Action not permitted
Modal body text goes here.
CVE-2020-24370
Vulnerability from cvelistv5
Published
2020-08-17 00:00
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lua-users.org/lists/lua-l/2020-07/msg00324.html | Exploit, Mailing List, Vendor Advisory | |
cve@mitre.org | https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b | Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html | Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/ | Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/ | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:08.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b" }, { "name": "FEDORA-2020-d7ed9f18ff", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/" }, { "name": "FEDORA-2020-c83556709c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/" }, { "name": "[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html" }, { "name": "[debian-lts-announce] 20230622 [SECURITY] [DLA 3469-1] lua5.3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" }, { "url": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b" }, { "name": "FEDORA-2020-d7ed9f18ff", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/" }, { "name": "FEDORA-2020-c83556709c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/" }, { "name": "[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html" }, { "name": "[debian-lts-announce] 20230622 [SECURITY] [DLA 3469-1] lua5.3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24370", "datePublished": "2020-08-17T00:00:00", "dateReserved": "2020-08-17T00:00:00", "dateUpdated": "2024-08-04T15:12:08.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-24370\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-08-17T17:15:13.877\",\"lastModified\":\"2024-09-09T13:54:27.700\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).\"},{\"lang\":\"es\",\"value\":\"El archivo ldebug.c en Lua versi\u00f3n 5.4.0, permite un desbordamiento de negaci\u00f3n y un error de segmentaci\u00f3n en getlocal y setlocal, como es demostrado por getlocal (3,2^31).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41B4A37-B7E5-4405-B5EA-5F1832AF02E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2191642-D493-4813-87BF-20AD2E63A2AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"D810ACDB-A811-4B70-AA77-E724CD0242B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A8D450-9B86-43DC-93A1-F68E42391948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2293D8C6-2D69-49EF-8BB9-F5222951386B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25977A23-CF7A-4C39-8F0D-38E958E92F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6820CE33-926F-477F-A99E-153E88BD5248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D651FE4-77A4-47CC-8EC6-FB8D35A2316F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBD494F-5C56-4472-9C02-09A14222E024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED403C07-5D1C-4027-9A07-DD7AC4B9442E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69EE245-6921-4EC4-B052-558A3BA259E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE6741D-A69C-4D2E-B5C9-EC44792BA871\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE86E188-EB0F-4D54-B1E7-0213C099DAB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D6D7F5-0738-45EB-A4F2-9A65F8DD2D0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.4.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F78BF8-B73C-42C6-AF54-2CD935670053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.4.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F49EE868-BA14-48D2-9C97-B52E6576EC62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:5.4.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9117B51-57B0-4648-B937-69A6DAC06134\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://lua-users.org/lists/lua-l/2020-07/msg00324.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
sca-2025-0006
Vulnerability from csaf_sick
Published
2025-04-28 13:00
Modified
2025-04-28 13:00
Summary
Vulnerability affecting picoScan and multiScan
Notes
summary
SICK has identified a Denial of Service vulnerability (CVE-2025-32472) in picoScan and multiScan, which can cause the web page to become unresponsive. Due to their architectural design, these products are not affected by the other vulnerabilities listed in this advisory. Currently SICK is not aware of any public exploits specifically targeting the vulnerability. SICK recommends applying the mitigation for CVE-2025-32472.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK has identified a Denial of Service vulnerability (CVE-2025-32472) in picoScan and multiScan, which can cause the web page to become unresponsive. Due to their architectural design, these products are not affected by the other vulnerabilities listed in this advisory. Currently SICK is not aware of any public exploits specifically targeting the vulnerability. SICK recommends applying the mitigation for CVE-2025-32472.", "title": "summary" }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0006.json" } ], "title": "Vulnerability affecting picoScan and multiScan", "tracking": { "current_release_date": "2025-04-28T13:00:00.000Z", "generator": { "date": "2025-04-28T06:38:33.857Z", "engine": { "name": "Secvisogram", "version": "2.5.24" } }, "id": "SCA-2025-0006", "initial_release_date": "2025-04-28T13:00:00.000Z", "revision_history": [ { "date": "2025-04-28T13:00:00.000Z", "number": "1", "summary": "Initial version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK picoScan1XX all versions", "product_id": "CSAFPID-0001", "product_identification_helper": { "skus": [ "1134607", "1134608", "1134609", "1134610", "1141395", "1141396", "1141397", "1141751", "1142269", "1142270", "1142272", "1142273" ] } } } ], "category": "product_name", "name": "picoScan1XX" } ], "category": "product_family", "name": "picoScan100" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK multiScan1XX all versions", "product_id": "CSAFPID-0002", "product_identification_helper": { "skus": [ "1131164", "1137723", "1140110", "1140133", "1140134", "1141496", "1143873" ] } } } ], "category": "product_name", "name": "multiScan1XX" } ], "category": "product_family", "name": "multiScan100" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK picoScan1XX Firmware all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "picoScan1XX Firmware" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK multiScan1XX Firmware all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "multiScan1XX Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK picoScan1XX all Firmware versions", "product_id": "CSAFPID-0005" }, "product_reference": "CSAFPID-0003", "relates_to_product_reference": "CSAFPID-0001" }, { "category": "installed_on", "full_product_name": { "name": "SICK multiScan1XX all Firmware versions", "product_id": "CSAFPID-0006" }, "product_reference": "CSAFPID-0004", "relates_to_product_reference": "CSAFPID-0002" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-32472", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "audience": "all", "category": "summary", "text": "The multiScan and picoScan are vulnerable to a denial-of-service (DoS) attack. A remote attacker can exploit this vulnerability by conducting a Slowloris-type attack, causing the web page to become unresponsive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \u201dSICK Operating Guidelines\u201d and \u201dICS-CERT recommended practices on Industrial Security\u201d could help to implement the general security practices. Additionally, the web server can be disabled via the CyberSecurity page in the UI.", "product_ids": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Denial-of-Service Vulnerability in multiScan and picoScan via Slowloris Attack" }, { "cve": "CVE-2024-38517", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "audience": "all", "category": "summary", "text": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Tencent RapidJSON Vulnerable to Privilege Escalation via Integer Underflow in GenericReader::ParseNumber() Function" }, { "cve": "CVE-2024-39684", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "audience": "all", "category": "summary", "text": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the GenericReader::ParseNumber() function of include/rapidjson/reader.h when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Tencent RapidJSON Vulnerable to Privilege Escalation via Integer Overflow in GenericReader::ParseNumber() Function" }, { "cve": "CVE-2022-46908", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "audience": "all", "category": "summary", "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.3, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7.3, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "SQLite Vulnerable to Protection Mechanism Bypass via Improper Implementation of \u0027azProhibitedFunctions\u0027" }, { "cve": "CVE-2021-36690", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "audience": "all", "category": "summary", "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "SQLite Vulnerable to Denial-of-Service (DoS) via Segmentation Fault in \u0027idxGetTableInfo\u0027 Function" }, { "cve": "CVE-2022-35737", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "audience": "all", "category": "summary", "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "SQLite Vulnerable to Memory Corruption via Stack-Based Buffer Overflow in \u0027sqlite3_str_vappendf()\u0027 Function Used by \u0027printf\u0027 Family API Implementations" }, { "cve": "CVE-2021-45346", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "audience": "all", "category": "summary", "text": "A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 4.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 4.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "SQLite Vulnerable to Information Disclosure via Maliciously Crafted Queries" }, { "cve": "CVE-2023-7104", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "audience": "all", "category": "summary", "text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "environmentalScore": 7.3, "environmentalSeverity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.3, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "SQLite Vulnerable to Out-of-Bounds Memory Access via Insufficient Input Validation in \u0027sessionReadRecord\u0027 Function of \u0027Sessions\u0027 Extension" }, { "cve": "CVE-2022-28805", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "audience": "all", "category": "summary", "text": "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.1, "environmentalSeverity": "CRITICAL", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.1, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) and Information Disclosure via Heap-Based Buffer Over-Read in \u0027luaH_getshortstr\u0027 Function" }, { "cve": "CVE-2020-24370", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "audience": "all", "category": "summary", "text": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Integer Overflow in \u0027ldebug.c\u0027 File" }, { "cve": "CVE-2021-43519", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "audience": "all", "category": "summary", "text": "Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack-Based Buffer Overflow in \u0027ldo.c\u0027" }, { "cve": "CVE-2020-24369", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "audience": "all", "category": "summary", "text": "ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack-Based Buffer Overflow in \u0027ldo.c\u0027" }, { "cve": "CVE-2020-24371", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "audience": "all", "category": "summary", "text": "lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Information Disclosure via Mishandled Interaction Between Barriers and Sweep Phase" }, { "cve": "CVE-2022-33099", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "audience": "all", "category": "summary", "text": "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack Overflow in \u0027luaG_runerror\u0027 Function" }, { "cve": "CVE-2020-15945", "cwe": { "id": "CWE-229", "name": "Improper Handling of Values" }, "notes": [ { "audience": "all", "category": "summary", "text": "Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service via \u0027changedline\u0027 Function" }, { "cve": "CVE-2020-15888", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "audience": "all", "category": "summary", "text": "Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 8.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 8.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Multiple Heap Related Memory Errors via Garbage Collection \u0027Stack Resizing\u0027" }, { "cve": "CVE-2020-24342", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "audience": "all", "category": "summary", "text": "Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Lua Vulnerable to Denial-of-Service (DoS) via Stack Overflow in \u0027luaD_callnoyield\u0027 Function" }, { "cve": "CVE-2024-10525", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "audience": "all", "category": "summary", "text": "In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Heap-Based-Buffer Overflow in Crafted SUBACK Packet in libmosquitto Component" }, { "cve": "CVE-2024-8376", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "audience": "all", "category": "summary", "text": "In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of \"CONNECT\", \"DISCONNECT\", \"SUBSCRIBE\", \"UNSUBSCRIBE\" and \"PUBLISH\" packets.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Specific Sequences in Packet Handling Component" }, { "cve": "CVE-2023-28366", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "audience": "all", "category": "summary", "text": "The broker in Eclipse Mosquitto 1.3.2 through 2.x before 2.0.16 has a memory leak that can be abused remotely when a client sends many QoS 2 messages with duplicate message IDs, and fails to respond to PUBREC commands. This occurs because of mishandling of EAGAIN from the libc send function.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Memory Leak Triggered by Duplicate QoS 2 Messages" }, { "cve": "CVE-2023-3592", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "audience": "all", "category": "summary", "text": "In Mosquitto before 2.0.16, a memory leak occurs when clients send v5 CONNECT packets with a will message that contains invalid property types.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Memory Leak in \u0027v5 CONNECT\u0027 Packets" }, { "cve": "CVE-2024-3935", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "audience": "all", "category": "summary", "text": "In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Eclipse Mosquitto Vulnerable to Memory Corruption via Double Free in Crafted PUBLISH Packet in Outgoing Bridge Connection" }, { "cve": "CVE-2023-0809", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "audience": "all", "category": "summary", "text": "In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0005", "CSAFPID-0006" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "Mosquitto Vulnerable to Denial-of-Service (DoS) via Excessive Memory Allocation" } ] }
gsd-2020-24370
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-24370", "description": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).", "id": "GSD-2020-24370", "references": [ "https://www.suse.com/security/cve/CVE-2020-24370.html", "https://access.redhat.com/errata/RHSA-2021:4510", "https://advisories.mageia.org/CVE-2020-24370.html", "https://linux.oracle.com/cve/CVE-2020-24370.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-24370" ], "details": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).", "id": "GSD-2020-24370", "modified": "2023-12-13T01:22:12.745747Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html", "refsource": "MISC", "url": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" }, { "name": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b", "refsource": "MISC", "url": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b" }, { "name": "FEDORA-2020-d7ed9f18ff", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/" }, { "name": "FEDORA-2020-c83556709c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/" }, { "name": "[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html" }, { "name": "[debian-lts-announce] 20230622 [SECURITY] [DLA 3469-1] lua5.3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "=5.4.0", "affected_versions": "Version 5.4.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cwe_ids": [ "CWE-1035", "CWE-191", "CWE-937" ], "date": "2020-09-26", "description": "`ldebug.c` allows a negation overflow and segmentation fault in `getlocal` and `setlocal`.", "fixed_versions": [], "identifier": "CVE-2020-24370", "identifiers": [ "CVE-2020-24370" ], "not_impacted": "", "package_slug": "conan/lua", "pubdate": "2020-08-17", "solution": "Unfortunately, there is no solution available yet.", "title": "Integer Underflow (Wrap or Wraparound)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-24370", "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" ], "uuid": "4ce42cff-a0ce-420c-9d0d-63363b62b1e7" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:lua:lua:5.4.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24370" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-191" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b" }, { "name": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" }, { "name": "FEDORA-2020-d7ed9f18ff", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/" }, { "name": "FEDORA-2020-c83556709c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/" }, { "name": "[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html" }, { "name": "[debian-lts-announce] 20230622 [SECURITY] [DLA 3469-1] lua5.3 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2023-06-23T01:15Z", "publishedDate": "2020-08-17T17:15Z" } } }
ghsa-gfr4-c37g-mm3v
Vulnerability from github
Published
2022-05-24 17:26
Modified
2024-09-09 15:30
Severity ?
Details
ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
{ "affected": [], "aliases": [ "CVE-2020-24370" ], "database_specific": { "cwe_ids": [ "CWE-191" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-08-17T17:15:00Z", "severity": "MODERATE" }, "details": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).", "id": "GHSA-gfr4-c37g-mm3v", "modified": "2024-09-09T15:30:37Z", "published": "2022-05-24T17:26:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24370" }, { "type": "WEB", "url": "https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ" }, { "type": "WEB", "url": "http://lua-users.org/lists/lua-l/2020-07/msg00324.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
rhsa-2021_4510
Vulnerability from csaf_redhat
Published
2021-11-09 18:31
Modified
2024-09-16 06:19
Summary
Red Hat Security Advisory: lua security update
Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for lua is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4510", "url": "https://access.redhat.com/errata/RHSA-2021:4510" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1870290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870290" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4510.json" } ], "title": "Red Hat Security Advisory: lua security update", "tracking": { "current_release_date": "2024-09-16T06:19:31+00:00", "generator": { "date": "2024-09-16T06:19:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4510", "initial_release_date": "2021-11-09T18:31:03+00:00", "revision_history": [ { "date": "2021-11-09T18:31:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:31:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T06:19:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "lua-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-0:5.3.4-12.el8.aarch64", "product_id": "lua-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "lua-debugsource-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-debugsource-0:5.3.4-12.el8.aarch64", "product_id": "lua-debugsource-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debugsource@5.3.4-12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "product_id": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debuginfo@5.3.4-12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "product_id": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.3.4-12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "lua-libs-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-libs-0:5.3.4-12.el8.aarch64", "product_id": "lua-libs-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "lua-devel-0:5.3.4-12.el8.aarch64", "product": { "name": "lua-devel-0:5.3.4-12.el8.aarch64", "product_id": "lua-devel-0:5.3.4-12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-devel@5.3.4-12.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "lua-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-0:5.3.4-12.el8.ppc64le", "product_id": "lua-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "product_id": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debugsource@5.3.4-12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "product_id": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debuginfo@5.3.4-12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "product_id": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.3.4-12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "lua-libs-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-libs-0:5.3.4-12.el8.ppc64le", "product_id": "lua-libs-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "lua-devel-0:5.3.4-12.el8.ppc64le", "product": { "name": "lua-devel-0:5.3.4-12.el8.ppc64le", "product_id": "lua-devel-0:5.3.4-12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-devel@5.3.4-12.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "lua-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-0:5.3.4-12.el8.x86_64", "product_id": "lua-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "lua-debugsource-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-debugsource-0:5.3.4-12.el8.x86_64", "product_id": "lua-debugsource-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debugsource@5.3.4-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "product_id": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debuginfo@5.3.4-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "product_id": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.3.4-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "lua-libs-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-libs-0:5.3.4-12.el8.x86_64", "product_id": "lua-libs-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "lua-devel-0:5.3.4-12.el8.x86_64", "product": { "name": "lua-devel-0:5.3.4-12.el8.x86_64", "product_id": "lua-devel-0:5.3.4-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-devel@5.3.4-12.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "lua-0:5.3.4-12.el8.s390x", "product": { "name": "lua-0:5.3.4-12.el8.s390x", "product_id": "lua-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=s390x" } } }, { "category": "product_version", "name": "lua-debugsource-0:5.3.4-12.el8.s390x", "product": { "name": "lua-debugsource-0:5.3.4-12.el8.s390x", "product_id": "lua-debugsource-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debugsource@5.3.4-12.el8?arch=s390x" } } }, { "category": "product_version", "name": "lua-debuginfo-0:5.3.4-12.el8.s390x", "product": { "name": "lua-debuginfo-0:5.3.4-12.el8.s390x", "product_id": "lua-debuginfo-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debuginfo@5.3.4-12.el8?arch=s390x" } } }, { "category": "product_version", "name": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "product": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "product_id": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.3.4-12.el8?arch=s390x" } } }, { "category": "product_version", "name": "lua-libs-0:5.3.4-12.el8.s390x", "product": { "name": "lua-libs-0:5.3.4-12.el8.s390x", "product_id": "lua-libs-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=s390x" } } }, { "category": "product_version", "name": "lua-devel-0:5.3.4-12.el8.s390x", "product": { "name": "lua-devel-0:5.3.4-12.el8.s390x", "product_id": "lua-devel-0:5.3.4-12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-devel@5.3.4-12.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "lua-0:5.3.4-12.el8.src", "product": { "name": "lua-0:5.3.4-12.el8.src", "product_id": "lua-0:5.3.4-12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "lua-libs-0:5.3.4-12.el8.i686", "product": { "name": "lua-libs-0:5.3.4-12.el8.i686", "product_id": "lua-libs-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=i686" } } }, { "category": "product_version", "name": "lua-debugsource-0:5.3.4-12.el8.i686", "product": { "name": "lua-debugsource-0:5.3.4-12.el8.i686", "product_id": "lua-debugsource-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debugsource@5.3.4-12.el8?arch=i686" } } }, { "category": "product_version", "name": "lua-debuginfo-0:5.3.4-12.el8.i686", "product": { "name": "lua-debuginfo-0:5.3.4-12.el8.i686", "product_id": "lua-debuginfo-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-debuginfo@5.3.4-12.el8?arch=i686" } } }, { "category": "product_version", "name": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "product": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "product_id": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.3.4-12.el8?arch=i686" } } }, { "category": "product_version", "name": "lua-0:5.3.4-12.el8.i686", "product": { "name": "lua-0:5.3.4-12.el8.i686", "product_id": "lua-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua@5.3.4-12.el8?arch=i686" } } }, { "category": "product_version", "name": "lua-devel-0:5.3.4-12.el8.i686", "product": { "name": "lua-devel-0:5.3.4-12.el8.i686", "product_id": "lua-devel-0:5.3.4-12.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/lua-devel@5.3.4-12.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.i686" }, "product_reference": "lua-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.src" }, "product_reference": "lua-0:5.3.4-12.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686" }, "product_reference": "lua-devel-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-devel-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-devel-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.i686" }, "product_reference": "lua-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.src" }, "product_reference": "lua-0:5.3.4-12.el8.src", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686" }, "product_reference": "lua-devel-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-devel-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-devel-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.i686" }, "product_reference": "lua-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.src" }, "product_reference": "lua-0:5.3.4-12.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-debugsource-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-debugsource-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686" }, "product_reference": "lua-devel-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-devel-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-devel-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-devel-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-devel-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.i686", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" }, "product_reference": "lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24370", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2020-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1870290" } ], "notes": [ { "category": "description", "text": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).", "title": "Vulnerability description" }, { "category": "summary", "text": "lua: segmentation fault in getlocal and setlocal functions in ldebug.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.src", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.src", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.src", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24370" }, { "category": "external", "summary": "RHBZ#1870290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24370", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24370" } ], "release_date": "2020-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.src", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.src", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.src", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4510" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.src", "AppStream-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "AppStream-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.src", "BaseOS-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "BaseOS-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.src", "CRB-8.5.0.GA:lua-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debuginfo-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-debugsource-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-devel-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-0:5.3.4-12.el8.x86_64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.aarch64", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.i686", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.ppc64le", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.s390x", "CRB-8.5.0.GA:lua-libs-debuginfo-0:5.3.4-12.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "lua: segmentation fault in getlocal and setlocal functions in ldebug.c" } ] }
wid-sec-w-2022-0571
Vulnerability from csaf_certbund
Published
2021-11-09 23:00
Modified
2024-08-13 22:00
Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0571 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0571.json" }, { "category": "self", "summary": "WID-SEC-2022-0571 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0571" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4158" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4172" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4201" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4221" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4222" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4236" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4270" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4288" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4316" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4321" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4374" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4382" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4408" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4413" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4426" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4455" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4464" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4510" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4513" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4519" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-159 vom 2021-11-11", "url": "https://downloads.avaya.com/css/P8/documents/101078544" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4032 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4032" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4382 vom 2021-11-16", "url": "https://linux.oracle.com/errata/ELSA-2021-4382.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4222 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4222.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-4221 vom 2021-11-17", "url": "https://linux.oracle.com/errata/ELSA-2021-4221.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4848 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4845 vom 2021-11-29", "url": "https://access.redhat.com/errata/RHSA-2021:4845" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3945-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4002-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4001-1 vom 2021-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4051-1 vom 2021-12-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009896.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:4155-1 vom 2021-12-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0064-1 vom 2022-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5241-1 vom 2022-01-19", "url": "https://ubuntu.com/security/notices/USN-5241-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-1 vom 2022-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1742 vom 2022-01-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1742.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0184-2 vom 2022-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-030 vom 2022-02-26", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:23018-1 vom 2022-03-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0856 vom 2022-03-14", "url": "https://access.redhat.com/errata/RHSA-2022:0856" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5391-1 vom 2022-04-27", "url": "https://ubuntu.com/security/notices/USN-5391-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9341 vom 2022-04-28", "url": "https://linux.oracle.com/errata/ELSA-2022-9341.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5498 vom 2022-07-05", "url": "https://access.redhat.com/errata/RHSA-2022:5498" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-093 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-093.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", "url": "https://ubuntu.com/security/notices/USN-5553-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-03 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-03" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3001-1 vom 2022-09-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", "url": "https://ubuntu.com/security/notices/USN-5631-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-09 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-09" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3590-1 vom 2022-10-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3836-1 vom 2022-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012792.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7529 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7529.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0411 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0411" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2010 vom 2023-04-05", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2010.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1086 vom 2024-03-05", "url": "https://access.redhat.com/errata/RHSA-2024:1086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1154 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0573 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0573" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12349 vom 2023-05-24", "url": "http://linux.oracle.com/errata/ELSA-2023-12349.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2079 vom 2023-06-08", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2079.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://alas.aws.amazon.com/ALAS-2024-1921.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1921 vom 2024-02-19", "url": "https://www.cybersecurity-help.cz/vdb/SB2024021950" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1918 vom 2024-02-06", "url": "https://alas.aws.amazon.com/ALAS-2024-1918.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASSELINUX-NG-2023-001 vom 2023-09-27", "url": "https://alas.aws.amazon.com/AL2/ALASSELINUX-NG-2023-001.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2307 vom 2023-10-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2307.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6431 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6976 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:6976" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0970-1 vom 2024-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018191.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-20 vom 2024-05-07", "url": "https://security.gentoo.org/glsa/202405-20" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1846-1 vom 2024-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018628.html" }, { "category": "external", "summary": "IBM Security Bulletin 7158789 vom 2024-06-26", "url": "https://www.ibm.com/support/pages/node/7158789" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2620 vom 2024-08-13", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2620.html" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-13T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:31:06.253+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0571", "initial_release_date": "2021-11-09T23:00:00.000+00:00", "revision_history": [ { "date": "2021-11-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-11-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-11-29T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-14T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-22T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-01-25T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-09T23:00:00.000+00:00", "number": "14", "summary": "Referenz(en) aufgenommen: FEDORA-2022-8109B472A3, FEDORA-2022-737E44718A" }, { "date": "2022-02-17T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-03T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-14T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Gentoo und SUSE aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "48" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "10.0.0-10.0.7.1", "product": { "name": "IBM Security Verify Access 10.0.0-10.0.7.1", "product_id": "T035657", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0_-_10.0.7.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698" } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-17594", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18218", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-18218" }, { "cve": "CVE-2019-19004", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19004" }, { "cve": "CVE-2019-19005", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2019-19005" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-17541", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-17541" }, { "cve": "CVE-2020-18442", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-18442" }, { "cve": "CVE-2020-24370", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-24370" }, { "cve": "CVE-2020-8037", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2020-8037" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-20095" }, { "cve": "CVE-2021-28957", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-28957" }, { "cve": "CVE-2021-29922", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-29922" }, { "cve": "CVE-2021-3200", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3200" }, { "cve": "CVE-2021-3445", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3445" }, { "cve": "CVE-2021-3481", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3481" }, { "cve": "CVE-2021-3565", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3565" }, { "cve": "CVE-2021-3571", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3571" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3602", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-3602" }, { "cve": "CVE-2021-36084", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-36087" }, { "cve": "CVE-2021-42771", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Die Fehler existieren in den Komponenten python-lxml, qt5, python-babel, container-tools:2.0, container-tools:3.0, tcpdump, rust-toolset, libjpeg-turbo, zziplib, linuxptp, file, json-c, libsolv, tpm2-tools, ncurses, python-pip, dnf, dnf-plugins-core, libdnf, lua, libsepol und autotrace. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren und einen nicht spezifizierten Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T035657", "T015519", "T031698", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2021-11-09T23:00:00.000+00:00", "title": "CVE-2021-42771" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.