Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-14378 (GCVE-0-2019-14378)
Vulnerability from cvelistv5 – Published: 2019-07-29 10:05 – Updated: 2024-08-05 00:19- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T00:19:40.277Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"name": "[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"name": "FEDORA-2019-77bafc4454",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"name": "20190825 [SECURITY] [DSA 4506-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"name": "DSA-4506",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"name": "openSUSE-SU-2019:2041",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"name": "DSA-4512",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"name": "20190902 [SECURITY] [DSA 4512-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"name": "openSUSE-SU-2019:2059",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"name": "[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"name": "RHSA-2019:3179",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"name": "RHSA-2019:3403",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"name": "RHSA-2019:3494",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"name": "RHSA-2019:3742",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"name": "RHSA-2019:3787",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"name": "USN-4191-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"name": "openSUSE-SU-2019:2510",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"name": "USN-4191-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"name": "RHSA-2019:3968",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"name": "RHSA-2019:4344",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"name": "RHSA-2020:0366",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"name": "RHSA-2020:0775",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-11T11:06:29.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"name": "[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"name": "FEDORA-2019-77bafc4454",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"name": "20190825 [SECURITY] [DSA 4506-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"name": "DSA-4506",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"name": "openSUSE-SU-2019:2041",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"name": "DSA-4512",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"name": "20190902 [SECURITY] [DSA 4512-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"name": "openSUSE-SU-2019:2059",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"name": "[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"name": "RHSA-2019:3179",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"name": "RHSA-2019:3403",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"name": "RHSA-2019:3494",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"name": "RHSA-2019:3742",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"name": "RHSA-2019:3787",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"name": "USN-4191-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"name": "openSUSE-SU-2019:2510",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"name": "USN-4191-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"name": "RHSA-2019:3968",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"name": "RHSA-2019:4344",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"name": "RHSA-2020:0366",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"name": "RHSA-2020:0775",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"name": "[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"name": "FEDORA-2019-77bafc4454",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"name": "20190825 [SECURITY] [DSA 4506-1] qemu security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"name": "DSA-4506",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"name": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/",
"refsource": "MISC",
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"name": "https://news.ycombinator.com/item?id=20799010",
"refsource": "MISC",
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"name": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"name": "openSUSE-SU-2019:2041",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"name": "DSA-4512",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"name": "20190902 [SECURITY] [DSA 4512-1] qemu security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"name": "openSUSE-SU-2019:2059",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"name": "[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "RHSA-2019:3179",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"name": "RHSA-2019:3403",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"name": "RHSA-2019:3494",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"name": "RHSA-2019:3742",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"name": "RHSA-2019:3787",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"name": "USN-4191-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"name": "openSUSE-SU-2019:2510",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"name": "USN-4191-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"name": "RHSA-2019:3968",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"name": "RHSA-2019:4344",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"name": "RHSA-2020:0366",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"name": "RHSA-2020:0775",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-14378",
"datePublished": "2019-07-29T10:05:22.000Z",
"dateReserved": "2019-07-29T00:00:00.000Z",
"dateUpdated": "2024-08-05T00:19:40.277Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-14378",
"date": "2026-05-20",
"epss": "0.06468",
"percentile": "0.91183"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libslirp_project:libslirp:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E90373CB-B4F2-4811-AFF1-0EAF7D2DDB2E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n ip_reass en el archivo ip_input.c en libslirp versi\\u00f3n 4.0.0, presenta un desbordamiento de b\\u00fafer en la regi\\u00f3n heap de la memoria por medio de un paquete largo debido a que maneja inapropiadamente un caso que involucra el primer fragmento.\"}]",
"id": "CVE-2019-14378",
"lastModified": "2024-11-21T04:26:37.327",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-07-29T11:15:11.577",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/08/01/2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3179\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3403\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3494\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3742\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3787\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3968\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:4344\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0366\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0775\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://news.ycombinator.com/item?id=20799010\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Aug/41\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/3\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.f5.com/csp/article/K25423748\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://usn.ubuntu.com/4191-1/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://usn.ubuntu.com/4191-2/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4506\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4512\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/08/01/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3179\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3403\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3494\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3742\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3787\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3968\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:4344\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0775\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://news.ycombinator.com/item?id=20799010\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Aug/41\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.f5.com/csp/article/K25423748\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/4191-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/4191-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4506\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4512\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-755\"}, {\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-14378\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-29T11:15:11.577\",\"lastModified\":\"2024-11-21T04:26:37.327\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ip_reass en el archivo ip_input.c en libslirp versi\u00f3n 4.0.0, presenta un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria por medio de un paquete largo debido a que maneja inapropiadamente un caso que involucra el primer fragmento.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libslirp_project:libslirp:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E90373CB-B4F2-4811-AFF1-0EAF7D2DDB2E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/01/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3179\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3403\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3494\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3742\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3787\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3968\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4344\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0366\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0775\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://news.ycombinator.com/item?id=20799010\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/41\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/3\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/csp/article/K25423748\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4191-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4191-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4506\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4512\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/01/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3968\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://news.ycombinator.com/item?id=20799010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/csp/article/K25423748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4191-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4191-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
alsa-2019:3403
Vulnerability from osv_almalinux
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
-
QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
-
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2019:3403",
"modified": "2019-11-05T17:41:43Z",
"published": "2019-11-05T17:41:57Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2019-3403.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-10214"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-14378"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-9946"
}
],
"related": [
"CVE-2019-14378",
"CVE-2019-10214"
],
"summary": "Important: container-tools:rhel8 security, bug fix, and enhancement update"
}
alsa-2019:3494
Vulnerability from osv_almalinux
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
-
QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
-
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fuse-overlayfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3-5.module_el8.3.0+2044+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fuse-overlayfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3-5.module_el8.4.0+2496+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fuse-overlayfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3-5.module_el8.5.0+119+9a9ec082"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-systemd-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-umount"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2019:3494",
"modified": "2019-11-05T17:52:00Z",
"published": "2019-11-05T17:52:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2019-3494.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-10214"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-14378"
}
],
"related": [
"CVE-2019-14378",
"CVE-2019-10214"
],
"summary": "Important: container-tools:1.0 security and bug fix update"
}
BDU:2019-03648
Vulnerability from fstec - Published: 28.07.2019{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Fedora Project, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 30 (Fedora), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), \u0434\u043e 4.0.0 (Libslirp), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f libslirp:\nhttps://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\n\n\u0414\u043b\u044f Debian:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 libslirp) \u0434\u043e 1:2.1+dfsg-12+deb8u12 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f qemu \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:2.8+dfsg.repack-6+deb9u16.osnova1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.07.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.10.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03648",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-14378",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Fedora, Libslirp, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Fedora Project Fedora 30 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ip_reass \u0438\u0437 ip_input.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 TCP-IP \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430 Libslirp, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ip_reass \u0438\u0437 ip_input.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 TCP-IP \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430 Libslirp \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0435 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2019-14378\nhttps://security-tracker.debian.org/tracker/CVE-2019-14378\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/\nhttps://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=57444186\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2019-14378
Vulnerability from fkie_nvd - Published: 2019-07-29 11:15 - Updated: 2024-11-21 04:26| Vendor | Product | Version | |
|---|---|---|---|
| libslirp_project | libslirp | 4.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libslirp_project:libslirp:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E90373CB-B4F2-4811-AFF1-0EAF7D2DDB2E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment."
},
{
"lang": "es",
"value": "La funci\u00f3n ip_reass en el archivo ip_input.c en libslirp versi\u00f3n 4.0.0, presenta un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria por medio de un paquete largo debido a que maneja inapropiadamente un caso que involucra el primer fragmento."
}
],
"id": "CVE-2019-14378",
"lastModified": "2024-11-21T04:26:37.327",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-07-29T11:15:11.577",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
},
{
"source": "cve@mitre.org",
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"source": "cve@mitre.org",
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"source": "cve@mitre.org",
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"source": "cve@mitre.org",
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"source": "cve@mitre.org",
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"source": "cve@mitre.org",
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"source": "cve@mitre.org",
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"source": "cve@mitre.org",
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2019/dsa-4512"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QVQC-H5C8-H785
Vulnerability from github – Published: 2022-05-24 16:51 – Updated: 2022-05-24 16:51ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
{
"affected": [],
"aliases": [
"CVE-2019-14378"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-07-29T11:15:00Z",
"severity": "HIGH"
},
"details": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"id": "GHSA-qvqc-h5c8-h785",
"modified": "2022-05-24T16:51:39Z",
"published": "2022-05-24T16:51:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14378"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4191-2"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4191-1"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"type": "WEB",
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"type": "WEB",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"type": "WEB",
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2019-14378
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-14378",
"description": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"id": "GSD-2019-14378",
"references": [
"https://www.suse.com/security/cve/CVE-2019-14378.html",
"https://www.debian.org/security/2019/dsa-4512",
"https://www.debian.org/security/2019/dsa-4506",
"https://access.redhat.com/errata/RHSA-2020:2342",
"https://access.redhat.com/errata/RHSA-2020:2126",
"https://access.redhat.com/errata/RHSA-2020:2065",
"https://access.redhat.com/errata/RHSA-2020:1216",
"https://access.redhat.com/errata/RHSA-2020:0889",
"https://access.redhat.com/errata/RHSA-2020:0775",
"https://access.redhat.com/errata/RHSA-2020:0366",
"https://access.redhat.com/errata/RHSA-2019:4344",
"https://access.redhat.com/errata/RHSA-2019:3968",
"https://access.redhat.com/errata/RHSA-2019:3787",
"https://access.redhat.com/errata/RHSA-2019:3742",
"https://access.redhat.com/errata/RHBA-2019:3723",
"https://access.redhat.com/errata/RHSA-2019:3494",
"https://access.redhat.com/errata/RHSA-2019:3403",
"https://access.redhat.com/errata/RHSA-2019:3179",
"https://ubuntu.com/security/CVE-2019-14378",
"https://alas.aws.amazon.com/cve/html/CVE-2019-14378.html",
"https://linux.oracle.com/cve/CVE-2019-14378.html",
"https://packetstormsecurity.com/files/cve/CVE-2019-14378"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-14378"
],
"details": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"id": "GSD-2019-14378",
"modified": "2023-12-13T01:23:52.397976Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"name": "[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"name": "FEDORA-2019-77bafc4454",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"name": "20190825 [SECURITY] [DSA 4506-1] qemu security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"name": "DSA-4506",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"name": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/",
"refsource": "MISC",
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"name": "https://news.ycombinator.com/item?id=20799010",
"refsource": "MISC",
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"name": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"name": "openSUSE-SU-2019:2041",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"name": "DSA-4512",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"name": "20190902 [SECURITY] [DSA 4512-1] qemu security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"name": "openSUSE-SU-2019:2059",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"name": "[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "RHSA-2019:3179",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"name": "RHSA-2019:3403",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"name": "RHSA-2019:3494",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"name": "RHSA-2019:3742",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"name": "RHSA-2019:3787",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"name": "USN-4191-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"name": "openSUSE-SU-2019:2510",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"name": "USN-4191-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"name": "RHSA-2019:3968",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"name": "RHSA-2019:4344",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"name": "RHSA-2020:0366",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"name": "RHSA-2020:0775",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libslirp_project:libslirp:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14378"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210"
},
{
"name": "[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/01/2"
},
{
"name": "FEDORA-2019-77bafc4454",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/"
},
{
"name": "20190825 [SECURITY] [DSA 4506-1] qemu security update",
"refsource": "BUGTRAQ",
"tags": [],
"url": "https://seclists.org/bugtraq/2019/Aug/41"
},
{
"name": "DSA-4506",
"refsource": "DEBIAN",
"tags": [],
"url": "https://www.debian.org/security/2019/dsa-4506"
},
{
"name": "https://news.ycombinator.com/item?id=20799010",
"refsource": "MISC",
"tags": [],
"url": "https://news.ycombinator.com/item?id=20799010"
},
{
"name": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/",
"refsource": "MISC",
"tags": [],
"url": "https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/"
},
{
"name": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html"
},
{
"name": "openSUSE-SU-2019:2041",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html"
},
{
"name": "DSA-4512",
"refsource": "DEBIAN",
"tags": [],
"url": "https://www.debian.org/security/2019/dsa-4512"
},
{
"name": "20190902 [SECURITY] [DSA 4512-1] qemu security update",
"refsource": "BUGTRAQ",
"tags": [],
"url": "https://seclists.org/bugtraq/2019/Sep/3"
},
{
"name": "openSUSE-SU-2019:2059",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.f5.com/csp/article/K25423748"
},
{
"name": "[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html"
},
{
"name": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.f5.com/csp/article/K25423748?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "RHSA-2019:3179",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3179"
},
{
"name": "RHSA-2019:3403",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3403"
},
{
"name": "RHSA-2019:3494",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3494"
},
{
"name": "RHSA-2019:3742",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3742"
},
{
"name": "RHSA-2019:3787",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3787"
},
{
"name": "USN-4191-2",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4191-2/"
},
{
"name": "openSUSE-SU-2019:2510",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html"
},
{
"name": "USN-4191-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4191-1/"
},
{
"name": "RHSA-2019:3968",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:3968"
},
{
"name": "RHSA-2019:4344",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:4344"
},
{
"name": "RHSA-2020:0366",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"name": "RHSA-2020:0775",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2020:0775"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-07-29T11:15Z"
}
}
}
OPENSUSE-SU-2019:2041-1
Vulnerability from csaf_opensuse - Published: 2019-09-01 12:18 - Updated: 2019-09-01 12:18| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).\n- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).\n- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).\n- CVE-2019-5008: Fix DoS (NULL pointer dereference) in sparc64 virtual machine possible through guest device driver (bsc#1133031).\n\nBug fixes and enhancements:\n\n- Upstream tweaked SnowRidge-Server vcpu model to now be simply Snowridge (jsc#SLE-4883)\n- Add SnowRidge-Server vcpu model (jsc#SLE-4883)\n- Add in documentation about md-clear feature (bsc#1138534)\n- Fix SEV issue where older machine type is not processed correctly (bsc#1144087)\n- Fix case of a bad pointer in Xen PV usb support code (bsc#1128106)\n- Further refine arch-capabilities handling to help with security and performance in Intel hosts (bsc#1134883, bsc#1135210) (fate#327764)\n- Add support for one more security/performance related vcpu feature (bsc#1136778) (fate#327796)\n- Ignore csske for expanding the cpu model (bsc#1136540)\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2041",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2041-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2041-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2041-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG"
},
{
"category": "self",
"summary": "SUSE Bug 1128106",
"url": "https://bugzilla.suse.com/1128106"
},
{
"category": "self",
"summary": "SUSE Bug 1133031",
"url": "https://bugzilla.suse.com/1133031"
},
{
"category": "self",
"summary": "SUSE Bug 1134883",
"url": "https://bugzilla.suse.com/1134883"
},
{
"category": "self",
"summary": "SUSE Bug 1135210",
"url": "https://bugzilla.suse.com/1135210"
},
{
"category": "self",
"summary": "SUSE Bug 1135902",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "self",
"summary": "SUSE Bug 1136540",
"url": "https://bugzilla.suse.com/1136540"
},
{
"category": "self",
"summary": "SUSE Bug 1136778",
"url": "https://bugzilla.suse.com/1136778"
},
{
"category": "self",
"summary": "SUSE Bug 1138534",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "self",
"summary": "SUSE Bug 1140402",
"url": "https://bugzilla.suse.com/1140402"
},
{
"category": "self",
"summary": "SUSE Bug 1143794",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "self",
"summary": "SUSE Bug 1144087",
"url": "https://bugzilla.suse.com/1144087"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13164 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5008 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5008/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-09-01T12:18:24Z",
"generator": {
"date": "2019-09-01T12:18:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2041-1",
"initial_release_date": "2019-09-01T12:18:24Z",
"revision_history": [
{
"date": "2019-09-01T12:18:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"product_id": "qemu-ipxe-1.0.0+-lp151.7.3.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"product": {
"name": "qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"product_id": "qemu-seabios-1.12.0-lp151.7.3.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-lp151.7.3.3.noarch",
"product": {
"name": "qemu-sgabios-8-lp151.7.3.3.noarch",
"product_id": "qemu-sgabios-8-lp151.7.3.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"product": {
"name": "qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"product_id": "qemu-vgabios-1.12.0-lp151.7.3.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-arm-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-curl-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-extra-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-ksm-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-kvm-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-lang-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"product": {
"name": "qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"product_id": "qemu-linux-user-3.1.1-lp151.7.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-ppc-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-s390-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-testsuite-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-tools-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1-lp151.7.3.3.x86_64",
"product": {
"name": "qemu-x86-3.1.1-lp151.7.3.3.x86_64",
"product_id": "qemu-x86-3.1.1-lp151.7.3.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-lp151.7.3.3.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-linux-user-3.1.1-lp151.7.3.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64"
},
"product_reference": "qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.12.0-lp151.7.3.3.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch"
},
"product_reference": "qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-lp151.7.3.3.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch"
},
"product_reference": "qemu-sgabios-8-lp151.7.3.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-testsuite-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.12.0-lp151.7.3.3.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch"
},
"product_reference": "qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-3.1.1-lp151.7.3.3.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
},
"product_reference": "qemu-x86-3.1.1-lp151.7.3.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-01T12:18:24Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-13164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13164"
}
],
"notes": [
{
"category": "general",
"text": "qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13164",
"url": "https://www.suse.com/security/cve/CVE-2019-13164"
},
{
"category": "external",
"summary": "SUSE Bug 1140402 for CVE-2019-13164",
"url": "https://bugzilla.suse.com/1140402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-01T12:18:24Z",
"details": "moderate"
}
],
"title": "CVE-2019-13164"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-01T12:18:24Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-5008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5008"
}
],
"notes": [
{
"category": "general",
"text": "hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5008",
"url": "https://www.suse.com/security/cve/CVE-2019-5008"
},
{
"category": "external",
"summary": "SUSE Bug 1133031 for CVE-2019-5008",
"url": "https://bugzilla.suse.com/1133031"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1-lp151.7.3.2.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-testsuite-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-tools-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1-lp151.7.3.3.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.3.3.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1-lp151.7.3.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-01T12:18:24Z",
"details": "moderate"
}
],
"title": "CVE-2019-5008"
}
]
}
OPENSUSE-SU-2019:2059-1
Vulnerability from csaf_opensuse - Published: 2019-09-03 04:19 - Updated: 2019-09-03 04:19| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).\n- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).\n- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).\n\nBug fixes and enhancements:\n\n- Add vcpu features needed for Cascadelake-Server, Icelake-Client and Icelake-Server, especially the foundational\n arch-capabilities to help with security and performance on Intel hosts (bsc#1134883) (fate#327764)\n- Add support for one more security/performance related vcpu feature (bsc#1136778) (fate#327796)\n- Disable file locking in the Xen PV disk backend to avoid locking issues with PV domUs during migration. The\n issues triggered by the locking can not be properly handled in libxl. The locking introduced in qemu-2.10 was\n removed again in qemu-4.0 (bsc#1079730, bsc#1098403, bsc#1111025).\n- Ignore csske for expanding the cpu model (bsc#1136540)\n- Fix vm migration is failing with input/output error when nfs server is disconnected (bsc#1119115)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2059",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2059-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2059-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2059-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U"
},
{
"category": "self",
"summary": "SUSE Bug 1079730",
"url": "https://bugzilla.suse.com/1079730"
},
{
"category": "self",
"summary": "SUSE Bug 1098403",
"url": "https://bugzilla.suse.com/1098403"
},
{
"category": "self",
"summary": "SUSE Bug 1111025",
"url": "https://bugzilla.suse.com/1111025"
},
{
"category": "self",
"summary": "SUSE Bug 1119115",
"url": "https://bugzilla.suse.com/1119115"
},
{
"category": "self",
"summary": "SUSE Bug 1134883",
"url": "https://bugzilla.suse.com/1134883"
},
{
"category": "self",
"summary": "SUSE Bug 1135902",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "self",
"summary": "SUSE Bug 1136540",
"url": "https://bugzilla.suse.com/1136540"
},
{
"category": "self",
"summary": "SUSE Bug 1136778",
"url": "https://bugzilla.suse.com/1136778"
},
{
"category": "self",
"summary": "SUSE Bug 1140402",
"url": "https://bugzilla.suse.com/1140402"
},
{
"category": "self",
"summary": "SUSE Bug 1143794",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13164 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-09-03T04:19:16Z",
"generator": {
"date": "2019-09-03T04:19:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2059-1",
"initial_release_date": "2019-09-03T04:19:16Z",
"revision_history": [
{
"date": "2019-09-03T04:19:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"product_id": "qemu-ipxe-1.0.0+-lp150.7.25.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"product": {
"name": "qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"product_id": "qemu-seabios-1.11.0-lp150.7.25.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-lp150.7.25.1.noarch",
"product": {
"name": "qemu-sgabios-8-lp150.7.25.1.noarch",
"product_id": "qemu-sgabios-8-lp150.7.25.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"product": {
"name": "qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"product_id": "qemu-vgabios-1.11.0-lp150.7.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-arm-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-curl-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-extra-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-ksm-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-kvm-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-lang-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-ppc-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-s390-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-tools-2.11.2-lp150.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-lp150.7.25.1.x86_64",
"product": {
"name": "qemu-x86-2.11.2-lp150.7.25.1.x86_64",
"product_id": "qemu-x86-2.11.2-lp150.7.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-lp150.7.25.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-lp150.7.25.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch"
},
"product_reference": "qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-lp150.7.25.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch"
},
"product_reference": "qemu-sgabios-8-lp150.7.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-lp150.7.25.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-lp150.7.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
},
"product_reference": "qemu-x86-2.11.2-lp150.7.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-03T04:19:16Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-13164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13164"
}
],
"notes": [
{
"category": "general",
"text": "qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13164",
"url": "https://www.suse.com/security/cve/CVE-2019-13164"
},
{
"category": "external",
"summary": "SUSE Bug 1140402 for CVE-2019-13164",
"url": "https://bugzilla.suse.com/1140402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-03T04:19:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-13164"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.25.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.25.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-03T04:19:16Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.