Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-20483
Vulnerability from cvelistv5
Published
2018-12-26 18:00
Modified
2024-08-05 12:05
Severity ?
EPSS score ?
Summary
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:05:16.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201903-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-08" }, { "name": "106358", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106358" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" }, { "name": "USN-3943-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3943-1/" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-26T00:00:00", "descriptions": [ { "lang": "en", "value": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:08:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201903-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201903-08" }, { "name": "106358", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106358" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" }, { "name": "USN-3943-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3943-1/" }, { "name": "RHSA-2019:3701", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201903-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-08" }, { "name": "106358", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106358" }, { "name": "https://twitter.com/marcan42/status/1077676739877232640", "refsource": "MISC", "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "name": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS", "refsource": "MISC", "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "name": "https://security.netapp.com/advisory/ntap-20190321-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" }, { "name": "USN-3943-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3943-1/" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20483", "datePublished": "2018-12-26T18:00:00", "dateReserved": "2018-12-26T00:00:00", "dateUpdated": "2024-08-05T12:05:16.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-20483\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-12-26T18:29:00.480\",\"lastModified\":\"2024-11-21T04:01:34.493\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.\"},{\"lang\":\"es\",\"value\":\"set_file_metadata en xattr.c en GNU Wget, en versiones anteriores a la 1.20.1, almacena la URL de origen de un archivo en el atributo de metadatos user.xdg.origin.url de los atributos extendidos del archivo descargado. Esto permite que usuarios locales obtengan informaci\u00f3n sensible (como credenciales contenidas en la URL) al leer este atributo, tal y como queda demostrado con getfattr. Esto tambi\u00e9n aplica a la informaci\u00f3n de Referer en el atributo de metadatos user.xdg.referrer.url. Seg\u00fan la entrada del 22/07/2016 en el ChangeLog de Wget, user.xdg.origin.url estaba parcialmente basado en el comportamiento de fwrite_xattr en tool_xattr.c en curl.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.20.1\",\"matchCriteriaId\":\"84434C8C-F6C0-4FBC-B469-9E45D98FFE75\"}]}]}],\"references\":[{\"url\":\"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106358\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3701\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201903-08\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190321-0002/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://twitter.com/marcan42/status/1077676739877232640\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3943-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3701\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201903-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190321-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://twitter.com/marcan42/status/1077676739877232640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3943-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2019_3701
Vulnerability from csaf_redhat
Published
2019-11-05 22:28
Modified
2024-11-22 13:17
Summary
Red Hat Security Advisory: curl security and bug fix update
Notes
Topic
An update for curl is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: NTLM type-2 heap out-of-bounds buffer read (CVE-2018-16890)
* wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)
* curl: NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822)
* curl: SMTP end-of-response out-of-bounds read (CVE-2019-3823)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for curl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.\n\nSecurity Fix(es):\n\n* curl: NTLM type-2 heap out-of-bounds buffer read (CVE-2018-16890)\n\n* wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)\n\n* curl: NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822)\n\n* curl: SMTP end-of-response out-of-bounds read (CVE-2019-3823)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3701", "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/" }, { "category": "external", "summary": "1662705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662705" }, { "category": "external", "summary": "1669156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669156" }, { "category": "external", "summary": "1670252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252" }, { "category": "external", "summary": "1670254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254" }, { "category": "external", "summary": "1670256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3701.json" } ], "title": "Red Hat Security Advisory: curl security and bug fix update", "tracking": { "current_release_date": "2024-11-22T13:17:19+00:00", "generator": { "date": "2024-11-22T13:17:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3701", "initial_release_date": "2019-11-05T22:28:38+00:00", "revision_history": [ { "date": "2019-11-05T22:28:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-05T22:28:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:17:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.61.1-11.el8.aarch64", "product": { "name": "curl-0:7.61.1-11.el8.aarch64", "product_id": "curl-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libcurl-0:7.61.1-11.el8.aarch64", "product": { "name": "libcurl-0:7.61.1-11.el8.aarch64", "product_id": "libcurl-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.61.1-11.el8.aarch64", "product": { "name": "curl-debuginfo-0:7.61.1-11.el8.aarch64", "product_id": "curl-debuginfo-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product_id": "curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-minimal-debuginfo@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "curl-debugsource-0:7.61.1-11.el8.aarch64", "product": { "name": "curl-debugsource-0:7.61.1-11.el8.aarch64", "product_id": "curl-debugsource-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debugsource@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libcurl-minimal-0:7.61.1-11.el8.aarch64", "product": { "name": "libcurl-minimal-0:7.61.1-11.el8.aarch64", "product_id": "libcurl-minimal-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "product": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "product_id": "libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-debuginfo@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.61.1-11.el8.aarch64", "product": { "name": "libcurl-devel-0:7.61.1-11.el8.aarch64", "product_id": "libcurl-devel-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.61.1-11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product_id": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal-debuginfo@7.61.1-11.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.61.1-11.el8.x86_64", "product": { "name": "curl-0:7.61.1-11.el8.x86_64", "product_id": "curl-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-0:7.61.1-11.el8.x86_64", "product": { "name": "libcurl-0:7.61.1-11.el8.x86_64", "product_id": "libcurl-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.61.1-11.el8.x86_64", "product": { "name": "curl-debuginfo-0:7.61.1-11.el8.x86_64", "product_id": "curl-debuginfo-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product_id": "curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-minimal-debuginfo@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debugsource-0:7.61.1-11.el8.x86_64", "product": { "name": "curl-debugsource-0:7.61.1-11.el8.x86_64", "product_id": "curl-debugsource-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debugsource@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-minimal-0:7.61.1-11.el8.x86_64", "product": { "name": "libcurl-minimal-0:7.61.1-11.el8.x86_64", "product_id": "libcurl-minimal-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "product": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "product_id": "libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-debuginfo@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.61.1-11.el8.x86_64", "product": { "name": "libcurl-devel-0:7.61.1-11.el8.x86_64", "product_id": "libcurl-devel-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.61.1-11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product_id": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal-debuginfo@7.61.1-11.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libcurl-0:7.61.1-11.el8.i686", "product": { "name": "libcurl-0:7.61.1-11.el8.i686", "product_id": "libcurl-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.61.1-11.el8.i686", "product": { "name": "curl-debuginfo-0:7.61.1-11.el8.i686", "product_id": "curl-debuginfo-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product_id": "curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-minimal-debuginfo@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "curl-debugsource-0:7.61.1-11.el8.i686", "product": { "name": "curl-debugsource-0:7.61.1-11.el8.i686", "product_id": "curl-debugsource-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debugsource@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "libcurl-minimal-0:7.61.1-11.el8.i686", "product": { "name": "libcurl-minimal-0:7.61.1-11.el8.i686", "product_id": "libcurl-minimal-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "libcurl-debuginfo-0:7.61.1-11.el8.i686", "product": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.i686", "product_id": "libcurl-debuginfo-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-debuginfo@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.61.1-11.el8.i686", "product": { "name": "libcurl-devel-0:7.61.1-11.el8.i686", "product_id": "libcurl-devel-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.61.1-11.el8?arch=i686" } } }, { "category": "product_version", "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product_id": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal-debuginfo@7.61.1-11.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.61.1-11.el8.s390x", "product": { "name": "curl-0:7.61.1-11.el8.s390x", "product_id": "curl-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-0:7.61.1-11.el8.s390x", "product": { "name": "libcurl-0:7.61.1-11.el8.s390x", "product_id": "libcurl-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.61.1-11.el8.s390x", "product": { "name": "curl-debuginfo-0:7.61.1-11.el8.s390x", "product_id": "curl-debuginfo-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product_id": "curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-minimal-debuginfo@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "curl-debugsource-0:7.61.1-11.el8.s390x", "product": { "name": "curl-debugsource-0:7.61.1-11.el8.s390x", "product_id": "curl-debugsource-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debugsource@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-minimal-0:7.61.1-11.el8.s390x", "product": { "name": "libcurl-minimal-0:7.61.1-11.el8.s390x", "product_id": "libcurl-minimal-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-debuginfo-0:7.61.1-11.el8.s390x", "product": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.s390x", "product_id": "libcurl-debuginfo-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-debuginfo@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.61.1-11.el8.s390x", "product": { "name": "libcurl-devel-0:7.61.1-11.el8.s390x", "product_id": "libcurl-devel-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.61.1-11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product_id": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal-debuginfo@7.61.1-11.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.61.1-11.el8.src", "product": { "name": "curl-0:7.61.1-11.el8.src", "product_id": "curl-0:7.61.1-11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.61.1-11.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.61.1-11.el8.ppc64le", "product": { "name": "curl-0:7.61.1-11.el8.ppc64le", "product_id": "curl-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libcurl-0:7.61.1-11.el8.ppc64le", "product": { "name": "libcurl-0:7.61.1-11.el8.ppc64le", "product_id": "libcurl-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.61.1-11.el8.ppc64le", "product": { "name": "curl-debuginfo-0:7.61.1-11.el8.ppc64le", "product_id": "curl-debuginfo-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product_id": "curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-minimal-debuginfo@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "curl-debugsource-0:7.61.1-11.el8.ppc64le", "product": { "name": "curl-debugsource-0:7.61.1-11.el8.ppc64le", "product_id": "curl-debugsource-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debugsource@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libcurl-minimal-0:7.61.1-11.el8.ppc64le", "product": { "name": "libcurl-minimal-0:7.61.1-11.el8.ppc64le", "product_id": "libcurl-minimal-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "product": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "product_id": "libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-debuginfo@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.61.1-11.el8.ppc64le", "product": { "name": "libcurl-devel-0:7.61.1-11.el8.ppc64le", "product_id": "libcurl-devel-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.61.1-11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product_id": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-minimal-debuginfo@7.61.1-11.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64" }, "product_reference": "curl-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le" }, "product_reference": "curl-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x" }, "product_reference": "curl-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.61.1-11.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src" }, "product_reference": "curl-0:7.61.1-11.el8.src", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64" }, "product_reference": "curl-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64" }, "product_reference": "curl-debuginfo-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686" }, "product_reference": "curl-debuginfo-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le" }, "product_reference": "curl-debuginfo-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x" }, "product_reference": "curl-debuginfo-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64" }, "product_reference": "curl-debuginfo-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debugsource-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64" }, "product_reference": "curl-debugsource-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debugsource-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686" }, "product_reference": "curl-debugsource-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debugsource-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le" }, "product_reference": "curl-debugsource-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debugsource-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x" }, "product_reference": "curl-debugsource-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debugsource-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64" }, "product_reference": "curl-debugsource-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64" }, "product_reference": "curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686" }, "product_reference": "curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le" }, "product_reference": "curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x" }, "product_reference": "curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" }, "product_reference": "curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64" }, "product_reference": "libcurl-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686" }, "product_reference": "libcurl-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le" }, "product_reference": "libcurl-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x" }, "product_reference": "libcurl-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64" }, "product_reference": "libcurl-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64" }, "product_reference": "libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686" }, "product_reference": "libcurl-debuginfo-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le" }, "product_reference": "libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x" }, "product_reference": "libcurl-debuginfo-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-debuginfo-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64" }, "product_reference": "libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64" }, "product_reference": "libcurl-devel-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686" }, "product_reference": "libcurl-devel-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le" }, "product_reference": "libcurl-devel-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x" }, "product_reference": "libcurl-devel-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64" }, "product_reference": "libcurl-devel-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64" }, "product_reference": "libcurl-minimal-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686" }, "product_reference": "libcurl-minimal-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le" }, "product_reference": "libcurl-minimal-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x" }, "product_reference": "libcurl-minimal-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64" }, "product_reference": "libcurl-minimal-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64" }, "product_reference": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686" }, "product_reference": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le" }, "product_reference": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x" }, "product_reference": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" }, "product_reference": "libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Daniel Stenberg" ], "organization": "the Curl project" }, { "names": [ "Wenxiang Qian" ], "organization": "Tencent Blade Team", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2018-16890", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1670252" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: NTLM type-2 heap out-of-bounds buffer read", "title": "Vulnerability summary" }, { "category": "other", "text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16890" }, { "category": "external", "summary": "RHBZ#1670252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16890", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890" }, { "category": "external", "summary": "https://curl.haxx.se/docs/CVE-2018-16890.html", "url": "https://curl.haxx.se/docs/CVE-2018-16890.html" } ], "release_date": "2019-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:28:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "category": "workaround", "details": "Turn off NTLM authentication.", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: NTLM type-2 heap out-of-bounds buffer read" }, { "cve": "CVE-2018-20483", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1662705" } ], "notes": [ { "category": "description", "text": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Information exposure in set_file_metadata function in xattr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20483" }, { "category": "external", "summary": "RHBZ#1662705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20483", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20483" }, { "category": "external", "summary": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS", "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" } ], "release_date": "2018-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:28:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "category": "workaround", "details": "wget users should pass credentials using the \"--user/password\" or the \"--user/--ask-password\" command line argument to wget or use --no-xattr to turn off saving extended attribute information. In curl downloading extended attributes is disabled by default.", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wget: Information exposure in set_file_metadata function in xattr.c" }, { "acknowledgments": [ { "names": [ "Daniel Stenberg" ], "organization": "the Curl project" }, { "names": [ "Wenxiang Qian" ], "organization": "Tencent Blade Team", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-3822", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2019-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1670254" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: NTLMv2 type-3 header stack buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3822" }, { "category": "external", "summary": "RHBZ#1670254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822" }, { "category": "external", "summary": "https://curl.haxx.se/docs/CVE-2019-3822.html", "url": "https://curl.haxx.se/docs/CVE-2019-3822.html" } ], "release_date": "2019-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:28:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "category": "workaround", "details": "Turn off NTLM authentication.", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: NTLMv2 type-3 header stack buffer overflow" }, { "acknowledgments": [ { "names": [ "Daniel Stenberg" ], "organization": "the Curl project" }, { "names": [ "Brian Carpenter" ], "organization": "Geeknik Labs", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-3823", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1670256" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: SMTP end-of-response out-of-bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3823" }, { "category": "external", "summary": "RHBZ#1670256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3823", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823" }, { "category": "external", "summary": "https://curl.haxx.se/docs/CVE-2019-3823.html", "url": "https://curl.haxx.se/docs/CVE-2019-3823.html" } ], "release_date": "2019-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T22:28:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "category": "workaround", "details": "Do not use SMTP authentication with curl", "product_ids": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.1.0:curl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.src", "BaseOS-8.1.0:curl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-debugsource-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:curl-minimal-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-debuginfo-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-devel-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-0:7.61.1-11.el8.x86_64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.aarch64", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.i686", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.ppc64le", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.s390x", "BaseOS-8.1.0:libcurl-minimal-debuginfo-0:7.61.1-11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: SMTP end-of-response out-of-bounds read" } ] }
ghsa-mxm6-6r3r-6wj4
Vulnerability from github
Published
2022-05-13 01:19
Modified
2022-05-13 01:19
Severity ?
Details
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
{ "affected": [], "aliases": [ "CVE-2018-20483" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-12-26T18:29:00Z", "severity": "HIGH" }, "details": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.", "id": "GHSA-mxm6-6r3r-6wj4", "modified": "2022-05-13T01:19:55Z", "published": "2022-05-13T01:19:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20483" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3701" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201903-08" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190321-0002" }, { "type": "WEB", "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3943-1" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106358" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-20483
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-20483", "description": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.", "id": "GSD-2018-20483", "references": [ "https://www.suse.com/security/cve/CVE-2018-20483.html", "https://access.redhat.com/errata/RHSA-2019:3701", "https://ubuntu.com/security/CVE-2018-20483", "https://advisories.mageia.org/CVE-2018-20483.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-20483.html", "https://linux.oracle.com/cve/CVE-2018-20483.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-20483" ], "details": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.", "id": "GSD-2018-20483", "modified": "2023-12-13T01:22:29.241983Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201903-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-08" }, { "name": "106358", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106358" }, { "name": "https://twitter.com/marcan42/status/1077676739877232640", "refsource": "MISC", "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "name": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS", "refsource": "MISC", "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "name": "https://security.netapp.com/advisory/ntap-20190321-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" }, { "name": "USN-3943-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3943-1/" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.20.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20483" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/marcan42/status/1077676739877232640", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/marcan42/status/1077676739877232640" }, { "name": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS", "refsource": "MISC", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" }, { "name": "106358", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106358" }, { "name": "GLSA-201903-08", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-08" }, { "name": "https://security.netapp.com/advisory/ntap-20190321-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" }, { "name": "USN-3943-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3943-1/" }, { "name": "RHSA-2019:3701", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:3701" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2018-12-26T18:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.