"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-09-26 02:00:33 +00:00
parent 5587ec1d0a
commit c79e4b57f7
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
16 changed files with 271 additions and 0 deletions

View File

@ -71,6 +71,11 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"name": "RHSA-2019:2713", "name": "RHSA-2019:2713",
"url": "https://access.redhat.com/errata/RHSA-2019:2713" "url": "https://access.redhat.com/errata/RHSA-2019:2713"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update", "name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html" "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -91,6 +91,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update", "name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html" "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update", "name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html" "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -91,6 +91,11 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"name": "RHSA-2019:2713", "name": "RHSA-2019:2713",
"url": "https://access.redhat.com/errata/RHSA-2019:2713" "url": "https://access.redhat.com/errata/RHSA-2019:2713"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update", "name": "[debian-lts-announce] 20201108 [SECURITY] [DLA 2440-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html" "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -48,6 +48,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1900712", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1900712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900712" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900712"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"name": "DSA-5224", "name": "DSA-5224",
"url": "https://www.debian.org/security/2022/dsa-5224" "url": "https://www.debian.org/security/2022/dsa-5224"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
} }

View File

@ -73,6 +73,11 @@
"name": "https://github.com/redis/redis/security/advisories/GHSA-5gc4-76rx-22c9", "name": "https://github.com/redis/redis/security/advisories/GHSA-5gc4-76rx-22c9",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/redis/redis/security/advisories/GHSA-5gc4-76rx-22c9" "url": "https://github.com/redis/redis/security/advisories/GHSA-5gc4-76rx-22c9"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-de7b3ceca6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7INCOOFPPEAKNDBZU3TIZJPYXBULI2C/"
} }
] ]
}, },

View File

@ -100,6 +100,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2022-51b27699ce", "name": "FEDORA-2022-51b27699ce",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220925 [SECURITY] [DLA 3120-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"
} }
] ]
}, },

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-41347",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource": "MISC",
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
},
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"refsource": "MISC",
"name": "https://wiki.zimbra.com/wiki/Security_Center"
},
{
"url": "https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/",
"refsource": "MISC",
"name": "https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/"
},
{
"url": "https://github.com/darrenmartyn/zimbra-hinginx",
"refsource": "MISC",
"name": "https://github.com/darrenmartyn/zimbra-hinginx"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-41348",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-41349",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-41350",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-41351",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-41352",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource": "MISC",
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
},
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"refsource": "MISC",
"name": "https://wiki.zimbra.com/wiki/Security_Center"
},
{
"url": "https://forums.zimbra.org/viewtopic.php?t=71153&p=306532",
"refsource": "MISC",
"name": "https://forums.zimbra.org/viewtopic.php?t=71153&p=306532"
}
]
}
}