"
"url": "https://access.redhat.com/errata/RHSA-2018:0336",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "RHSA-2018:0336",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0336"
"url": "http://projects.theforeman.org/issues/15490",
"refsource": "MISC",
"name": "http://projects.theforeman.org/issues/15490"
},
{
"name": "http://projects.theforeman.org/issues/15490",
"refsource": "CONFIRM",
"url": "http://projects.theforeman.org/issues/15490"
"url": "http://projects.theforeman.org/projects/foreman/repository/revisions/c3c186de12be15e55d9582e54659f765304a1073",
"refsource": "MISC",
"name": "http://projects.theforeman.org/projects/foreman/repository/revisions/c3c186de12be15e55d9582e54659f765304a1073"
},
{
"name": "http://projects.theforeman.org/projects/foreman/repository/revisions/c3c186de12be15e55d9582e54659f765304a1073",
"refsource": "CONFIRM",
"url": "http://projects.theforeman.org/projects/foreman/repository/revisions/c3c186de12be15e55d9582e54659f765304a1073"
"url": "https://access.redhat.com/security/cve/CVE-2016-4995",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4995"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348939",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348939"
},
{
"url": "https://theforeman.org/security.html#2016-4995",
"refsource": "MISC",
"name": "https://theforeman.org/security.html#2016-4995"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Dominic Cleal (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
]
}

View File

@ -1,40 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-4996",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "discovery-debug in Foreman before 6.2 when the ssh service has been enabled on discovered nodes displays the root password in plaintext in the system journal when used to log in, which allows local users with access to the system journal to obtain the root password by reading the system journal, or by clicking Logs on the console."
"value": "A flaw was found in discovery-debug in foreman. An attacker, with permissions to view the debug results, would be able to view the root password associated with that system, potentially allowing them to access it."
}
]
},
@ -44,23 +21,354 @@
"description": [
{
"lang": "eng",
"value": "n/a"
"value": "Insertion of Sensitive Information into Log File",
"cweId": "CWE-532"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6.3 for RHEL 7",
"version": {
"version_data": [
{
"version_value": "0:2.1.14-1.el7",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.34-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:201801241201-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.4-1",
"version_affected": "!"
},
{
"version_value": "1:1.15.6.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.4-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.15.6.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5-15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.26-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.5.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.4.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.2.1.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.13.4.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:4.0.5-4.el7",
"version_affected": "!"
},
{
"version_value": "0:0.0.9-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.2-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.6-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.2.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4-3.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.6.9-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-1.git.0.b5c2768.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7-2.git.0.3b416c9.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0-23.0.el7sat",
"version_affected": "!"
},
{
"version_value": "0:6.3.0.12-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.1.1.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:10.0.2.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:9.1.5.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.1.0.3-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.3.14-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.7.11-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.0.13-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.3.7.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.9.6.4-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.8-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:5.0.1-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.4.16-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.9-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.1-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:2.3.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.0.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.8-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.3.3-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.0-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-2.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.5-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.6-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.12-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.11.3.5-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:3.4.5.58-1.el7sat",
"version_affected": "!"
},
{
"version_value": "0:1.0.2-1.fm1_15.el7sat",
"version_affected": "!"
},
{
"version_value": "0:0.1.10-1.fm1_15.el7sat",
"version_affected": "!"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:0336",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0336"
"url": "https://access.redhat.com/errata/RHSA-2018:0336",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0336"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136"
"url": "https://access.redhat.com/security/cve/CVE-2016-4996",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2016-4996"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349136"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Thom Carlin (Red Hat)."
}
],
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.2,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "COMPLETE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "COMPLETE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10213",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVE-2019-10213 openshift: Secret data written to pod logs when operator set at Debug level or higher"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Output Neutralization for Logs",
"cweId": "CWE-117"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,20 @@
"product": {
"product_data": [
{
"product_name": "openshift",
"product_name": "Red Hat OpenShift Container Platform 4.1",
"version": {
"version_data": [
{
"version_value": "versions Red Hat OpenShift 4.1 and Red Hat OpenShift 4.2"
"version_value": "v4.1.16-201909100604",
"version_affected": "!"
},
{
"version_value": "v4.1.26-201911260202",
"version_affected": "!"
},
{
"version_value": "v4.1.27-201912030019",
"version_affected": "!"
}
]
}
@ -30,53 +60,56 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-117"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2019:2791",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2791"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4082",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4082"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4088",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4088"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10213",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10213"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734615",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1734615"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213",
"refsource": "CONFIRM"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4082",
"url": "https://access.redhat.com/errata/RHSA-2019:4082"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4088",
"url": "https://access.redhat.com/errata/RHSA-2019:4088"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenShift Container Platform, versions 4.1 and 4.2, does not sanitize secret data written to pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user."
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213"
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10215",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVE-2019-10215 bootstrap3-typeahead.js: Cross-site scripting via highlighter() function"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,12 @@
"product": {
"product_data": [
{
"product_name": "bootstrap3-typeahead.js",
"product_name": "Red Hat OpenShift Container Platform 4.2",
"version": {
"version_data": [
{
"version_value": "after version bootstrap3-typeahead 4.0.2"
"version_value": "v4.2.4-201911050122",
"version_affected": "!"
}
]
}
@ -30,53 +52,57 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3771",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3771"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10215",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10215"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735506",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1735506"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10215",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10215",
"refsource": "CONFIRM"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3771",
"url": "https://access.redhat.com/errata/RHSA-2019:3771"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1105",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bootstrap-3-Typeahead after version 4.0.2 is vulnerable to a cross-site scripting flaw in the highlighter() function. An attacker could exploit this via user interaction to execute code in the user's browser."
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10215"
}
]
},
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Junqi Zhao (Red Hat)."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,47 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10222",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Handling of Exceptional Conditions",
"cweId": "CWE-755"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Ceph Project",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "ceph",
"product_name": "Red Hat Ceph Storage 3.3",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "2:12.2.12-48.el7cp",
"version_affected": "!"
}
]
}
@ -30,18 +52,6 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
@ -50,28 +60,60 @@
"name": "https://tracker.ceph.com/issues/40018"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:2577",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2577"
},
{
"lang": "eng",
"value": "A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients."
"url": "https://access.redhat.com/errata/RHSA-2019:2579",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2579"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10222",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10222"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739292",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1739292"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222"
}
]
},
"work_around": [
{
"lang": "en",
"value": "To mitigate this issue either of the following options can be applied to system:\n\nMitigation 1:\n1. By default system will use /etc/init.d/ceph-radosgw\n stop this service by\n\n~]# /etc/init.d/ceph-radosgw stop\n\n2. Create systemd service, and change command line parameters according to the environment\nwhere Ceph radosgw is running.\n\n~]# cat /usr/lib/systemd/system/ceph-rgw.service \n[Unit]\nDescription=Ceph RGW daemon\n\n[Service]\nType=forking\nExecStart=/bin/radosgw -n client.rgw.$(HOSTNAME REDACTED)\nRestart=on-abnormal\nRestartSec=1s\n\n[Install]\nWantedBy=multi-user.target\n\n3. Run systemd service 'ceph-rgw.service'\n\nCaveat: It still takes +1-2 sec to get service back online. After applying above mentioned mitigation, the malicious IP can be blocked by a firewall rule if there are continuous attempts to launch remote denial of service. This mitigation is of limited use if the attack is launched from multiple IPs. It is recommended to limit the exposure of ceph RGW server to known clients.\n\nOR \n\nMitigation 2:\nuse 'civetweb' as HTTP frontend with ceph RGW."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Abhishek Lekshmanan (SUSE Software Solutions Germany) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,66 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14814",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel\u2019s implementation of the Marvell wifi driver, which can allow a local user who has CAP_NET_ADMIN or administrative privileges to possibly cause a Denial Of Service (DOS) by corrupting memory and possible code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "kernel",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "all versions up to, excluding 5.3"
"version_value": "0:4.14.0-115.17.1.el7a",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1127.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-147.5.1.rt24.98.el8_1",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-147.5.1.el8_1",
"version_affected": "!"
}
]
}
@ -30,158 +71,172 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20190828 Linux kernel: three heap overflow in the marvell wifi driver",
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/1"
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-4c91a2f76e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/"
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-97380355ae",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/"
"url": "https://access.redhat.com/errata/RHSA-2020:0328",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0339",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0174",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0174"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1016",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1016"
},
{
"url": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a"
},
{
"url": "https://www.openwall.com/lists/oss-security/2019/08/28/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/08/28/1"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/08/28/1"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14814",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14814"
},
{
"url": "https://access.redhat.com/security/cve/cve-2019-14814",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2019-14814"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744130",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1744130"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814",
"refsource": "CONFIRM"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/08/28/1",
"url": "https://www.openwall.com/lists/oss-security/2019/08/28/1"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"url": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a"
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2019-14814",
"url": "https://access.redhat.com/security/cve/cve-2019-14814"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2173",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2181",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-1",
"url": "https://usn.ubuntu.com/4157-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-1",
"url": "https://usn.ubuntu.com/4162-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-2",
"url": "https://usn.ubuntu.com/4157-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-1",
"url": "https://usn.ubuntu.com/4163-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-2",
"url": "https://usn.ubuntu.com/4163-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-2",
"url": "https://usn.ubuntu.com/4162-2/"
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"refsource": "BUGTRAQ",
"name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
"url": "https://seclists.org/bugtraq/2019/Nov/11"
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0174",
"url": "https://access.redhat.com/errata/RHSA-2020:0174"
"url": "https://seclists.org/bugtraq/2019/Nov/11",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0328",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0339",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
"url": "https://usn.ubuntu.com/4157-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code."
"url": "https://usn.ubuntu.com/4157-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-2/"
},
{
"url": "https://usn.ubuntu.com/4162-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-1/"
},
{
"url": "https://usn.ubuntu.com/4162-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-2/"
},
{
"url": "https://usn.ubuntu.com/4163-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-1/"
},
{
"url": "https://usn.ubuntu.com/4163-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-2/"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Huangwen (ADLab of Venustech) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,191 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14816",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in the Linux kernel's Marvell WiFi chip driver. Where, while parsing vendor-specific informational attributes, an attacker on the same WiFi physical network segment could cause a system crash, resulting in a denial of service, or potentially execute arbitrary code. This flaw affects the network interface at the most basic level meaning the attacker only needs to affiliate with the same network device as the vulnerable system to create an attack path."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "kernel",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "all versions up to, excluding 5.3"
"version_value": "0:3.10.0-1062.12.1.rt56.1042.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.17.1.el7a",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1062.12.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.85.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.73.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.73.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.73.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.65.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.65.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.65.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-862.51.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.46.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-147.5.1.rt24.98.el8_1",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-147.5.1.el8_1",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-80.15.1.el8_0",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
"version": {
"version_data": [
{
"version_value": "1:3.10.0-693.65.1.rt56.663.el6rt",
"version_affected": "!"
}
]
}
@ -30,188 +196,218 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20190828 Linux kernel: three heap overflow in the marvell wifi driver",
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/1"
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-4c91a2f76e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/"
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-97380355ae",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/"
"url": "https://access.redhat.com/errata/RHSA-2020:0328",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0339",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0374",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0374"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0375",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0375"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0204",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0174",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0174"
},
{
"url": "https://www.openwall.com/lists/oss-security/2019/08/28/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/08/28/1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0653",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0653"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0661",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0661"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0664",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0664"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/08/28/1"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/"
},
{
"url": "https://seclists.org/bugtraq/2019/Nov/11",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"url": "https://usn.ubuntu.com/4157-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-1/"
},
{
"url": "https://usn.ubuntu.com/4157-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-2/"
},
{
"url": "https://usn.ubuntu.com/4162-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-1/"
},
{
"url": "https://usn.ubuntu.com/4162-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-2/"
},
{
"url": "https://usn.ubuntu.com/4163-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-1/"
},
{
"url": "https://usn.ubuntu.com/4163-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-2/"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1266",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1266"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1347",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1347"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1353",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1353"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14816",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14816"
},
{
"url": "https://access.redhat.com/security/cve/cve-2019-14816",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2019-14816"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816",
"refsource": "CONFIRM"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/08/28/1",
"url": "https://www.openwall.com/lists/oss-security/2019/08/28/1"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816"
},
{
"url": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3",
"url": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3"
},
{
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2019-14816",
"url": "https://access.redhat.com/security/cve/cve-2019-14816"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2173",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2181",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-1",
"url": "https://usn.ubuntu.com/4157-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-1",
"url": "https://usn.ubuntu.com/4162-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-2",
"url": "https://usn.ubuntu.com/4157-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-1",
"url": "https://usn.ubuntu.com/4163-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-2",
"url": "https://usn.ubuntu.com/4163-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-2",
"url": "https://usn.ubuntu.com/4162-2/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"refsource": "BUGTRAQ",
"name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
"url": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0174",
"url": "https://access.redhat.com/errata/RHSA-2020:0174"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0328",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0339",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0374",
"url": "https://access.redhat.com/errata/RHSA-2020:0374"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0375",
"url": "https://access.redhat.com/errata/RHSA-2020:0375"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0653",
"url": "https://access.redhat.com/errata/RHSA-2020:0653"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0661",
"url": "https://access.redhat.com/errata/RHSA-2020:0661"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0664",
"url": "https://access.redhat.com/errata/RHSA-2020:0664"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code."
"name": "https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3"
}
]
},
"work_around": [
{
"lang": "en",
"value": "At this time there is no mitigation to the flaw, if you are able to disable wireless and your system is able to work this will be a temporary mitigation until a kernel update is available for installation."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Huangwen (ADLab of Venustech) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,47 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14819",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege Context Switching Error",
"cweId": "CWE-270"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "[Red Hat]",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "openshift-ansible",
"product_name": "Red Hat OpenShift Container Platform 3.11",
"version": {
"version_data": [
{
"version_value": "3.x"
"version_value": "0:3.11.146-1.git.0.fcedb45.el7",
"version_affected": "!"
}
]
}
@ -30,51 +52,52 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-266"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-270"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:2818",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2818"
},
{
"lang": "eng",
"value": "A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints."
"url": "https://access.redhat.com/security/cve/CVE-2019-14819",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14819"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746238",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1746238"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Make sure your kubeconfig (~/.kube/config) is using the 'default' context when executing, or re-executing a cluster upgrade or install using the ansible playbooks."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,114 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14821",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Kernel",
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "all through 5.3"
"version_value": "0:2.6.32-754.25.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-1062.7.1.rt56.1030.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1062.7.1.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.16.1.el7a",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.56.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-147.rt24.93.el8",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-147.el8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-80.15.1.el8_0",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.56.1.el7",
"version_affected": "!"
}
]
}
@ -30,183 +119,198 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer",
"url": "http://www.openwall.com/lists/oss-security/2019/09/20/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-15e141c6a7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"refsource": "BUGTRAQ",
"name": "20190925 [SECURITY] [DSA 4531-1] linux security update",
"url": "https://seclists.org/bugtraq/2019/Sep/41"
},
{
"refsource": "DEBIAN",
"name": "DSA-4531",
"url": "https://www.debian.org/security/2019/dsa-4531"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-a570a92d5a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191004-0001/",
"url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2307",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2308",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-1",
"url": "https://usn.ubuntu.com/4157-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-1",
"url": "https://usn.ubuntu.com/4162-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4157-2",
"url": "https://usn.ubuntu.com/4157-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-1",
"url": "https://usn.ubuntu.com/4163-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4163-2",
"url": "https://usn.ubuntu.com/4163-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4162-2",
"url": "https://usn.ubuntu.com/4162-2/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3309",
"url": "https://access.redhat.com/errata/RHSA-2019:3309"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3517",
"url": "https://access.redhat.com/errata/RHSA-2019:3517"
},
{
"refsource": "BUGTRAQ",
"name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
"url": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3978",
"url": "https://access.redhat.com/errata/RHSA-2019:3978"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3979",
"url": "https://access.redhat.com/errata/RHSA-2019:3979"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4154",
"url": "https://access.redhat.com/errata/RHSA-2019:4154"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4256",
"url": "https://access.redhat.com/errata/RHSA-2019:4256"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0027",
"url": "https://access.redhat.com/errata/RHSA-2020:0027"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
}
]
},
"description": {
"description_data": [
},
{
"lang": "eng",
"value": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system."
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4154",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4154"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3309",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3309"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3517",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3517"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0204",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"url": "https://seclists.org/bugtraq/2019/Nov/11",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"url": "https://usn.ubuntu.com/4157-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-1/"
},
{
"url": "https://usn.ubuntu.com/4157-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4157-2/"
},
{
"url": "https://usn.ubuntu.com/4162-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-1/"
},
{
"url": "https://usn.ubuntu.com/4162-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4162-2/"
},
{
"url": "https://usn.ubuntu.com/4163-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-1/"
},
{
"url": "https://usn.ubuntu.com/4163-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4163-2/"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/09/20/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/09/20/1"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3978",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3978"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3979",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:3979"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4256",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4256"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0027",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0027"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:2851",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:2851"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14821",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14821"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/"
},
{
"url": "https://seclists.org/bugtraq/2019/Sep/41",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Sep/41"
},
{
"url": "https://security.netapp.com/advisory/ntap-20191004-0001/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20191004-0001/"
},
{
"url": "https://www.debian.org/security/2019/dsa-4531",
"refsource": "MISC",
"name": "https://www.debian.org/security/2019/dsa-4531"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Restrict access to the '/dev/kvm' device to trusted users."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Matt Delco (Google.com) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,58 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14834",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Dnsmasq application where a remote attacker can trigger a memory leak by sending specially crafted DHCP responses to the server. A successful attack is dependent on a specific configuration regarding the domain name set into the dnsmasq.conf file. Over time, the memory leak may cause the process to run out of memory and terminate, causing a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Allocation of Resources Without Limits or Throttling",
"cweId": "CWE-770"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Dnsmasq Project",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "dnsmasq",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "before 2.81"
"version_value": "0:2.76-16.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:2.79-11.el8",
"version_affected": "!"
}
]
}
@ -30,53 +63,67 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-770"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "FEDORA",
"name": "FEDORA-2020-29b442f83e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JU474LT66BHNVFG5C4GEV3VTZNAEJ3BS/"
"url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=69bc94779c2f035a9fffdb5327a54c3aeca73ed5",
"refsource": "MISC",
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=69bc94779c2f035a9fffdb5327a54c3aeca73ed5"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:1715",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:1715"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:3878",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:3878"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14834",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14834"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764425",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1764425"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14834",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14834",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14834"
},
{
"url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5",
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation."
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JU474LT66BHNVFG5C4GEV3VTZNAEJ3BS/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JU474LT66BHNVFG5C4GEV3VTZNAEJ3BS/"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Xu Mingjie (varas@IIE) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,250 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14835",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. In the worst case (and likely most common virtualization) scenario this flaw affects KVM/qemu hypervisor enabled hosts running Linux guests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
"cweId": "CWE-120"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux Kernel",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Linux kernel",
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "from version 2.6.34 to 5.2.x"
"version_value": "0:2.6.32-754.23.1.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-431.96.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6.6 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.6.32-504.81.2.el6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-1062.1.2.rt56.1025.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-1062.1.2.el7",
"version_affected": "!"
},
{
"version_value": "0:4.14.0-115.13.1.el7a",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.82.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.82.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-327.82.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.69.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.69.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-514.69.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.59.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Telco Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.59.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.59.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-862.41.2.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.35.2.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:4.18.0-80.11.2.rt9.157.el8_0",
"version_affected": "!"
},
{
"version_value": "0:4.18.0-80.11.2.el8_0",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-957.35.2.el7",
"version_affected": "!"
},
{
"version_value": "0:4.2-20190919.0.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:4.3.5-20190920.0.el7_7",
"version_affected": "!"
}
]
}
@ -30,238 +255,253 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"url": "https://seclists.org/bugtraq/2019/Nov/11",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/"
},
{
"url": "https://seclists.org/bugtraq/2019/Sep/41",
"refsource": "MISC",
"name": "https://seclists.org/bugtraq/2019/Sep/41"
},
{
"url": "https://www.debian.org/security/2019/dsa-4531",
"refsource": "MISC",
"name": "https://www.debian.org/security/2019/dsa-4531"
},
{
"url": "http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html"
},
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en",
"refsource": "MISC",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/09/24/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/09/24/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/10/03/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/10/03/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/10/09/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/10/09/3"
},
{
"url": "http://www.openwall.com/lists/oss-security/2019/10/09/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2019/10/09/7"
},
{
"url": "https://access.redhat.com/errata/RHBA-2019:2824",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHBA-2019:2824"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2827",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2827"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2828",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2828"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2829",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2829"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2830",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2830"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2854",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2854"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2862",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2862"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2863",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2863"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2864",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2864"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2865",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2865"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2866",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2866"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2867",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2867"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2869",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2869"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2889",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2889"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2899",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2899"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2900",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2900"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2901",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2901"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2924",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2924"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14835",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14835"
},
{
"url": "https://access.redhat.com/security/vulnerabilities/kernel-vhost",
"refsource": "MISC",
"name": "https://access.redhat.com/security/vulnerabilities/kernel-vhost"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750727",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1750727"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/"
},
{
"url": "https://usn.ubuntu.com/4135-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4135-1/"
},
{
"url": "https://usn.ubuntu.com/4135-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4135-2/"
},
{
"url": "https://www.openwall.com/lists/oss-security/2019/09/17/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/09/17/1"
},
{
"refsource": "UBUNTU",
"name": "USN-4135-2",
"url": "https://usn.ubuntu.com/4135-2/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-e3010166bd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2827",
"url": "https://access.redhat.com/errata/RHSA-2019:2827"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2828",
"url": "https://access.redhat.com/errata/RHSA-2019:2828"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2830",
"url": "https://access.redhat.com/errata/RHSA-2019:2830"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2829",
"url": "https://access.redhat.com/errata/RHSA-2019:2829"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2854",
"url": "https://access.redhat.com/errata/RHSA-2019:2854"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2862",
"url": "https://access.redhat.com/errata/RHSA-2019:2862"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2863",
"url": "https://access.redhat.com/errata/RHSA-2019:2863"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2866",
"url": "https://access.redhat.com/errata/RHSA-2019:2866"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2864",
"url": "https://access.redhat.com/errata/RHSA-2019:2864"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2865",
"url": "https://access.redhat.com/errata/RHSA-2019:2865"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2867",
"url": "https://access.redhat.com/errata/RHSA-2019:2867"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2869",
"url": "https://access.redhat.com/errata/RHSA-2019:2869"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html",
"url": "http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190924 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow",
"url": "http://www.openwall.com/lists/oss-security/2019/09/24/1"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2173",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2889",
"url": "https://access.redhat.com/errata/RHSA-2019:2889"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2181",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
},
{
"refsource": "BUGTRAQ",
"name": "20190925 [SECURITY] [DSA 4531-1] linux security update",
"url": "https://seclists.org/bugtraq/2019/Sep/41"
},
{
"refsource": "DEBIAN",
"name": "DSA-4531",
"url": "https://www.debian.org/security/2019/dsa-4531"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2900",
"url": "https://access.redhat.com/errata/RHSA-2019:2900"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2901",
"url": "https://access.redhat.com/errata/RHSA-2019:2901"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2899",
"url": "https://access.redhat.com/errata/RHSA-2019:2899"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2924",
"url": "https://access.redhat.com/errata/RHSA-2019:2924"
},
{
"refsource": "UBUNTU",
"name": "USN-4135-1",
"url": "https://usn.ubuntu.com/4135-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-a570a92d5a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191003 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow",
"url": "http://www.openwall.com/lists/oss-security/2019/10/03/1"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191009 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow",
"url": "http://www.openwall.com/lists/oss-security/2019/10/09/3"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191009 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow",
"url": "http://www.openwall.com/lists/oss-security/2019/10/09/7"
},
{
"refsource": "REDHAT",
"name": "RHBA-2019:2824",
"url": "https://access.redhat.com/errata/RHBA-2019:2824"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191031-0005/",
"url": "https://security.netapp.com/advisory/ntap-20191031-0005/"
},
{
"refsource": "BUGTRAQ",
"name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
"url": "https://seclists.org/bugtraq/2019/Nov/11"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host."
}
]
},
"work_around": [
{
"lang": "en",
"value": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/kernel-vhost"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Peter Pi (Tencent Blade Team) for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,63 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14849",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found where 3scale did not set the HTTPOnly attribute on the user session cookie. An attacker could abuse this flaw to conduct Cross-site Scripting attacks and gain access to unauthorized information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insertion of Sensitive Information Into Sent Data",
"cweId": "CWE-201"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "3scale",
"product_name": "3scale API Management 2.6",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "1.9-7",
"version_affected": "!"
},
{
"version_value": "1.15-9",
"version_affected": "!"
},
{
"version_value": "1.9-24",
"version_affected": "!"
},
{
"version_value": "1.2-5",
"version_affected": "!"
},
{
"version_value": "1.9-28",
"version_affected": "!"
}
]
}
@ -30,43 +68,46 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-201"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14849",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14849",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:2534",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:2534"
},
{
"lang": "eng",
"value": "A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie. An attacker could use this to conduct cross site scripting attacks and gain access to unauthorized information."
"url": "https://access.redhat.com/security/cve/CVE-2019-14849",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14849"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712167",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1712167"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14849",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14849"
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14854",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenShift Container Platform 4 does not sanitize secret data written to static pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Output Neutralization for Logs",
"cweId": "CWE-117"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,31 @@
"product": {
"product_data": [
{
"product_name": "library-go",
"product_name": "Red Hat OpenShift Container Platform 4.1",
"version": {
"version_data": [
{
"version_value": "As shipped with Openshift 4.x"
"version_value": "v4.1.26-201911260202",
"version_affected": "!"
},
{
"version_value": "v4.1.27-201912030019",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat OpenShift Container Platform 4.2",
"version": {
"version_data": [
{
"version_value": "v4.2.9-201911261133",
"version_affected": "!"
},
{
"version_value": "v4.2.10-201912022352",
"version_affected": "!"
}
]
}
@ -30,43 +71,61 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-117"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14854",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14854",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
"url": "https://access.redhat.com/errata/RHSA-2019:4075",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4075"
},
{
"lang": "eng",
"value": "OpenShift Container Platform 4 does not sanitize secret data written to static pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user."
"url": "https://access.redhat.com/errata/RHSA-2019:4081",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4081"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4091",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4091"
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4098",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2019:4098"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14854",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14854"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758953",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1758953"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14854",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14854"
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
]
}
}

View File

@ -1,25 +1,47 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14865",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege Defined With Unsafe Actions",
"cweId": "CWE-267"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "[UNKNOWN]",
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "grub2",
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "1:2.02-78.el8_1.1",
"version_affected": "!"
}
]
}
@ -30,53 +52,63 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-267"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2020:0335",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:0335"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14865",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14865"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764925",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1764925"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865"
},
{
"url": "https://seclists.org/oss-sec/2019/q4/101",
"refsource": "MISC",
"name": "https://seclists.org/oss-sec/2019/q4/101"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865",
"refsource": "CONFIRM"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0335",
"url": "https://access.redhat.com/errata/RHSA-2020:0335"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots."
}
]
},
"work_around": [
{
"lang": "en",
"value": "Remove the \"grub-set-bootflag\" from the system, by manually the deleting the binary file. Note: On subsequent updates of the \"grub2-tools-minimal\" rpm, the file will be re-installed."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Tavis Ormandy for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14866",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered cpio does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,34 @@
"product": {
"product_data": [
{
"product_name": "cpio",
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "All cpio versions before 2.13"
"version_value": "0:2.11-28.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "0:2.12-10.el8",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:2.12-8.el8_2.1",
"version_affected": "!"
}
]
}
@ -30,24 +74,37 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2020:3908",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:3908"
},
{
"url": "https://access.redhat.com/errata/RHSA-2021:1582",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:1582"
},
{
"url": "https://access.redhat.com/errata/RHSA-2022:0073",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2022:0073"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14866",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14866"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866"
},
{
"url": "https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html",
@ -61,22 +118,34 @@
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system."
}
]
},
"work_around": [
{
"lang": "en",
"value": "TAR archives should be inspected before being extracted and the extraction should be performed with the `tar` command or `--no-absolute-filenames` option if done with `cpio`. Moreover, it should be performed by a low-privilege user whenever possible, to prevent extraction of files that could compromise the system."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Thomas Habets for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,12 +1,33 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14896",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap-based buffer overflow vulnerability was found in the Linux kernel's Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
@ -15,11 +36,12 @@
"product": {
"product_data": [
{
"product_name": "kernel",
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "kernel-2.6.32"
"version_value": "0:2.6.32-754.33.1.el6",
"version_affected": "!"
}
]
}
@ -30,118 +52,127 @@
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20200103-0001/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20200103-0001/"
},
{
"url": "https://usn.ubuntu.com/4226-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4226-1/"
},
{
"url": "http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/"
},
{
"url": "https://usn.ubuntu.com/4225-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4225-1/"
},
{
"url": "https://usn.ubuntu.com/4225-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4225-2/"
},
{
"url": "https://usn.ubuntu.com/4227-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4227-1/"
},
{
"url": "https://usn.ubuntu.com/4227-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4227-2/"
},
{
"url": "https://usn.ubuntu.com/4228-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4228-1/"
},
{
"url": "https://usn.ubuntu.com/4228-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4228-2/"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:3548",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:3548"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-14896",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14896"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774875",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1774875"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896",
"refsource": "CONFIRM"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-91f6e7bb71",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-8846a1a5a2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200103-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200103-0001/"
},
{
"refsource": "UBUNTU",
"name": "USN-4228-1",
"url": "https://usn.ubuntu.com/4228-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4227-1",
"url": "https://usn.ubuntu.com/4227-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4226-1",
"url": "https://usn.ubuntu.com/4226-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4225-1",
"url": "https://usn.ubuntu.com/4225-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4228-2",
"url": "https://usn.ubuntu.com/4228-2/"
},
{
"refsource": "UBUNTU",
"name": "USN-4227-2",
"url": "https://usn.ubuntu.com/4227-2/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html",
"url": "http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4225-2",
"url": "https://usn.ubuntu.com/4225-2/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
"url": "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0336",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP."
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank ADLab of Venustech for reporting this issue."
}
],
"impact": {
"cvss": [
[
{
"vectorString": "7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48082",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-48082",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Easyone CRM v5.50.02 was discovered to contain a SQL Injection vulnerability via the text parameter at /Services/Misc.asmx/SearchTag."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/purplededa/EasyoneCRM-5.50.02-SQLinjection",
"refsource": "MISC",
"name": "https://github.com/purplededa/EasyoneCRM-5.50.02-SQLinjection"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48130",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-48130",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Tenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md",
"refsource": "MISC",
"name": "https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md"
}
]
}