Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4547 (GCVE-0-2013-4547)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:15.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55757" }, { "name": "SUSE-SU-2013:1895", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "name": "openSUSE-SU-2013:1745", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "name": "55825", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55825" }, { "name": "55822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55822" }, { "name": "openSUSE-SU-2013:1792", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "name": "openSUSE-SU-2013:1791", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "name": "DSA-2802", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2802" }, { "name": "[nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-17T15:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "55757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55757" }, { "name": "SUSE-SU-2013:1895", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "name": "openSUSE-SU-2013:1745", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "name": "55825", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55825" }, { "name": "55822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55822" }, { "name": "openSUSE-SU-2013:1792", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "name": "openSUSE-SU-2013:1791", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "name": "DSA-2802", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2802" }, { "name": "[nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4547", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "55757", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55757" }, { "name": "SUSE-SU-2013:1895", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "name": "openSUSE-SU-2013:1745", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "name": "55825", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55825" }, { "name": "55822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55822" }, { "name": "openSUSE-SU-2013:1792", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "name": "openSUSE-SU-2013:1791", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "name": "DSA-2802", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2802" }, { "name": "[nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4547", "datePublished": "2013-11-23T18:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:15.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-4547\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-11-23T18:55:04.687\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.\"},{\"lang\":\"es\",\"value\":\"nginx 0.8.41 hasta la versi\u00f3n 1.4.3 y 1.5.x anterior a la versi\u00f3n 1.5.7 permite a atacantes remotos evadir restricciones intencionadas a trav\u00e9s de un car\u00e1cter de espacio sin escape en una URI.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.8.41\",\"versionEndExcluding\":\"1.4.4\",\"matchCriteriaId\":\"3EDD62AC-01DD-479D-A0A9-D703063840DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0\",\"versionEndIncluding\":\"1.5.6\",\"matchCriteriaId\":\"C743469D-8933-43A6-ABAF-28E68B12A3C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:lifecycle_management_server:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723DEC97-DB25-4010-81FB-E47FF04EEDD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BCA435-7594-49E8-9BAE-9E02E129B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:webyast:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC5169C-7B9A-4269-92F4-638374B79CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/55757\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55822\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55825\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2802\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/55757\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55825\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}" } }
fkie_cve-2013-4547
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EDD62AC-01DD-479D-A0A9-D703063840DE", "versionEndExcluding": "1.4.4", "versionStartIncluding": "0.8.41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "C743469D-8933-43A6-ABAF-28E68B12A3C1", "versionEndIncluding": "1.5.6", "versionStartIncluding": "1.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:lifecycle_management_server:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "723DEC97-DB25-4010-81FB-E47FF04EEDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "74BCA435-7594-49E8-9BAE-9E02E129B6C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:suse:webyast:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDC5169C-7B9A-4269-92F4-638374B79CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI." }, { "lang": "es", "value": "nginx 0.8.41 hasta la versi\u00f3n 1.4.3 y 1.5.x anterior a la versi\u00f3n 1.5.7 permite a atacantes remotos evadir restricciones intencionadas a trav\u00e9s de un car\u00e1cter de espacio sin escape en una URI." } ], "id": "CVE-2013-4547", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-23T18:55:04.687", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55757" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55822" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55825" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2012/dsa-2802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2012/dsa-2802" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2013-4547
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-4547", "description": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "id": "GSD-2013-4547", "references": [ "https://www.suse.com/security/cve/CVE-2013-4547.html", "https://www.debian.org/security/2013/dsa-2802", "https://advisories.mageia.org/CVE-2013-4547.html", "https://alas.aws.amazon.com/cve/html/CVE-2013-4547.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-4547" ], "details": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "id": "GSD-2013-4547", "modified": "2023-12-13T01:22:15.902858Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4547", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "55757", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55757" }, { "name": "SUSE-SU-2013:1895", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "name": "openSUSE-SU-2013:1745", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "name": "55825", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55825" }, { "name": "55822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55822" }, { "name": "openSUSE-SU-2013:1792", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "name": "openSUSE-SU-2013:1791", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "name": "DSA-2802", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2802" }, { "name": "[nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.4.4", "versionStartIncluding": "0.8.41", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.6", "versionStartIncluding": "1.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:lifecycle_management_server:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:webyast:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4547" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-116" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-2802", "refsource": "DEBIAN", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2012/dsa-2802" }, { "name": "openSUSE-SU-2013:1745", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "name": "55757", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55757" }, { "name": "55825", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55825" }, { "name": "55822", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55822" }, { "name": "[nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)", "refsource": "MLIST", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" }, { "name": "openSUSE-SU-2013:1791", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "name": "openSUSE-SU-2013:1792", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "name": "SUSE-SU-2013:1895", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2021-11-10T15:59Z", "publishedDate": "2013-11-23T18:55Z" } } }
var-201311-0399
Vulnerability from variot
nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI. nginx is prone to a remote security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. nginx 0.8.41 through 1.5.6 are vulnerable. nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server developed by Russian programmer Igor Sysoev. A security vulnerability exists in nginx versions 0.8.41 through 1.4.3 and 1.5.x prior to 1.5.7. The vulnerability stems from the program not properly validating request URIs containing unescaped space characters.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547 http://advisories.mageia.org/MGASA-2013-0349.html
Updated Packages:
Mandriva Business Server 1/X86_64: ee03201627b548e26667eec1e5ac7dae mbs1/x86_64/nginx-1.0.15-3.1.mbs1.x86_64.rpm 6404dde21b871054a663171b5460fac8 mbs1/SRPMS/nginx-1.0.15-3.1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2802-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst November 21, 2013 http://www.debian.org/security/faq
Package : nginx Vulnerability : restriction bypass Problem type : remote Debian-specific: no CVE ID : CVE-2013-4547 Debian Bug : 730012
Ivan Fratric of the Google Security Team discovered a bug in nginx, a web server, which might allow an attacker to bypass security restrictions by using a specially crafted request.
The oldstable distribution (squeeze) is not affected by this problem.
For the stable distribution (wheezy), this problem has been fixed in version 1.2.1-2.2+wheezy2.
For the unstable distribution (sid), this problem has been fixed in version 1.4.4-1.
We recommend that you upgrade your nginx packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iQEbBAEBAgAGBQJSjnxtAAoJEFb2GnlAHawEXtUH+MMowTZGj8ex7rSstq2uOHST q9C2JZhiAVpYdXBGOR3JHdtJcClkIVvl1cTrp1yhNImvvPWSvJHDIXDbPI7V/0jO 3h6YTZTSGUdhu8UsYGOd1GRon1lNj1Jyhch3HoIA9AAdzGY6FroZGQomsk9tC1K6 Ddh8D/4fbfAKm4RVPXV2Zd7HyDJMqFUlnUXoWuyuAQ8HAxbSrYetO3Bx24Mmt1z6 OHYKAhJYvixLYUt4BCQ3sOfN7AyRwppunjGmSH/up+uGwrgvQO2JgAt3pweYR3/f vAiAWPp5ZVDSMzEa85ZZ+XvjseNAYQBxhiMBr8urf/MmTJWxC63shRV5cBvFXw== =ttYS -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201311-0399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.4" }, { "model": "nginx", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "1.5.6" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "12.2" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "12.3" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "webyast", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.3" }, { "model": "nginx", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "1.4.4" }, { "model": "lifecycle management server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.3" }, { "model": "nginx", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "0.8.41" }, { "model": "nginx", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "1.5.0" }, { "model": "studio onsite", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.3" }, { "model": "nginx", "scope": "eq", "trust": 0.8, "vendor": "igor sysoev", "version": "1.5.7" }, { "model": "nginx", "scope": "lt", "trust": 0.8, "vendor": "igor sysoev", "version": "1.5.x" }, { "model": "nginx", "scope": "eq", "trust": 0.8, "vendor": "igor sysoev", "version": "0.8.41 to 1.4.3" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.4" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.4.1" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.3" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.5" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.4.2" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.7" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.6" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.9" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.4.0" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "igor sysoev", "version": "1.3.8" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.1.17" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.0.14" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.0.10" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.0.9" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.0.8" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "0.8.40" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.1.19" }, { "model": "sysoev nginx", "scope": "eq", "trust": 0.3, "vendor": "igor", "version": "1.0.15" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" } ], "sources": [ { "db": "BID", "id": "63814" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "CNNVD", "id": "CNNVD-201311-336" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:igor_sysoev:nginx", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005289" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ivan Fratric of the Google Security Team", "sources": [ { "db": "BID", "id": "63814" }, { "db": "CNNVD", "id": "CNNVD-201311-336" } ], "trust": 0.9 }, "cve": "CVE-2013-4547", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-4547", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-64549", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-4547", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-4547", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201311-336", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-64549", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-4547", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "CNNVD", "id": "CNNVD-201311-336" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI. nginx is prone to a remote security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. \nnginx 0.8.41 through 1.5.6 are vulnerable. nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server developed by Russian programmer Igor Sysoev. A security vulnerability exists in nginx versions 0.8.41 through 1.4.3 and 1.5.x prior to 1.5.7. The vulnerability stems from the program not properly validating request URIs containing unescaped space characters. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547\n http://advisories.mageia.org/MGASA-2013-0349.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n ee03201627b548e26667eec1e5ac7dae mbs1/x86_64/nginx-1.0.15-3.1.mbs1.x86_64.rpm \n 6404dde21b871054a663171b5460fac8 mbs1/SRPMS/nginx-1.0.15-3.1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2802-1 security@debian.org\nhttp://www.debian.org/security/ Thijs Kinkhorst\nNovember 21, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : nginx\nVulnerability : restriction bypass\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2013-4547\nDebian Bug : 730012\n\nIvan Fratric of the Google Security Team discovered a bug in nginx,\na web server, which might allow an attacker to bypass security\nrestrictions by using a specially crafted request. \n\nThe oldstable distribution (squeeze) is not affected by this problem. \n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 1.2.1-2.2+wheezy2. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.4.4-1. \n\nWe recommend that you upgrade your nginx packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niQEbBAEBAgAGBQJSjnxtAAoJEFb2GnlAHawEXtUH+MMowTZGj8ex7rSstq2uOHST\nq9C2JZhiAVpYdXBGOR3JHdtJcClkIVvl1cTrp1yhNImvvPWSvJHDIXDbPI7V/0jO\n3h6YTZTSGUdhu8UsYGOd1GRon1lNj1Jyhch3HoIA9AAdzGY6FroZGQomsk9tC1K6\nDdh8D/4fbfAKm4RVPXV2Zd7HyDJMqFUlnUXoWuyuAQ8HAxbSrYetO3Bx24Mmt1z6\nOHYKAhJYvixLYUt4BCQ3sOfN7AyRwppunjGmSH/up+uGwrgvQO2JgAt3pweYR3/f\nvAiAWPp5ZVDSMzEa85ZZ+XvjseNAYQBxhiMBr8urf/MmTJWxC63shRV5cBvFXw==\n=ttYS\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2013-4547" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "BID", "id": "63814" }, { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "PACKETSTORM", "id": "124159" }, { "db": "PACKETSTORM", "id": "124145" } ], "trust": 2.25 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-64549", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=38846", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-4547", "trust": 3.1 }, { "db": "SECUNIA", "id": "55825", "trust": 1.8 }, { "db": "SECUNIA", "id": "55757", "trust": 1.8 }, { "db": "SECUNIA", "id": "55822", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2013-005289", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201311-336", "trust": 0.7 }, { "db": "BID", "id": "63814", "trust": 0.5 }, { "db": "PACKETSTORM", "id": "124145", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "124159", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "38846", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-64549", "trust": 0.1 }, { "db": "EXPLOITDB", "id": "38846", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2013-4547", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "BID", "id": "63814" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "PACKETSTORM", "id": "124159" }, { "db": "PACKETSTORM", "id": "124145" }, { "db": "CNNVD", "id": "CNNVD-201311-336" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "id": "VAR-201311-0399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-64549" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:09:55.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-2802", "trust": 0.8, "url": "http://www.debian.org/security/2013/dsa-2802" }, { "title": "Top Page", "trust": 0.8, "url": "http://nginx.com/" }, { "title": "SUSE-SU-2013:1895", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "title": "openSUSE-SU-2013:1791", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "title": "openSUSE-SU-2013:1792", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "title": "openSUSE-SU-2013:1745", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "title": "nginx-1.5.7", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48998" }, { "title": "nginx-1.4.4", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48997" }, { "title": "nginx-1.4.4", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48996" }, { "title": "nginx-1.4.4", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=49035" }, { "title": "nginx-1.5.7", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48999" }, { "title": "Debian CVElist Bug Report Logs: nginx: CVE-2013-4547", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=f4bb5a4a182af6a4c8ca260ef90a3d69" }, { "title": "Debian Security Advisories: DSA-2802-1 nginx -- restriction bypass", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0e9f3c319e9988b421581c9d566c73e5" }, { "title": "Debian CVElist Bug Report Logs: nginx:CVE-2014-3616: possible to reuse cached SSL sessions in unrelated contexts", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=703629f55868e4fc7623e469fe23486b" }, { "title": "Amazon Linux AMI: ALAS-2013-249", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2013-249" }, { "title": "DVWA-Note", "trust": 0.1, "url": "https://github.com/dhgdhg/DVWA- " }, { "title": "DVWA-Note", "trust": 0.1, "url": "https://github.com/twfb/DVWA-Note " }, { "title": "DVWA-Note", "trust": 0.1, "url": "https://github.com/dhgdhg/DVWA " }, { "title": "usn-search", "trust": 0.1, "url": "https://github.com/lukeber4/usn-search " }, { "title": "Vision", "trust": 0.1, "url": "https://github.com/CoolerVoid/Vision " }, { "title": "Vision2", "trust": 0.1, "url": "https://github.com/CoolerVoid/Vision2 " }, { "title": "woodswiki", "trust": 0.1, "url": "https://github.com/woods-sega/woodswiki " } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "CNNVD", "id": "CNNVD-201311-336" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-116", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.debian.org/security/2012/dsa-2802" }, { "trust": 2.1, "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" }, { "trust": 1.8, "url": "http://secunia.com/advisories/55757" }, { "trust": 1.8, "url": "http://secunia.com/advisories/55822" }, { "trust": 1.8, "url": "http://secunia.com/advisories/55825" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4547" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4547" }, { "trust": 0.3, "url": "http://nginx.org/download/patch.2013.space.txt" }, { "trust": 0.3, "url": "http://nginx.org/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21671931" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4547" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/116.html" }, { "trust": 0.1, "url": "https://github.com/dhgdhg/dvwa-" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/38846/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/63814" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730012" }, { "trust": 0.1, "url": "https://www.debian.org/security/./dsa-2802" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2013-0349.html" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "BID", "id": "63814" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "PACKETSTORM", "id": "124159" }, { "db": "PACKETSTORM", "id": "124145" }, { "db": "CNNVD", "id": "CNNVD-201311-336" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-64549" }, { "db": "VULMON", "id": "CVE-2013-4547" }, { "db": "BID", "id": "63814" }, { "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "db": "PACKETSTORM", "id": "124159" }, { "db": "PACKETSTORM", "id": "124145" }, { "db": "CNNVD", "id": "CNNVD-201311-336" }, { "db": "NVD", "id": "CVE-2013-4547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-11-23T00:00:00", "db": "VULHUB", "id": "VHN-64549" }, { "date": "2013-11-23T00:00:00", "db": "VULMON", "id": "CVE-2013-4547" }, { "date": "2013-11-19T00:00:00", "db": "BID", "id": "63814" }, { "date": "2013-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "date": "2013-11-25T17:07:04", "db": "PACKETSTORM", "id": "124159" }, { "date": "2013-11-22T21:29:14", "db": "PACKETSTORM", "id": "124145" }, { "date": "2013-11-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201311-336" }, { "date": "2013-11-23T18:55:04.687000", "db": "NVD", "id": "CVE-2013-4547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-10T00:00:00", "db": "VULHUB", "id": "VHN-64549" }, { "date": "2021-11-10T00:00:00", "db": "VULMON", "id": "CVE-2013-4547" }, { "date": "2015-05-07T17:10:00", "db": "BID", "id": "63814" }, { "date": "2013-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005289" }, { "date": "2023-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201311-336" }, { "date": "2024-11-21T01:55:48.360000", "db": "NVD", "id": "CVE-2013-4547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201311-336" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "nginx Vulnerabilities that bypass restrictions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005289" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201311-336" } ], "trust": 0.6 } }
opensuse-su-2024:11341-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.7-rubygem-passenger-6.0.8-3.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11341", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11341-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2119 page", "url": "https://www.suse.com/security/cve/CVE-2013-2119/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4547 page", "url": "https://www.suse.com/security/cve/CVE-2013-4547/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1831 page", "url": "https://www.suse.com/security/cve/CVE-2014-1831/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1832 page", "url": "https://www.suse.com/security/cve/CVE-2014-1832/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7519 page", "url": "https://www.suse.com/security/cve/CVE-2015-7519/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1247 page", "url": "https://www.suse.com/security/cve/CVE-2016-1247/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7529 page", "url": "https://www.suse.com/security/cve/CVE-2017-7529/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12026 page", "url": "https://www.suse.com/security/cve/CVE-2018-12026/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12029 page", "url": "https://www.suse.com/security/cve/CVE-2018-12029/" } ], "title": "ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11341-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "product": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "product_id": "ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "product": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "product_id": "ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64" } }, { "category": "product_version", "name": "rubygem-passenger-6.0.8-3.2.aarch64", "product": { "name": "rubygem-passenger-6.0.8-3.2.aarch64", "product_id": "rubygem-passenger-6.0.8-3.2.aarch64" } }, { "category": "product_version", "name": "rubygem-passenger-apache2-6.0.8-3.2.aarch64", "product": { "name": "rubygem-passenger-apache2-6.0.8-3.2.aarch64", "product_id": "rubygem-passenger-apache2-6.0.8-3.2.aarch64" } }, { "category": "product_version", "name": "rubygem-passenger-nginx-6.0.8-3.2.aarch64", "product": { "name": "rubygem-passenger-nginx-6.0.8-3.2.aarch64", "product_id": "rubygem-passenger-nginx-6.0.8-3.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "product": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "product_id": "ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le" } }, { "category": "product_version", "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "product": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "product_id": "ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le" } }, { "category": "product_version", "name": "rubygem-passenger-6.0.8-3.2.ppc64le", "product": { "name": "rubygem-passenger-6.0.8-3.2.ppc64le", "product_id": "rubygem-passenger-6.0.8-3.2.ppc64le" } }, { "category": "product_version", "name": "rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "product": { "name": "rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "product_id": "rubygem-passenger-apache2-6.0.8-3.2.ppc64le" } }, { "category": "product_version", "name": "rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "product": { "name": "rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "product_id": "rubygem-passenger-nginx-6.0.8-3.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "product": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "product_id": "ruby2.7-rubygem-passenger-6.0.8-3.2.s390x" } }, { "category": "product_version", "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "product": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "product_id": "ruby3.0-rubygem-passenger-6.0.8-3.2.s390x" } }, { "category": "product_version", "name": "rubygem-passenger-6.0.8-3.2.s390x", "product": { "name": "rubygem-passenger-6.0.8-3.2.s390x", "product_id": "rubygem-passenger-6.0.8-3.2.s390x" } }, { "category": "product_version", "name": "rubygem-passenger-apache2-6.0.8-3.2.s390x", "product": { "name": "rubygem-passenger-apache2-6.0.8-3.2.s390x", "product_id": "rubygem-passenger-apache2-6.0.8-3.2.s390x" } }, { "category": "product_version", "name": "rubygem-passenger-nginx-6.0.8-3.2.s390x", "product": { "name": "rubygem-passenger-nginx-6.0.8-3.2.s390x", "product_id": "rubygem-passenger-nginx-6.0.8-3.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "product": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "product_id": "ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "product": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "product_id": "ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64" } }, { "category": "product_version", "name": "rubygem-passenger-6.0.8-3.2.x86_64", "product": { "name": "rubygem-passenger-6.0.8-3.2.x86_64", "product_id": "rubygem-passenger-6.0.8-3.2.x86_64" } }, { "category": "product_version", "name": "rubygem-passenger-apache2-6.0.8-3.2.x86_64", "product": { "name": "rubygem-passenger-apache2-6.0.8-3.2.x86_64", "product_id": "rubygem-passenger-apache2-6.0.8-3.2.x86_64" } }, { "category": "product_version", "name": "rubygem-passenger-nginx-6.0.8-3.2.x86_64", "product": { "name": "rubygem-passenger-nginx-6.0.8-3.2.x86_64", "product_id": "rubygem-passenger-nginx-6.0.8-3.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64" }, "product_reference": "ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le" }, "product_reference": "ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x" }, "product_reference": "ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64" }, "product_reference": "ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64" }, "product_reference": "ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le" }, "product_reference": "ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x" }, "product_reference": "ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64" }, "product_reference": "ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-6.0.8-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64" }, "product_reference": "rubygem-passenger-6.0.8-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-6.0.8-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le" }, "product_reference": "rubygem-passenger-6.0.8-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-6.0.8-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x" }, "product_reference": "rubygem-passenger-6.0.8-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-6.0.8-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64" }, "product_reference": "rubygem-passenger-6.0.8-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-apache2-6.0.8-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64" }, "product_reference": "rubygem-passenger-apache2-6.0.8-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-apache2-6.0.8-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le" }, "product_reference": "rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-apache2-6.0.8-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x" }, "product_reference": "rubygem-passenger-apache2-6.0.8-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-apache2-6.0.8-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64" }, "product_reference": "rubygem-passenger-apache2-6.0.8-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-nginx-6.0.8-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64" }, "product_reference": "rubygem-passenger-nginx-6.0.8-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-nginx-6.0.8-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le" }, "product_reference": "rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-nginx-6.0.8-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x" }, "product_reference": "rubygem-passenger-nginx-6.0.8-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-passenger-nginx-6.0.8-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" }, "product_reference": "rubygem-passenger-nginx-6.0.8-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2119", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2119" } ], "notes": [ { "category": "general", "text": "Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary \"config\" file in a directory with a predictable name in /tmp/ before it is used by the gem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2119", "url": "https://www.suse.com/security/cve/CVE-2013-2119" }, { "category": "external", "summary": "SUSE Bug 828005 for CVE-2013-2119", "url": "https://bugzilla.suse.com/828005" }, { "category": "external", "summary": "SUSE Bug 919726 for CVE-2013-2119", "url": "https://bugzilla.suse.com/919726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2119" }, { "cve": "CVE-2013-4547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4547" } ], "notes": [ { "category": "general", "text": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4547", "url": "https://www.suse.com/security/cve/CVE-2013-4547" }, { "category": "external", "summary": "SUSE Bug 851295 for CVE-2013-4547", "url": "https://bugzilla.suse.com/851295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4547" }, { "cve": "CVE-2014-1831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1831" } ], "notes": [ { "category": "general", "text": "Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1831", "url": "https://www.suse.com/security/cve/CVE-2014-1831" }, { "category": "external", "summary": "SUSE Bug 860994 for CVE-2014-1831", "url": "https://bugzilla.suse.com/860994" }, { "category": "external", "summary": "SUSE Bug 864352 for CVE-2014-1831", "url": "https://bugzilla.suse.com/864352" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1831" }, { "cve": "CVE-2014-1832", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1832" } ], "notes": [ { "category": "general", "text": "Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1832", "url": "https://www.suse.com/security/cve/CVE-2014-1832" }, { "category": "external", "summary": "SUSE Bug 860994 for CVE-2014-1832", "url": "https://bugzilla.suse.com/860994" }, { "category": "external", "summary": "SUSE Bug 864352 for CVE-2014-1832", "url": "https://bugzilla.suse.com/864352" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1832" }, { "cve": "CVE-2015-7519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7519" } ], "notes": [ { "category": "general", "text": "agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7519", "url": "https://www.suse.com/security/cve/CVE-2015-7519" }, { "category": "external", "summary": "SUSE Bug 956281 for CVE-2015-7519", "url": "https://bugzilla.suse.com/956281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7519" }, { "cve": "CVE-2016-1247", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1247" } ], "notes": [ { "category": "general", "text": "The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1247", "url": "https://www.suse.com/security/cve/CVE-2016-1247" }, { "category": "external", "summary": "SUSE Bug 1007000 for CVE-2016-1247", "url": "https://bugzilla.suse.com/1007000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1247" }, { "cve": "CVE-2017-7529", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7529" } ], "notes": [ { "category": "general", "text": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7529", "url": "https://www.suse.com/security/cve/CVE-2017-7529" }, { "category": "external", "summary": "SUSE Bug 1048265 for CVE-2017-7529", "url": "https://bugzilla.suse.com/1048265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7529" }, { "cve": "CVE-2018-12026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12026" } ], "notes": [ { "category": "general", "text": "During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12026", "url": "https://www.suse.com/security/cve/CVE-2018-12026" }, { "category": "external", "summary": "SUSE Bug 1097655 for CVE-2018-12026", "url": "https://bugzilla.suse.com/1097655" }, { "category": "external", "summary": "SUSE Bug 1097663 for CVE-2018-12026", "url": "https://bugzilla.suse.com/1097663" }, { "category": "external", "summary": "SUSE Bug 1097664 for CVE-2018-12026", "url": "https://bugzilla.suse.com/1097664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-12026" }, { "cve": "CVE-2018-12029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12029" } ], "notes": [ { "category": "general", "text": "A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root\u0027s crontab file allows privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12029", "url": "https://www.suse.com/security/cve/CVE-2018-12029" }, { "category": "external", "summary": "SUSE Bug 1097655 for CVE-2018-12029", "url": "https://bugzilla.suse.com/1097655" }, { "category": "external", "summary": "SUSE Bug 1097663 for CVE-2018-12029", "url": "https://bugzilla.suse.com/1097663" }, { "category": "external", "summary": "SUSE Bug 1097664 for CVE-2018-12029", "url": "https://bugzilla.suse.com/1097664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-apache2-6.0.8-3.2.x86_64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.aarch64", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.ppc64le", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.s390x", "openSUSE Tumbleweed:rubygem-passenger-nginx-6.0.8-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12029" } ] }
opensuse-su-2024:10044-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nginx-1.11.4-2.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10044", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10044-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4315 page", "url": "https://www.suse.com/security/cve/CVE-2011-4315/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2089 page", "url": "https://www.suse.com/security/cve/CVE-2012-2089/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2070 page", "url": "https://www.suse.com/security/cve/CVE-2013-2070/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4547 page", "url": "https://www.suse.com/security/cve/CVE-2013-4547/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0133 page", "url": "https://www.suse.com/security/cve/CVE-2014-0133/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3556 page", "url": "https://www.suse.com/security/cve/CVE-2014-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3616 page", "url": "https://www.suse.com/security/cve/CVE-2014-3616/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0742 page", "url": "https://www.suse.com/security/cve/CVE-2016-0742/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0746 page", "url": "https://www.suse.com/security/cve/CVE-2016-0746/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0747 page", "url": "https://www.suse.com/security/cve/CVE-2016-0747/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "nginx-1.11.4-2.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10044-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.aarch64", "product": { "name": "nginx-1.11.4-2.5.aarch64", "product_id": "nginx-1.11.4-2.5.aarch64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product_id": "vim-plugin-nginx-1.11.4-2.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.ppc64le", "product": { "name": "nginx-1.11.4-2.5.ppc64le", "product_id": "nginx-1.11.4-2.5.ppc64le" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product_id": "vim-plugin-nginx-1.11.4-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.s390x", "product": { "name": "nginx-1.11.4-2.5.s390x", "product_id": "nginx-1.11.4-2.5.s390x" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product_id": "vim-plugin-nginx-1.11.4-2.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.x86_64", "product": { "name": "nginx-1.11.4-2.5.x86_64", "product_id": "nginx-1.11.4-2.5.x86_64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product_id": "vim-plugin-nginx-1.11.4-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64" }, "product_reference": "nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le" }, "product_reference": "nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x" }, "product_reference": "nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64" }, "product_reference": "nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4315" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4315", "url": "https://www.suse.com/security/cve/CVE-2011-4315" }, { "category": "external", "summary": "SUSE Bug 731084 for CVE-2011-4315", "url": "https://bugzilla.suse.com/731084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4315" }, { "cve": "CVE-2012-2089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2089" } ], "notes": [ { "category": "general", "text": "Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2089", "url": "https://www.suse.com/security/cve/CVE-2012-2089" }, { "category": "external", "summary": "SUSE Bug 757057 for CVE-2012-2089", "url": "https://bugzilla.suse.com/757057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2089" }, { "cve": "CVE-2013-2070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2070" } ], "notes": [ { "category": "general", "text": "http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2070", "url": "https://www.suse.com/security/cve/CVE-2013-2070" }, { "category": "external", "summary": "SUSE Bug 821184 for CVE-2013-2070", "url": "https://bugzilla.suse.com/821184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2070" }, { "cve": "CVE-2013-4547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4547" } ], "notes": [ { "category": "general", "text": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4547", "url": "https://www.suse.com/security/cve/CVE-2013-4547" }, { "category": "external", "summary": "SUSE Bug 851295 for CVE-2013-4547", "url": "https://bugzilla.suse.com/851295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4547" }, { "cve": "CVE-2014-0133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0133" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0133", "url": "https://www.suse.com/security/cve/CVE-2014-0133" }, { "category": "external", "summary": "SUSE Bug 869076 for CVE-2014-0133", "url": "https://bugzilla.suse.com/869076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0133" }, { "cve": "CVE-2014-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3556" } ], "notes": [ { "category": "general", "text": "The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3556", "url": "https://www.suse.com/security/cve/CVE-2014-3556" }, { "category": "external", "summary": "SUSE Bug 890428 for CVE-2014-3556", "url": "https://bugzilla.suse.com/890428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3556" }, { "cve": "CVE-2014-3616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3616" } ], "notes": [ { "category": "general", "text": "nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct \"virtual host confusion\" attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3616", "url": "https://www.suse.com/security/cve/CVE-2014-3616" }, { "category": "external", "summary": "SUSE Bug 897029 for CVE-2014-3616", "url": "https://bugzilla.suse.com/897029" }, { "category": "external", "summary": "SUSE Bug 901519 for CVE-2014-3616", "url": "https://bugzilla.suse.com/901519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3616" }, { "cve": "CVE-2016-0742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0742" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0742", "url": "https://www.suse.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "SUSE Bug 963781 for CVE-2016-0742", "url": "https://bugzilla.suse.com/963781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-0742" }, { "cve": "CVE-2016-0746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0746" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0746", "url": "https://www.suse.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "SUSE Bug 963778 for CVE-2016-0746", "url": "https://bugzilla.suse.com/963778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0746" }, { "cve": "CVE-2016-0747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0747" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0747", "url": "https://www.suse.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "SUSE Bug 963775 for CVE-2016-0747", "url": "https://bugzilla.suse.com/963775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0747" }, { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
ghsa-9x2q-qf8w-h347
Vulnerability from github
nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
{ "affected": [], "aliases": [ "CVE-2013-4547" ], "database_specific": { "cwe_ids": [ "CWE-116" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-11-23T18:55:00Z", "severity": "HIGH" }, "details": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "id": "GHSA-9x2q-qf8w-h347", "modified": "2022-05-13T01:05:15Z", "published": "2022-05-13T01:05:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4547" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00084.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00118.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00119.html" }, { "type": "WEB", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/55757" }, { "type": "WEB", "url": "http://secunia.com/advisories/55822" }, { "type": "WEB", "url": "http://secunia.com/advisories/55825" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2802" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.