Skip to content
This repository has been archived by the owner on May 14, 2024. It is now read-only.

Commit

Permalink
new files
Browse files Browse the repository at this point in the history
  • Loading branch information
ahouseholder committed Jun 3, 2020
1 parent 7e3c073 commit a0d3a74
Show file tree
Hide file tree
Showing 1,732 changed files with 24,342 additions and 0 deletions.
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blhrnv.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-16T16:44:00-05:00",
"DateNotified": "2020-02-05T15:07:34-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 3,
"Status": "Not Affected",
"Vendor": "lwIP",
"VendorInformation": "EAP was never used by any lwIP user. The lwIP PPP support is mostly used with cellular modems only as a framing protocol limited to the serial link between the MCU and the modem were security is less relevant because it is not authenticated anyway. The lwIP so far has had support for PAP, CHAP, MS-CHAP (tied to MPPE keys exchange), but EAP has never been enabled from compile time.",
"VendorRecordID": "CHEU-BLHRNV",
"VendorReferences": "If you plan to compile lwIP with EAP support, please ensure you apply both the patches linked below as it also resolves the issue of preventing response to unsolicited EAP messages as well as buffer overflow due to the bounds check logic flaw. http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86\nhttp://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b",
"VendorStatement": "lwIP is a bit different than pppd, we added a lot of preprocessor directives to enable or disable features at compile time in order to reduce binary size output and EAP is disabled by default: http://git.savannah.nongnu.org/cgit/lwip.git/tree/src/include/netif/ppp/ppp_opts.h?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b#n234 \nhttp://git.savannah.nongnu.org/cgit/lwip.git/tree/src/netif/ppp/eap.c?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b#n46 \nThat is, no product using lwIP were ever shipped with the EAP code compiled at all."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptw4.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:04:56-05:00",
"DateNotified": "2020-02-11T17:00:10-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Alpine Linux",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTW4",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptw6.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:04:57-05:00",
"DateNotified": "2020-02-11T17:00:10-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Aspera Inc.",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTW6",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptw8.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-02-19T13:05:00-05:00",
"DateNotified": "2020-02-11T17:00:10-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 2,
"Status": "Not Affected",
"Vendor": "Apple",
"VendorInformation": "Apple has a forked version of ppp that was modified years earlier. It shows not affected due to the source code changes.",
"VendorRecordID": "CHEU-BLPTW8",
"VendorReferences": "None",
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwa.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-03-10T10:49:00-04:00",
"DateNotified": "2020-02-11T17:00:10-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 2,
"Status": "Affected",
"Vendor": "Amazon",
"VendorInformation": "Amazon Linux has adopted RedHat advisory and published their own updates. Please see Vendor URL section for details.",
"VendorRecordID": "CHEU-BLPTWA",
"VendorReferences": "https://alas.aws.amazon.com/AL2/ALAS-2020-1400.html",
"VendorStatement": "Visit ALAS post https://alas.aws.amazon.com/AL2/ALAS-2020-1400.html for details of this vulnerability"
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwc.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-02-14T12:23:00-05:00",
"DateNotified": "2020-02-11T17:00:10-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 1,
"Status": "Not Affected",
"Vendor": "Arista Networks, Inc.",
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
"VendorRecordID": "CHEU-BLPTWC",
"VendorReferences": "None",
"VendorStatement": "Arista products do not have any features using pppd, hence no Arista products are affected."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwf.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-02-12T19:00:00-05:00",
"DateNotified": "2020-02-11T17:00:12-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 1,
"Status": "Not Affected",
"Vendor": "CoreOS",
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
"VendorRecordID": "CHEU-BLPTWF",
"VendorReferences": "None",
"VendorStatement": "CoreOS Container Linux does not ship pppd."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwh.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-03-09T14:07:00-04:00",
"DateNotified": "2020-02-11T17:00:12-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 1,
"Status": "Affected",
"Vendor": "Arch Linux",
"VendorInformation": "ArchLinux has updated its advisory on March 7 2020, with ASA-202003-3 advisory with resolution statement\n\"Upgrade to 2.4.7-7. # pacman -Syu \"ppp>=2.4.7-7\"\nThe problem has been fixed upstream but no release is available yet.\"",
"VendorRecordID": "CHEU-BLPTWH",
"VendorReferences": "https://security.archlinux.org/ASA-202003-3/generate",
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwk.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-02-21T18:05:00-05:00",
"DateNotified": "2020-02-11T17:00:12-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 3,
"Status": "Not Affected",
"Vendor": "FreeBSD Project",
"VendorInformation": "A review of the pppd source tree suggests that FreeBSD do not include pppd in the base system (removed in r190751 - ten years ago). The first pppd version that contained the vulnerability was 2.4.2, and FreeBSD has never shipped with that version.",
"VendorRecordID": "CHEU-BLPTWK",
"VendorReferences": "None",
"VendorStatement": "FreeBSD does not distribute pppd."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwm.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:04:59-05:00",
"DateNotified": "2020-02-11T17:00:13-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "DesktopBSD",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTWM",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwq.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:04:59-05:00",
"DateNotified": "2020-02-11T17:00:20-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Dell EMC",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTWQ",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptws.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:04:59-05:00",
"DateNotified": "2020-02-11T17:00:20-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Geexbox",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTWS",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwu.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:00-05:00",
"DateNotified": "2020-02-11T17:00:20-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "HP Inc.",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTWU",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptww.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:00-05:00",
"DateNotified": "2020-02-11T17:00:20-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Marconi, Inc.",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTWW",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptwy.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-03-09T10:55:00-04:00",
"DateNotified": "2020-02-11T17:00:20-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 4,
"Status": "Affected",
"Vendor": "Fedora Project",
"VendorInformation": "Fedora Project has put out new software updates to address this issue on Fri, 21 Feb 2020 16:44:33 UTC, please use the vendor's URL's to find the suitable update for your version of Fedora and your platform.",
"VendorRecordID": "CHEU-BLPTWY",
"VendorReferences": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-571091c70b\nhttps://koji.fedoraproject.org/koji/buildinfo?buildID=1468692",
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptx2.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:00-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "F5 Networks, Inc.",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTX2",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptx4.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:00-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Lenovo",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTX4",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptx6.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:01-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Google",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTX6",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptx8.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:01-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "DragonFly BSD Project",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTX8",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxa.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "There are no additional comments at this time.",
"DateLastUpdated": "2020-02-12T18:01:00-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 1,
"Status": "Not Affected",
"Vendor": "HardenedBSD",
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
"VendorRecordID": "CHEU-BLPTXA",
"VendorReferences": "None",
"VendorStatement": "HardenedBSD does not ship with this software in the base operating system."
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxc.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:01-05:00",
"DateNotified": "2020-02-11T17:00:21-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Hitachi",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTXC",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxe.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:02-05:00",
"DateNotified": "2020-02-11T17:00:22-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Microsoft",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTXE",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxg.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:02-05:00",
"DateNotified": "2020-02-11T17:00:22-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "Oracle Corporation",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTXG",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxj.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:02-05:00",
"DateNotified": "2020-02-11T17:00:23-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "NAS4Free",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTXJ",
"VendorReferences": "",
"VendorStatement": ""
}
14 changes: 14 additions & 0 deletions data/1/vu_782301/vendor_cheu-blptxl.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"Addendum": "",
"DateLastUpdated": "2020-02-11T17:05:02-05:00",
"DateNotified": "2020-02-11T17:00:23-05:00",
"DateResponded": "",
"ID": "VU#782301",
"Revision": 0,
"Status": "Unknown",
"Vendor": "m0n0wall",
"VendorInformation": "",
"VendorRecordID": "CHEU-BLPTXL",
"VendorReferences": "",
"VendorStatement": ""
}
Loading

0 comments on commit a0d3a74

Please sign in to comment.