Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-25637 (GCVE-0-2020-25637)
Vulnerability from cvelistv5 – Published: 2020-10-06 00:00 – Updated: 2024-08-04 15:40| URL | Tags |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1881037 | |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisory |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisory |
| https://security.gentoo.org/glsa/202210-06 | vendor-advisory |
| https://lists.debian.org/debian-lts-announce/2024… | mailing-list |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:40:35.483Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"name": "openSUSE-SU-2020:1778",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"name": "openSUSE-SU-2020:1777",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"name": "GLSA-202210-06",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202210-06"
},
{
"name": "[debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "libvirt",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "libvirt versions before 6.8.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-415",
"description": "CWE-415",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-01T13:06:08.401Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"name": "openSUSE-SU-2020:1778",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"name": "openSUSE-SU-2020:1777",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"name": "GLSA-202210-06",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202210-06"
},
{
"name": "[debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2020-25637",
"datePublished": "2020-10-06T00:00:00.000Z",
"dateReserved": "2020-09-16T00:00:00.000Z",
"dateUpdated": "2024-08-04T15:40:35.483Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-25637",
"date": "2026-05-19",
"epss": "0.00123",
"percentile": "0.3085"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.8.0\", \"matchCriteriaId\": \"56B3552B-7C49-46EA-9B46-E85EF006CD97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 que ocurr\\u00eda un problema de doble liberaci\\u00f3n de la memoria en la API de libvirt, en versiones anteriores a 6.8.0, responsable de pedir informaci\\u00f3n sobre unas interfaces de red de un dominio QEMU en ejecuci\\u00f3n.\u0026#xa0;Este fallo afecta al controlador de control de acceso polkit.\u0026#xa0;Espec\\u00edficamente, unos clientes que se conectan al socket de lectura y escritura con permisos limitados de ACL podr\\u00edan usar este fallo para bloquear el demonio libvirt, resultando en una denegaci\\u00f3n de servicio o potencialmente escalar sus privilegios sobre el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\\u00ed como la disponibilidad del sistema\"}]",
"id": "CVE-2020-25637",
"lastModified": "2024-11-21T05:18:18.163",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-10-06T14:15:12.527",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1881037\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202210-06\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1881037\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202210-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-415\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-415\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-25637\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-10-06T14:15:12.527\",\"lastModified\":\"2024-11-21T05:18:18.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 que ocurr\u00eda un problema de doble liberaci\u00f3n de la memoria en la API de libvirt, en versiones anteriores a 6.8.0, responsable de pedir informaci\u00f3n sobre unas interfaces de red de un dominio QEMU en ejecuci\u00f3n.\u0026#xa0;Este fallo afecta al controlador de control de acceso polkit.\u0026#xa0;Espec\u00edficamente, unos clientes que se conectan al socket de lectura y escritura con permisos limitados de ACL podr\u00edan usar este fallo para bloquear el demonio libvirt, resultando en una denegaci\u00f3n de servicio o potencialmente escalar sus privilegios sobre el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\u00ed como la disponibilidad del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.8.0\",\"matchCriteriaId\":\"56B3552B-7C49-46EA-9B46-E85EF006CD97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1881037\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/202210-06\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1881037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202210-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
alsa-2021:1762
Vulnerability from osv_almalinux
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
-
libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
-
QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
-
QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
-
QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
-
QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
-
QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
-
QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
-
QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
-
QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-winsupport"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.2-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-winsupport"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-2.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-2.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-2.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdfuse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdfuse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-bash-completion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-basic-filters"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-basic-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-curl-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-example-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-gzip-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-linuxdisk-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-python-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-ssh-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-vddk-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-xz-filter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.2-4.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libguestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.40.2-27.module_el8.4.0+2358+630e803b.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libguestfs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.40.2-27.module_el8.4.0+2358+630e803b.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Sys-Virt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.0-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Sys-Virt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.0-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libvirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.0-1.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libvirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.0-1.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ruby-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-20.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seabios"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.0-2.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.0-2.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seavgabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.0-2.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "supermin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.1.19-10.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "supermin-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.1.19-10.module_el8.5.0+2608+72063365"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.\n\nSecurity Fix(es):\n\n* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)\n\n* QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)\n\n* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)\n\n* QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)\n\n* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)\n\n* QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)\n\n* QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)\n\n* QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)\n\n* QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2021:1762",
"modified": "2021-12-23T15:15:25Z",
"published": "2021-05-18T06:02:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2021-1762.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-11947"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-16092"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-25637"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-25707"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-25723"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-27821"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-28916"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-29129"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-29130"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-29443"
}
],
"related": [
"CVE-2020-25637",
"CVE-2020-27821",
"CVE-2020-29443",
"CVE-2020-11947",
"CVE-2020-16092",
"CVE-2020-25707",
"CVE-2020-25723",
"CVE-2020-28916",
"CVE-2020-29129",
"CVE-2020-29130"
],
"summary": "Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update"
}
BDU:2021-03736
Vulnerability from fstec - Published: 01.10.2020{
"CVSS 2.0": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (Astra Linux Common Edition), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), \u0434\u043e 6.8.0 (libvirt), 7.3 (\u0420\u0415\u0414 \u041e\u0421), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Libvirt:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://bugzilla.redhat.com/show_bug.cgi?id=1881037\n\n\u0414\u043b\u044f Debian:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2020-25637\n\n\u0414\u043b\u044f Astra Linux:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=47416144\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f libvirt \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.0.0-4+deb9u5\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.10.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.07.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03736",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-25637",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), libvirt, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0435\u043c\u043e\u043d\u0430 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 Libvirt, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 (CWE-415)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0435\u043c\u043e\u043d\u0430 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 Libvirt \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-25637\nhttps://security-tracker.debian.org/tracker/CVE-2020-25637\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=47416144\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-415",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,7)"
}
FKIE_CVE-2020-25637
Vulnerability from fkie_nvd - Published: 2020-10-06 14:15 - Updated: 2024-11-21 05:18| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1881037 | Issue Tracking, Patch, Vendor Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html | ||
| secalert@redhat.com | https://security.gentoo.org/glsa/202210-06 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1881037 | Issue Tracking, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-06 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56B3552B-7C49-46EA-9B46-E85EF006CD97",
"versionEndExcluding": "6.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 que ocurr\u00eda un problema de doble liberaci\u00f3n de la memoria en la API de libvirt, en versiones anteriores a 6.8.0, responsable de pedir informaci\u00f3n sobre unas interfaces de red de un dominio QEMU en ejecuci\u00f3n.\u0026#xa0;Este fallo afecta al controlador de control de acceso polkit.\u0026#xa0;Espec\u00edficamente, unos clientes que se conectan al socket de lectura y escritura con permisos limitados de ACL podr\u00edan usar este fallo para bloquear el demonio libvirt, resultando en una denegaci\u00f3n de servicio o potencialmente escalar sus privilegios sobre el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\u00ed como la disponibilidad del sistema"
}
],
"id": "CVE-2020-25637",
"lastModified": "2024-11-21T05:18:18.163",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.527",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-06"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
GHSA-2QF3-2MV6-PGGH
Vulnerability from github – Published: 2022-05-24 17:30 – Updated: 2024-04-01 15:30A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{
"affected": [],
"aliases": [
"CVE-2020-25637"
],
"database_specific": {
"cwe_ids": [
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-10-06T14:15:00Z",
"severity": "HIGH"
},
"details": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"id": "GHSA-2qf3-2mv6-pggh",
"modified": "2024-04-01T15:30:27Z",
"published": "2022-05-24T17:30:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25637"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202210-06"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2020-25637
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-25637",
"description": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"id": "GSD-2020-25637",
"references": [
"https://www.suse.com/security/cve/CVE-2020-25637.html",
"https://access.redhat.com/errata/RHSA-2021:1762",
"https://access.redhat.com/errata/RHSA-2020:5111",
"https://access.redhat.com/errata/RHSA-2020:5040",
"https://advisories.mageia.org/CVE-2020-25637.html",
"https://security.archlinux.org/CVE-2020-25637",
"https://linux.oracle.com/cve/CVE-2020-25637.html",
"https://ubuntu.com/security/CVE-2020-25637"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-25637"
],
"details": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"id": "GSD-2020-25637",
"modified": "2023-12-13T01:21:57.245729Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-25637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libvirt",
"version": {
"version_data": [
{
"version_value": "libvirt versions before 6.8.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-415"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"name": "openSUSE-SU-2020:1778",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"name": "openSUSE-SU-2020:1777",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"name": "GLSA-202210-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202210-06"
},
{
"name": "[debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56B3552B-7C49-46EA-9B46-E85EF006CD97",
"versionEndExcluding": "6.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 que ocurr\u00eda un problema de doble liberaci\u00f3n de la memoria en la API de libvirt, en versiones anteriores a 6.8.0, responsable de pedir informaci\u00f3n sobre unas interfaces de red de un dominio QEMU en ejecuci\u00f3n.\u0026#xa0;Este fallo afecta al controlador de control de acceso polkit.\u0026#xa0;Espec\u00edficamente, unos clientes que se conectan al socket de lectura y escritura con permisos limitados de ACL podr\u00edan usar este fallo para bloquear el demonio libvirt, resultando en una denegaci\u00f3n de servicio o potencialmente escalar sus privilegios sobre el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\u00ed como la disponibilidad del sistema"
}
],
"id": "CVE-2020-25637",
"lastModified": "2024-04-01T13:16:37.240",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.527",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-06"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
}
}
}
MSRC_CVE-2020-25637
Vulnerability from csaf_microsoft - Published: 2020-10-02 00:00 - Updated: 2021-12-16 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 19159-16820 | — | ||
| Unresolved product id: 19160-17086 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2020/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2020/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2020-25637 A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-25637.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T18:10:07.400Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2020-25637",
"initial_release_date": "2020-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-10-09T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added libvirt to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 libvirt 6.1.0-2",
"product": {
"name": "\u003ccm1 libvirt 6.1.0-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 libvirt 6.1.0-2",
"product": {
"name": "cm1 libvirt 6.1.0-2",
"product_id": "19159"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libvirt 6.1.0-4",
"product": {
"name": "\u003ccbl2 libvirt 6.1.0-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libvirt 6.1.0-4",
"product": {
"name": "cbl2 libvirt 6.1.0-4",
"product_id": "19160"
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 libvirt 6.1.0-2 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 libvirt 6.1.0-2 as a component of CBL Mariner 1.0",
"product_id": "19159-16820"
},
"product_reference": "19159",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libvirt 6.1.0-4 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libvirt 6.1.0-4 as a component of CBL Mariner 2.0",
"product_id": "19160-17086"
},
"product_reference": "19160",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25637",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19159-16820",
"19160-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-25637 A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-25637.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-09T00:00:00.000Z",
"details": "6.1.0-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2020-10-09T00:00:00.000Z",
"details": "6.1.0-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 6.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
}
]
}
OPENSUSE-SU-2020:1777-1
Vulnerability from csaf_opensuse - Published: 2020-10-30 17:23 - Updated: 2020-10-30 17:23| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1173157 | self |
| https://bugzilla.suse.com/1174139 | self |
| https://bugzilla.suse.com/1174955 | self |
| https://bugzilla.suse.com/1175465 | self |
| https://bugzilla.suse.com/1176430 | self |
| https://bugzilla.suse.com/1177155 | self |
| https://www.suse.com/security/cve/CVE-2020-15708/ | self |
| https://www.suse.com/security/cve/CVE-2020-25637/ | self |
| https://www.suse.com/security/cve/CVE-2020-15708 | external |
| https://bugzilla.suse.com/1174955 | external |
| https://www.suse.com/security/cve/CVE-2020-25637 | external |
| https://bugzilla.suse.com/1174955 | external |
| https://bugzilla.suse.com/1177155 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\n- CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).\n- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).\n- qemu: Avoid stale capabilities cache host CPU or kernel command line changes (bsc#1173157).\n- virdevmapper: Handle kernel without device-mapper support (bsc#1175465).\n- Xen: Added support for passing arbitrary commands to the qemu device model, similar to the xl.cfg(5) device_model_args setting (bsc#1174139).\n- Xen: Don\u0027t add dom0 twice on driver reload (bsc#1176430).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1777",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1777-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1777-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OCPTCY4NDHTGHFZWIAO6KHGTLUQSXQ5/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1777-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OCPTCY4NDHTGHFZWIAO6KHGTLUQSXQ5/"
},
{
"category": "self",
"summary": "SUSE Bug 1173157",
"url": "https://bugzilla.suse.com/1173157"
},
{
"category": "self",
"summary": "SUSE Bug 1174139",
"url": "https://bugzilla.suse.com/1174139"
},
{
"category": "self",
"summary": "SUSE Bug 1174955",
"url": "https://bugzilla.suse.com/1174955"
},
{
"category": "self",
"summary": "SUSE Bug 1175465",
"url": "https://bugzilla.suse.com/1175465"
},
{
"category": "self",
"summary": "SUSE Bug 1176430",
"url": "https://bugzilla.suse.com/1176430"
},
{
"category": "self",
"summary": "SUSE Bug 1177155",
"url": "https://bugzilla.suse.com/1177155"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15708 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25637 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25637/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2020-10-30T17:23:30Z",
"generator": {
"date": "2020-10-30T17:23:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1777-1",
"initial_release_date": "2020-10-30T17:23:30Z",
"revision_history": [
{
"date": "2020-10-30T17:23:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-admin-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-admin-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-admin-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-client-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-client-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-client-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-devel-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-devel-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-devel-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-libs-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-libs-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-libs-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "libvirt-nss-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "libvirt-nss-6.0.0-lp152.9.6.2.i586",
"product_id": "libvirt-nss-6.0.0-lp152.9.6.2.i586"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"product": {
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"product_id": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"product": {
"name": "libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"product_id": "libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"product": {
"name": "libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"product_id": "libvirt-doc-6.0.0-lp152.9.6.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-admin-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-client-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-devel-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-libs-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"product_id": "libvirt-nss-6.0.0-lp152.9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64",
"product": {
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64",
"product_id": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-admin-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch"
},
"product_reference": "libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-client-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-devel-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-6.0.0-lp152.9.6.2.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch"
},
"product_reference": "libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-libs-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "libvirt-nss-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586"
},
"product_reference": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
},
"product_reference": "wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15708"
}
],
"notes": [
{
"category": "general",
"text": "Ubuntu\u0027s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15708",
"url": "https://www.suse.com/security/cve/CVE-2020-15708"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-15708",
"url": "https://bugzilla.suse.com/1174955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-30T17:23:30Z",
"details": "important"
}
],
"title": "CVE-2020-15708"
},
{
"cve": "CVE-2020-25637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25637"
}
],
"notes": [
{
"category": "general",
"text": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25637",
"url": "https://www.suse.com/security/cve/CVE-2020-25637"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1174955"
},
{
"category": "external",
"summary": "SUSE Bug 1177155 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1177155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-admin-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-bash-completion-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-client-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-network-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-hooks-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-lxc-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-daemon-qemu-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-daemon-xen-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-32bit-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-devel-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-doc-6.0.0-lp152.9.6.2.noarch",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-libs-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-lock-sanlock-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:libvirt-nss-6.0.0-lp152.9.6.2.x86_64",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.i586",
"openSUSE Leap 15.2:wireshark-plugin-libvirt-6.0.0-lp152.9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-30T17:23:30Z",
"details": "important"
}
],
"title": "CVE-2020-25637"
}
]
}
OPENSUSE-SU-2020:1778-1
Vulnerability from csaf_opensuse - Published: 2020-10-30 17:23 - Updated: 2020-10-30 17:23| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1174955 | self |
| https://bugzilla.suse.com/1175465 | self |
| https://bugzilla.suse.com/1175574 | self |
| https://bugzilla.suse.com/1176430 | self |
| https://bugzilla.suse.com/1177155 | self |
| https://bugzilla.suse.com/1177480 | self |
| https://www.suse.com/security/cve/CVE-2020-15708/ | self |
| https://www.suse.com/security/cve/CVE-2020-25637/ | self |
| https://www.suse.com/security/cve/CVE-2020-15708 | external |
| https://bugzilla.suse.com/1174955 | external |
| https://www.suse.com/security/cve/CVE-2020-25637 | external |
| https://bugzilla.suse.com/1174955 | external |
| https://bugzilla.suse.com/1177155 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\t \n- CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).\n- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).\n- qemu: Adjust max memlock on mdev hotplug (bsc#1177480).\n- Xen: Don\u0027t add dom0 twice on driver reload (bsc#1176430).\n- virdevmapper: Handle kernel without device-mapper support (bsc#1175465).\n- Fixed an issue where building was failing (bsc#1175574).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1778",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1778-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1778-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJK5HZ5F2H34L3UWADRCLKFCCF5KDLVY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1778-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJK5HZ5F2H34L3UWADRCLKFCCF5KDLVY/"
},
{
"category": "self",
"summary": "SUSE Bug 1174955",
"url": "https://bugzilla.suse.com/1174955"
},
{
"category": "self",
"summary": "SUSE Bug 1175465",
"url": "https://bugzilla.suse.com/1175465"
},
{
"category": "self",
"summary": "SUSE Bug 1175574",
"url": "https://bugzilla.suse.com/1175574"
},
{
"category": "self",
"summary": "SUSE Bug 1176430",
"url": "https://bugzilla.suse.com/1176430"
},
{
"category": "self",
"summary": "SUSE Bug 1177155",
"url": "https://bugzilla.suse.com/1177155"
},
{
"category": "self",
"summary": "SUSE Bug 1177480",
"url": "https://bugzilla.suse.com/1177480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15708 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25637 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25637/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2020-10-30T17:23:42Z",
"generator": {
"date": "2020-10-30T17:23:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1778-1",
"initial_release_date": "2020-10-30T17:23:42Z",
"revision_history": [
{
"date": "2020-10-30T17:23:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"product": {
"name": "libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"product_id": "libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch"
}
},
{
"category": "product_version",
"name": "libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"product": {
"name": "libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"product_id": "libvirt-doc-5.1.0-lp151.7.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-admin-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-client-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-devel-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-libs-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"product_id": "libvirt-nss-5.1.0-lp151.7.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64",
"product": {
"name": "wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64",
"product_id": "wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch"
},
"product_reference": "libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-5.1.0-lp151.7.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch"
},
"product_reference": "libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
},
"product_reference": "wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15708"
}
],
"notes": [
{
"category": "general",
"text": "Ubuntu\u0027s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15708",
"url": "https://www.suse.com/security/cve/CVE-2020-15708"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-15708",
"url": "https://bugzilla.suse.com/1174955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-30T17:23:42Z",
"details": "important"
}
],
"title": "CVE-2020-15708"
},
{
"cve": "CVE-2020-25637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25637"
}
],
"notes": [
{
"category": "general",
"text": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25637",
"url": "https://www.suse.com/security/cve/CVE-2020-25637"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1174955"
},
{
"category": "external",
"summary": "SUSE Bug 1177155 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1177155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirt-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-admin-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-bash-completion-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-client-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-network-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-hooks-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-lxc-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-qemu-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-daemon-xen-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-devel-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-doc-5.1.0-lp151.7.10.1.noarch",
"openSUSE Leap 15.1:libvirt-libs-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-lock-sanlock-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:libvirt-nss-5.1.0-lp151.7.10.1.x86_64",
"openSUSE Leap 15.1:wireshark-plugin-libvirt-5.1.0-lp151.7.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-30T17:23:42Z",
"details": "important"
}
],
"title": "CVE-2020-25637"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.