2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2019-6974" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2019-02-15T15:29:00.250" ,
2024-11-23 11:10:51 +00:00
"lastModified" : "2024-11-21T04:47:20.457" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free."
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux en versiones anteriores a la 4.20.8, kvm_ioctl_create_device en virt/kvm/kvm_main.c gestiona de manera incorrecta el conteo de referencias debido a una condici\u00f3n de carrera, lo que conduce a un uso de memoria previamente liberada."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 11:10:51 +00:00
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 11:10:51 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-11-23 11:10:51 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 11:10:51 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-362"
} ,
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2023-05-16 14:00:28 +02:00
"versionStartIncluding" : "3.10" ,
"versionEndExcluding" : "3.16.64" ,
"matchCriteriaId" : "93BC7269-F57C-4804-9143-0C81DAE4E50E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.17" ,
"versionEndExcluding" : "3.18.136" ,
"matchCriteriaId" : "63E05151-6508-41BE-89E8-7D43ACC0DBCD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.19" ,
"versionEndExcluding" : "4.4.176" ,
"matchCriteriaId" : "C6769A3C-ABE7-412B-B0BA-A5D9CC063683"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.5" ,
"versionEndExcluding" : "4.9.156" ,
"matchCriteriaId" : "A293D608-B6FE-4E0A-92C4-FE04DD5D3FB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.10" ,
"versionEndExcluding" : "4.14.99" ,
"matchCriteriaId" : "F48AF79A-FA29-4687-B78E-4EABA7F5223B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.15" ,
"versionEndExcluding" : "4.19.21" ,
"matchCriteriaId" : "17817ACA-7271-47C1-B371-DA15D00516EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
2023-04-24 12:24:31 +02:00
"versionEndExcluding" : "4.20.8" ,
2023-05-16 14:00:28 +02:00
"matchCriteriaId" : "D24491DB-D4DD-4719-B553-28E8508833A4"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "8D305F7A-D159-4716-AB26-5E38BB5CD991"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "B5A6F2F3-4894-4392-8296-3B8DD2679084"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07C312A0-CD2C-4B9C-B064-6409B25C278F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "1331467F-B278-485E-AD91-7D0643C2F3DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "BEBAD7C4-AC37-463F-B63C-6EAD5542F2A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "FC5CA1E2-341C-42A9-88AC-E6C83DED0B9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "E866C4E5-D739-4352-9B6D-9753B4C78A24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "720A06E3-441B-4D51-8FC0-D569DD7FEB10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "16EBA08B-8FBD-47BE-A5BE-F5145788E8CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "42D16634-442B-4674-B11E-6748D28764BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "713EB3E7-A657-4F6A-901D-618AF660CBBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "9228FA0A-8745-4731-A214-5A8AC0AA902A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "1D91EC11-DD9A-434B-9EB4-14AA0E977D8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "D2833083-97E9-4B3C-8E6B-BCAC1851D148"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "8BC7ABB7-2FA9-42CA-9BEF-241A91F317FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "E697E4FD-1882-4BF8-9B9F-FB7DFD19497B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "6434ED4F-0BA2-445A-B6E9-D3E301EE3930"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "E08E3F72-4CEF-4607-8B27-515E6471B9D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "96AA67E0-3471-4699-87A7-E47DD8E313B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "B439DE9D-6A09-4487-82A4-E75A57717CAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "EEA3324A-4661-4CCF-9E40-DD50162542A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "6114B091-1612-4EA2-81D4-2E5455A345F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "1117B40B-36E7-4205-82B0-52B4862A6D03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "F14F10D9-4F2D-4C6D-8B0C-9775ED35DFEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "36F60067-2623-42F9-8B4F-C24F3268DDB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "717C0443-3E88-4814-8D4A-F0C067176228"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "14CEF743-6C3B-4D90-99BF-6A27B37ADAEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "68E2840B-96F4-4437-91D1-4AFE99E54D6A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "09C950E6-BF12-43D4-9125-AD9D90EDD67A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "542EB351-79B1-4A9D-A5A1-2F3E0E88963C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "B83479FA-82FB-4F71-9B98-E683745DB49E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "D17CC587-3325-4D95-BE63-B948C63B411D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "895E610D-52F6-45CA-B205-D110A1DC6BEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "15F4D416-10F4-4C08-A25D-0795F7FE0FBE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "9AD3B4BB-7F5C-4565-9345-2D4895630AAD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "4B114C6C-E950-4B75-B341-022799ABBACF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndIncluding" : "13.1.1" ,
"matchCriteriaId" : "D6944128-3A30-4835-A125-3EA7571D7DC0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndIncluding" : "14.1.0" ,
"matchCriteriaId" : "83B684D2-5889-41EA-B54A-8E7AF43DA647"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.1.0" ,
"matchCriteriaId" : "57FD7F09-9829-42B0-913E-A43129AD758B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F87326E-0B56-4356-A889-73D026DB1D4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D99A687E-EAE6-417E-A88E-D0082BC194CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B353CE99-D57C-465B-AAB0-73EF581127D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF77CDCF-B9C9-427D-B2BF-36650FB2148C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5F7E11E-FB34-4467-8919-2B6BEAABF665"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
2024-11-23 11:10:51 +00:00
"Patch" ,
"Vendor Advisory"
2023-04-24 12:24:31 +02:00
]
} ,
{
"url" : "http://www.securityfocus.com/bid/107127" ,
"source" : "cve@mitre.org" ,
"tags" : [
2023-05-16 14:00:28 +02:00
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
2023-04-24 12:24:31 +02:00
]
} ,
{
"url" : "https://access.redhat.com/errata/RHBA-2019:0959" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:0818" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:0833" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2809" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:3967" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2020:0103" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1765" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://support.f5.com/csp/article/K11186236" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSS" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3930-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3930-2/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3931-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3931-2/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3932-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3932-2/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3933-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3933-2/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/46388/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
2024-11-23 11:10:51 +00:00
} ,
{
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/107127" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHBA-2019:0959" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:0818" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:0833" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2809" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:3967" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2020:0103" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1765" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://support.f5.com/csp/article/K11186236" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSS" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/3930-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3930-2/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3931-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3931-2/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3932-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3932-2/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3933-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3933-2/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/46388/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
}
]
}