Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-19004 (GCVE-0-2019-19004)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/autotrace/autotrace/commits/master" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/autotrace/autotrace/pull/40" }, { "name": "FEDORA-2021-cb871c9e6c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-10T02:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/autotrace/autotrace/commits/master" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/autotrace/autotrace/pull/40" }, { "name": "FEDORA-2021-cb871c9e6c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/autotrace/autotrace/commits/master", "refsource": "MISC", "url": "https://github.com/autotrace/autotrace/commits/master" }, { "name": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c", "refsource": "MISC", "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "name": "https://github.com/autotrace/autotrace/pull/40", "refsource": "CONFIRM", "url": "https://github.com/autotrace/autotrace/pull/40" }, { "name": "FEDORA-2021-cb871c9e6c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19004", "datePublished": "2021-02-11T20:08:15", "dateReserved": "2019-11-15T00:00:00", "dateUpdated": "2024-08-05T02:02:39.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-19004\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-11T21:15:12.180\",\"lastModified\":\"2024-11-21T04:33:58.593\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de entero biWidth*biBitCnt en el archivo input-bmp.c en autotrace versi\u00f3n 0.31.1, permite a atacantes proporcionar un valor de entrada inesperado a malloc por medio de una imagen de mapa de bits malformada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD756666-3B3A-4CAB-A59C-4BA85C23233C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}],\"references\":[{\"url\":\"https://github.com/autotrace/autotrace/commits/master\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/autotrace/autotrace/pull/40\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/autotrace/autotrace/commits/master\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/autotrace/autotrace/pull/40\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-rjwr-8pfc-m94f
Vulnerability from github
A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.
{ "affected": [], "aliases": [ "CVE-2019-19004" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-02-11T21:15:00Z", "severity": "HIGH" }, "details": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "id": "GHSA-rjwr-8pfc-m94f", "modified": "2022-05-24T17:41:52Z", "published": "2022-05-24T17:41:52Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004" }, { "type": "WEB", "url": "https://github.com/autotrace/autotrace/pull/40" }, { "type": "WEB", "url": "https://github.com/autotrace/autotrace/commits/master" }, { "type": "WEB", "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2019-19004
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
autotrace_project | autotrace | 0.31.1 | |
fedoraproject | fedora | 34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD756666-3B3A-4CAB-A59C-4BA85C23233C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image." }, { "lang": "es", "value": "Un desbordamiento de entero biWidth*biBitCnt en el archivo input-bmp.c en autotrace versi\u00f3n 0.31.1, permite a atacantes proporcionar un valor de entrada inesperado a malloc por medio de una imagen de mapa de bits malformada" } ], "id": "CVE-2019-19004", "lastModified": "2024-11-21T04:33:58.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-11T21:15:12.180", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/pull/40" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/pull/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2019-19004
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-19004", "description": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "id": "GSD-2019-19004", "references": [ "https://www.suse.com/security/cve/CVE-2019-19004.html", "https://access.redhat.com/errata/RHSA-2021:4519" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-19004" ], "details": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "id": "GSD-2019-19004", "modified": "2023-12-13T01:23:54.490444Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/autotrace/autotrace/commits/master", "refsource": "MISC", "url": "https://github.com/autotrace/autotrace/commits/master" }, { "name": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c", "refsource": "MISC", "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "name": "https://github.com/autotrace/autotrace/pull/40", "refsource": "CONFIRM", "url": "https://github.com/autotrace/autotrace/pull/40" }, { "name": "FEDORA-2021-cb871c9e6c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19004" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/autotrace/autotrace/commits/master", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master" }, { "name": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c" }, { "name": "https://github.com/autotrace/autotrace/pull/40", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/autotrace/autotrace/pull/40" }, { "name": "FEDORA-2021-cb871c9e6c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4 } }, "lastModifiedDate": "2022-01-01T18:13Z", "publishedDate": "2021-02-11T21:15Z" } } }
RHSA-2021:4519
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for autotrace is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AutoTrace is a program for converting bitmaps to vector graphics.\n\nSecurity Fix(es):\n\n* autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact (CVE-2019-19005)\n\n* autotrace: integer overflow in input-bmp.c (CVE-2019-19004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4519", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4519.json" } ], "title": "Red Hat Security Advisory: autotrace security update", "tracking": { "current_release_date": "2025-08-04T12:05:15+00:00", "generator": { "date": "2025-08-04T12:05:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:4519", "initial_release_date": "2021-11-09T18:25:30+00:00", "revision_history": [ { "date": "2021-11-09T18:25:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:25:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:05:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.src", "product": { "name": "autotrace-0:0.31.1-53.el8.src", "product_id": "autotrace-0:0.31.1-53.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-0:0.31.1-53.el8.i686", "product_id": "autotrace-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-0:0.31.1-53.el8.s390x", "product_id": "autotrace-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src" }, "product_reference": "autotrace-0:0.31.1-53.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19004", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945033" } ], "notes": [ { "category": "description", "text": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: integer overflow in input-bmp.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19004" }, { "category": "external", "summary": "RHBZ#1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19004", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "autotrace: integer overflow in input-bmp.c" }, { "cve": "CVE-2019-19005", "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945031" } ], "notes": [ { "category": "description", "text": "A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19005" }, { "category": "external", "summary": "RHBZ#1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19005" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact" } ] }
rhsa-2021:4519
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for autotrace is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AutoTrace is a program for converting bitmaps to vector graphics.\n\nSecurity Fix(es):\n\n* autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact (CVE-2019-19005)\n\n* autotrace: integer overflow in input-bmp.c (CVE-2019-19004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4519", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4519.json" } ], "title": "Red Hat Security Advisory: autotrace security update", "tracking": { "current_release_date": "2025-08-04T12:05:15+00:00", "generator": { "date": "2025-08-04T12:05:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:4519", "initial_release_date": "2021-11-09T18:25:30+00:00", "revision_history": [ { "date": "2021-11-09T18:25:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:25:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:05:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.src", "product": { "name": "autotrace-0:0.31.1-53.el8.src", "product_id": "autotrace-0:0.31.1-53.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-0:0.31.1-53.el8.i686", "product_id": "autotrace-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-0:0.31.1-53.el8.s390x", "product_id": "autotrace-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src" }, "product_reference": "autotrace-0:0.31.1-53.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19004", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945033" } ], "notes": [ { "category": "description", "text": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: integer overflow in input-bmp.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19004" }, { "category": "external", "summary": "RHBZ#1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19004", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "autotrace: integer overflow in input-bmp.c" }, { "cve": "CVE-2019-19005", "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945031" } ], "notes": [ { "category": "description", "text": "A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19005" }, { "category": "external", "summary": "RHBZ#1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19005" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact" } ] }
rhsa-2021_4519
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for autotrace is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AutoTrace is a program for converting bitmaps to vector graphics.\n\nSecurity Fix(es):\n\n* autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact (CVE-2019-19005)\n\n* autotrace: integer overflow in input-bmp.c (CVE-2019-19004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4519", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4519.json" } ], "title": "Red Hat Security Advisory: autotrace security update", "tracking": { "current_release_date": "2024-11-15T04:25:49+00:00", "generator": { "date": "2024-11-15T04:25:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4519", "initial_release_date": "2021-11-09T18:25:30+00:00", "revision_history": [ { "date": "2021-11-09T18:25:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:25:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:25:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.src", "product": { "name": "autotrace-0:0.31.1-53.el8.src", "product_id": "autotrace-0:0.31.1-53.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=aarch64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-0:0.31.1-53.el8.i686", "product_id": "autotrace-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=i686" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=x86_64" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-0:0.31.1-53.el8.s390x", "product_id": "autotrace-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debugsource@0.31.1-53.el8?arch=s390x" } } }, { "category": "product_version", "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_id": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/autotrace-debuginfo@0.31.1-53.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src" }, "product_reference": "autotrace-0:0.31.1-53.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-debugsource-0:0.31.1-53.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" }, "product_reference": "autotrace-debugsource-0:0.31.1-53.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19004", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945033" } ], "notes": [ { "category": "description", "text": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: integer overflow in input-bmp.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19004" }, { "category": "external", "summary": "RHBZ#1945033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19004", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "autotrace: integer overflow in input-bmp.c" }, { "cve": "CVE-2019-19005", "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945031" } ], "notes": [ { "category": "description", "text": "A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182.", "title": "Vulnerability description" }, { "category": "summary", "text": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19005" }, { "category": "external", "summary": "RHBZ#1945031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19005" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19005" } ], "release_date": "2021-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:25:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4519" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.src", "CRB-8.5.0.GA:autotrace-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debuginfo-0:0.31.1-53.el8.x86_64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.aarch64", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.i686", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.ppc64le", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.s390x", "CRB-8.5.0.GA:autotrace-debugsource-0:0.31.1-53.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact" } ] }
wid-sec-w-2022-0571
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0571 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0571.json" }, { "category": "self", "summary": "WID-SEC-2022-0571 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0571" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4158" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4172" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4201" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4221" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4222" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4236" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4270" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4288" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4316" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4321" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4374" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4382" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4408" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4413" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4426" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4455" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4464" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4510" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4513" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-159 vom 2021-11-11", "url": "https://downloads.avaya.com/css/P8/documents/101078544" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4032 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4032" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4382 vom 2021-11-16", "url": "https://linux.oracle.com/errata/ELSA-2021-4382.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4222 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4222.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4221 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4221.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4848 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4845 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4845" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3945-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4002-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4001-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4051-1 vom 2021-12-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009896.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4155-1 vom 2021-12-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0064-1 vom 2022-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5241-1 vom 2022-01-19", "url": "https://ubuntu.com/security/notices/USN-5241-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-1 vom 2022-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1742 vom 2022-01-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1742.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-2 vom 2022-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-030 vom 2022-02-26", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:23018-1 vom 2022-03-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0856 vom 2022-03-14", "url": "https://access.redhat.com/errata/RHSA-2022:0856" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5391-1 vom 2022-04-27", "url": "https://ubuntu.com/security/notices/USN-5391-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9341 vom 2022-04-28", "url": "https://linux.oracle.com/errata/ELSA-2022-9341.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5498 vom 2022-07-05", "url": "https://access.redhat.com/errata/RHSA-2022:5498" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-093 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-093.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", "url": "https://ubuntu.com/security/notices/USN-5553-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-03 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-03" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3001-1 vom 2022-09-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", "url": "https://ubuntu.com/security/notices/USN-5631-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-09 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-09" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3590-1 vom 2022-10-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3836-1 vom 2022-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012792.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7529 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7529.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2010 vom 2023-04-05", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2010.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12349 vom 2023-05-24", "url": "http://linux.oracle.com/errata/ELSA-2023-12349.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2079 vom 2023-06-08", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2079.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASSELINUX-NG-2023-001 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASSELINUX-NG-2023-001.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2307 vom 2023-10-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2307.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6431 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6976 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:6976" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0411 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0411" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0573 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0573" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1918 vom 2024-02-06", "url": "https://alas.aws.amazon.com/ALAS-2024-1918.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://alas.aws.amazon.com/ALAS-2024-1921.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://www.cybersecurity-help.cz/vdb/SB2024021950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1086 vom 2024-03-05", "url": "https://access.redhat.com/errata/RHSA-2024:1086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1154 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1154" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0970-1 vom 2024-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018191.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-20 vom 2024-05-07", "url": "https://security.gentoo.org/glsa/202405-20" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1846-1 vom 2024-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018628.html" }, { "category": "external", "summary": "IBM Security Bulletin 7158789 vom 2024-06-26", "url": "https://www.ibm.com/support/pages/node/7158789" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2620 vom 2024-08-13", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2620.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3930 vom 2024-10-22", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14647-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L4RLODX5GVSAY4VHIRZHWG4EEKI7MMMM/" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-15T23:00:00.000+00:00", "generator": { "date": "2025-01-16T09:22:22.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2022-0571", "initial_release_date": "2021-11-09T23:00:00.000+00:00", "revision_history": [ { "date": "2021-11-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-11-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-11-29T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-14T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-22T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-01-25T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-09T23:00:00.000+00:00", "number": "14", "summary": "Referenz(en) aufgenommen: FEDORA-2022-8109B472A3, FEDORA-2022-737E44718A" }, { "date": "2022-02-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-03T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-14T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Gentoo und SUSE aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "50" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "10.0.0-10.0.7.1", "product": { "name": "IBM Security Verify Access 10.0.0-10.0.7.1", "product_id": "T035657", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0_-_10.0.7.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698" } }, { "category": "product_version", "name": "Data Foundation 4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation 4.12.10", "product_id": "T031698-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-17594", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18218", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-18218" }, { "cve": "CVE-2019-19004", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19004" }, { "cve": "CVE-2019-19005", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19005" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-17541", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-17541" }, { "cve": "CVE-2020-18442", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-18442" }, { "cve": "CVE-2020-24370", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-24370" }, { "cve": "CVE-2020-8037", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-8037" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-20095" }, { "cve": "CVE-2021-28957", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-28957" }, { "cve": "CVE-2021-29922", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-29922" }, { "cve": "CVE-2021-3200", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3200" }, { "cve": "CVE-2021-3445", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3445" }, { "cve": "CVE-2021-3481", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3481" }, { "cve": "CVE-2021-3565", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3565" }, { "cve": "CVE-2021-3571", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3571" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3602", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3602" }, { "cve": "CVE-2021-36084", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36087" }, { "cve": "CVE-2021-42771", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-42771" } ] }
WID-SEC-W-2022-0571
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0571 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0571.json" }, { "category": "self", "summary": "WID-SEC-2022-0571 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0571" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4158" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4172" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4201" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4221" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4222" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4236" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4270" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4288" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4316" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4321" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4374" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4382" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4408" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4413" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4426" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4455" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4464" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4510" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4513" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-159 vom 2021-11-11", "url": "https://downloads.avaya.com/css/P8/documents/101078544" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4032 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4032" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4382 vom 2021-11-16", "url": "https://linux.oracle.com/errata/ELSA-2021-4382.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4222 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4222.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4221 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4221.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4848 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4845 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4845" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3945-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4002-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4001-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4051-1 vom 2021-12-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009896.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4155-1 vom 2021-12-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0064-1 vom 2022-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5241-1 vom 2022-01-19", "url": "https://ubuntu.com/security/notices/USN-5241-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-1 vom 2022-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1742 vom 2022-01-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1742.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-2 vom 2022-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-030 vom 2022-02-26", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:23018-1 vom 2022-03-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0856 vom 2022-03-14", "url": "https://access.redhat.com/errata/RHSA-2022:0856" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5391-1 vom 2022-04-27", "url": "https://ubuntu.com/security/notices/USN-5391-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9341 vom 2022-04-28", "url": "https://linux.oracle.com/errata/ELSA-2022-9341.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5498 vom 2022-07-05", "url": "https://access.redhat.com/errata/RHSA-2022:5498" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-093 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-093.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", "url": "https://ubuntu.com/security/notices/USN-5553-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-03 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-03" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3001-1 vom 2022-09-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", "url": "https://ubuntu.com/security/notices/USN-5631-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-09 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-09" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3590-1 vom 2022-10-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3836-1 vom 2022-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012792.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7529 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7529.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2010 vom 2023-04-05", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2010.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12349 vom 2023-05-24", "url": "http://linux.oracle.com/errata/ELSA-2023-12349.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2079 vom 2023-06-08", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2079.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASSELINUX-NG-2023-001 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASSELINUX-NG-2023-001.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2307 vom 2023-10-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2307.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6431 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6976 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:6976" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0411 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0411" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0573 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0573" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1918 vom 2024-02-06", "url": "https://alas.aws.amazon.com/ALAS-2024-1918.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://alas.aws.amazon.com/ALAS-2024-1921.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://www.cybersecurity-help.cz/vdb/SB2024021950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1086 vom 2024-03-05", "url": "https://access.redhat.com/errata/RHSA-2024:1086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1154 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1154" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0970-1 vom 2024-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018191.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-20 vom 2024-05-07", "url": "https://security.gentoo.org/glsa/202405-20" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1846-1 vom 2024-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018628.html" }, { "category": "external", "summary": "IBM Security Bulletin 7158789 vom 2024-06-26", "url": "https://www.ibm.com/support/pages/node/7158789" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2620 vom 2024-08-13", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2620.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3930 vom 2024-10-22", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00021.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14647-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L4RLODX5GVSAY4VHIRZHWG4EEKI7MMMM/" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-15T23:00:00.000+00:00", "generator": { "date": "2025-01-16T09:22:22.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2022-0571", "initial_release_date": "2021-11-09T23:00:00.000+00:00", "revision_history": [ { "date": "2021-11-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-11-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-11-29T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-14T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-22T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-01-25T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-09T23:00:00.000+00:00", "number": "14", "summary": "Referenz(en) aufgenommen: FEDORA-2022-8109B472A3, FEDORA-2022-737E44718A" }, { "date": "2022-02-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-03T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-14T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Gentoo und SUSE aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "50" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "10.0.0-10.0.7.1", "product": { "name": "IBM Security Verify Access 10.0.0-10.0.7.1", "product_id": "T035657", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0_-_10.0.7.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698" } }, { "category": "product_version", "name": "Data Foundation 4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation 4.12.10", "product_id": "T031698-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-17594", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18218", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-18218" }, { "cve": "CVE-2019-19004", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19004" }, { "cve": "CVE-2019-19005", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19005" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-17541", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-17541" }, { "cve": "CVE-2020-18442", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-18442" }, { "cve": "CVE-2020-24370", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-24370" }, { "cve": "CVE-2020-8037", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-8037" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-20095" }, { "cve": "CVE-2021-28957", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-28957" }, { "cve": "CVE-2021-29922", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-29922" }, { "cve": "CVE-2021-3200", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3200" }, { "cve": "CVE-2021-3445", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3445" }, { "cve": "CVE-2021-3481", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3481" }, { "cve": "CVE-2021-3565", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3565" }, { "cve": "CVE-2021-3571", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3571" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3602", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3602" }, { "cve": "CVE-2021-36084", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36087" }, { "cve": "CVE-2021-42771", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "2951", "T002207", "67646", "T000126", "T027843", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-42771" } ] }
opensuse-su-2024:12090-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "autotrace-0.31.1-645.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the autotrace-0.31.1-645.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12090", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12090-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9182 page", "url": "https://www.suse.com/security/cve/CVE-2017-9182/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19004 page", "url": "https://www.suse.com/security/cve/CVE-2019-19004/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19005 page", "url": "https://www.suse.com/security/cve/CVE-2019-19005/" } ], "title": "autotrace-0.31.1-645.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12090-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "autotrace-0.31.1-645.1.aarch64", "product": { "name": "autotrace-0.31.1-645.1.aarch64", "product_id": "autotrace-0.31.1-645.1.aarch64" } }, { "category": "product_version", "name": "autotrace-devel-0.31.1-645.1.aarch64", "product": { "name": "autotrace-devel-0.31.1-645.1.aarch64", "product_id": "autotrace-devel-0.31.1-645.1.aarch64" } }, { "category": "product_version", "name": "libautotrace3-0.31.1-645.1.aarch64", "product": { "name": "libautotrace3-0.31.1-645.1.aarch64", "product_id": "libautotrace3-0.31.1-645.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "autotrace-0.31.1-645.1.ppc64le", "product": { "name": "autotrace-0.31.1-645.1.ppc64le", "product_id": "autotrace-0.31.1-645.1.ppc64le" } }, { "category": "product_version", "name": "autotrace-devel-0.31.1-645.1.ppc64le", "product": { "name": "autotrace-devel-0.31.1-645.1.ppc64le", "product_id": "autotrace-devel-0.31.1-645.1.ppc64le" } }, { "category": "product_version", "name": "libautotrace3-0.31.1-645.1.ppc64le", "product": { "name": "libautotrace3-0.31.1-645.1.ppc64le", "product_id": "libautotrace3-0.31.1-645.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "autotrace-0.31.1-645.1.s390x", "product": { "name": "autotrace-0.31.1-645.1.s390x", "product_id": "autotrace-0.31.1-645.1.s390x" } }, { "category": "product_version", "name": "autotrace-devel-0.31.1-645.1.s390x", "product": { "name": "autotrace-devel-0.31.1-645.1.s390x", "product_id": "autotrace-devel-0.31.1-645.1.s390x" } }, { "category": "product_version", "name": "libautotrace3-0.31.1-645.1.s390x", "product": { "name": "libautotrace3-0.31.1-645.1.s390x", "product_id": "libautotrace3-0.31.1-645.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "autotrace-0.31.1-645.1.x86_64", "product": { "name": "autotrace-0.31.1-645.1.x86_64", "product_id": "autotrace-0.31.1-645.1.x86_64" } }, { "category": "product_version", "name": "autotrace-devel-0.31.1-645.1.x86_64", "product": { "name": "autotrace-devel-0.31.1-645.1.x86_64", "product_id": "autotrace-devel-0.31.1-645.1.x86_64" } }, { "category": "product_version", "name": "libautotrace3-0.31.1-645.1.x86_64", "product": { "name": "libautotrace3-0.31.1-645.1.x86_64", "product_id": "libautotrace3-0.31.1-645.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "autotrace-0.31.1-645.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64" }, "product_reference": "autotrace-0.31.1-645.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0.31.1-645.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le" }, "product_reference": "autotrace-0.31.1-645.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0.31.1-645.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x" }, "product_reference": "autotrace-0.31.1-645.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-0.31.1-645.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64" }, "product_reference": "autotrace-0.31.1-645.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-devel-0.31.1-645.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64" }, "product_reference": "autotrace-devel-0.31.1-645.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-devel-0.31.1-645.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le" }, "product_reference": "autotrace-devel-0.31.1-645.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-devel-0.31.1-645.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x" }, "product_reference": "autotrace-devel-0.31.1-645.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "autotrace-devel-0.31.1-645.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64" }, "product_reference": "autotrace-devel-0.31.1-645.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libautotrace3-0.31.1-645.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64" }, "product_reference": "libautotrace3-0.31.1-645.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libautotrace3-0.31.1-645.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le" }, "product_reference": "libautotrace3-0.31.1-645.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libautotrace3-0.31.1-645.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x" }, "product_reference": "libautotrace3-0.31.1-645.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libautotrace3-0.31.1-645.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" }, "product_reference": "libautotrace3-0.31.1-645.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-9182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9182" } ], "notes": [ { "category": "general", "text": "libautotrace.a in AutoTrace 0.31.1 allows remote attackers to cause a denial of service (use-after-free and invalid heap read), related to the GET_COLOR function in color.c:16:11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9182", "url": "https://www.suse.com/security/cve/CVE-2017-9182" }, { "category": "external", "summary": "SUSE Bug 1040278 for CVE-2017-9182", "url": "https://bugzilla.suse.com/1040278" }, { "category": "external", "summary": "SUSE Bug 1182159 for CVE-2017-9182", "url": "https://bugzilla.suse.com/1182159" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-9182" }, { "cve": "CVE-2019-19004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19004" } ], "notes": [ { "category": "general", "text": "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19004", "url": "https://www.suse.com/security/cve/CVE-2019-19004" }, { "category": "external", "summary": "SUSE Bug 1182158 for CVE-2019-19004", "url": "https://bugzilla.suse.com/1182158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19004" }, { "cve": "CVE-2019-19005", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19005" } ], "notes": [ { "category": "general", "text": "A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19005", "url": "https://www.suse.com/security/cve/CVE-2019-19005" }, { "category": "external", "summary": "SUSE Bug 1182159 for CVE-2019-19005", "url": "https://bugzilla.suse.com/1182159" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:autotrace-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.s390x", "openSUSE Tumbleweed:autotrace-devel-0.31.1-645.1.x86_64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.aarch64", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.ppc64le", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.s390x", "openSUSE Tumbleweed:libautotrace3-0.31.1-645.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-19005" } ] }
cnvd-2021-13668
Vulnerability from cnvd
Title: AutoTrace输入验证错误漏洞
Description:
AutoTrace是一套用于将位图文件(Bitmap)转换为矢量文件(Vector)的软件。
Autotrace 0.31.1版本中存在输入验证错误漏洞,该漏洞源于网络系统或产品未对输入的数据进行正确的验证。目前没有详细的漏洞细节提供。
Severity: 中
Patch Name: AutoTrace输入验证错误漏洞的补丁
Patch Description:
AutoTrace是一套用于将位图文件(Bitmap)转换为矢量文件(Vector)的软件。
Autotrace 0.31.1版本中存在输入验证错误漏洞,该漏洞源于网络系统或产品未对输入的数据进行正确的验证。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c
Reference: https://github.com/autotrace/autotrace/pull/40
Name | AutoTrace AutoTrace 0.31.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-19004", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-19004" } }, "description": "AutoTrace\u662f\u4e00\u5957\u7528\u4e8e\u5c06\u4f4d\u56fe\u6587\u4ef6\uff08Bitmap\uff09\u8f6c\u6362\u4e3a\u77e2\u91cf\u6587\u4ef6\uff08Vector\uff09\u7684\u8f6f\u4ef6\u3002\n\nAutotrace 0.31.1\u7248\u672c\u4e2d\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u5bf9\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u6b63\u786e\u7684\u9a8c\u8bc1\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1ahttps://github.com/autotrace/autotrace/commits/master/src/input-bmp.c", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-13668", "openTime": "2021-03-01", "patchDescription": "AutoTrace\u662f\u4e00\u5957\u7528\u4e8e\u5c06\u4f4d\u56fe\u6587\u4ef6\uff08Bitmap\uff09\u8f6c\u6362\u4e3a\u77e2\u91cf\u6587\u4ef6\uff08Vector\uff09\u7684\u8f6f\u4ef6\u3002\r\n\r\nAutotrace 0.31.1\u7248\u672c\u4e2d\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u5bf9\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u6b63\u786e\u7684\u9a8c\u8bc1\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "AutoTrace\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "AutoTrace AutoTrace 0.31.1" }, "referenceLink": "https://github.com/autotrace/autotrace/pull/40", "serverity": "\u4e2d", "submitTime": "2021-02-25", "title": "AutoTrace\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.