diff --git a/2013/1xxx/CVE-2013-1798.json b/2013/1xxx/CVE-2013-1798.json index 6281b7f9468..eb0c792d5a2 100644 --- a/2013/1xxx/CVE-2013-1798.json +++ b/2013/1xxx/CVE-2013-1798.json @@ -131,6 +131,11 @@ "name": "RHSA-2013:1026", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", + "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" } ] } diff --git a/2019/3xxx/CVE-2019-3016.json b/2019/3xxx/CVE-2019-3016.json index 7055c5f7bf3..a846bff7565 100644 --- a/2019/3xxx/CVE-2019-3016.json +++ b/2019/3xxx/CVE-2019-3016.json @@ -106,6 +106,11 @@ "refsource": "UBUNTU", "name": "USN-4301-1", "url": "https://usn.ubuntu.com/4301-1/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", + "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11767.json b/2020/11xxx/CVE-2020-11767.json new file mode 100644 index 00000000000..2da19219712 --- /dev/null +++ b/2020/11xxx/CVE-2020-11767.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-11767", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the server(s) listening behind *.example.com. The outcome should instead be 421 Misdirected Request. Imagine a shared caching forward proxy re-using an HTTP/2 connection for a large subnet with many users. If a victim is interacting with abc.example.com, and a server (for abc.example.com) recycles the TCP connection to the forward proxy, the victim's browser may suddenly start sending sensitive data to a *.example.com server. This occurs because the forward proxy between the victim and the origin server reuses connections (which obeys the specification), but neither Istio nor Envoy corrects this by sending a 421 error. Similarly, this behavior voids the security model browsers have put in place between domains." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=954160#c5", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=954160#c5" + }, + { + "url": "https://github.com/envoyproxy/envoy/issues/6767", + "refsource": "MISC", + "name": "https://github.com/envoyproxy/envoy/issues/6767" + }, + { + "url": "https://github.com/istio/istio/issues/9429", + "refsource": "MISC", + "name": "https://github.com/istio/istio/issues/9429" + }, + { + "url": "https://github.com/istio/istio/issues/13589", + "refsource": "MISC", + "name": "https://github.com/istio/istio/issues/13589" + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8428.json b/2020/8xxx/CVE-2020-8428.json index 7158f40f360..a9f2766c59d 100644 --- a/2020/8xxx/CVE-2020-8428.json +++ b/2020/8xxx/CVE-2020-8428.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4318-1", "url": "https://usn.ubuntu.com/4318-1/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", + "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" } ] },