7 Star 1 Fork 17

src-openEuler/ovirt-engine

 / 详情

CVE-2020-11023

待办的
CVE和安全问题 拥有者
创建于  
2024-08-20 11:51

一、漏洞信息
漏洞编号:CVE-2020-11023
漏洞归属组件:ovirt-engine
漏洞归属的版本:4.4.1.10,4.4.4.1,4.4.7.7
CVSS V3.0分值:
BaseScore:6.1 Medium
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞简述:
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
漏洞公开时间:2020-04-30 05:15:11
漏洞创建时间:2024-08-20 11:51:50
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2020-11023

更多参考(点击展开)
参考来源 参考链接 来源链接
security-advisories.github.com http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
security-advisories.github.com http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
security-advisories.github.com http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
security-advisories.github.com http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
security-advisories.github.com https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
security-advisories.github.com https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
security-advisories.github.com https://jquery.com/upgrade-guide/3.5/
security-advisories.github.com https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@<commits.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@<commits.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@<dev.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@<issues.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@<commits.nifi.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@<issues.flink.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@<dev.felix.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@<gitbox.hive.apache.org>
security-advisories.github.com https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@<dev.hive.apache.org>
security-advisories.github.com https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
security-advisories.github.com https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
security-advisories.github.com https://security.gentoo.org/glsa/202007-03
security-advisories.github.com https://security.netapp.com/advisory/ntap-20200511-0006/
security-advisories.github.com https://www.debian.org/security/2020/dsa-4693
security-advisories.github.com https://www.drupal.org/sa-core-2020-002
security-advisories.github.com https://www.oracle.com//security-alerts/cpujul2021.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpuApr2021.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpuapr2022.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpujan2021.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpujan2022.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpujul2020.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpujul2022.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpuoct2020.html
security-advisories.github.com https://www.oracle.com/security-alerts/cpuoct2021.html
security-advisories.github.com https://www.tenable.com/security/tns-2021-02
security-advisories.github.com https://www.tenable.com/security/tns-2021-10
redhat_bugzilla https://blog.jquery.com/2020/04/10/jquery-3-5-0-released https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://jquery.com/upgrade-guide/3.5/ https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://security.netapp.com/advisory/ntap-20200511-0006/ https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://www.debian.org/security/2020/dsa-4693 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://www.drupal.org/sa-core-2020-002 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://github.com/jquery/jquery/commit/966a70909019aa09632c87c0002c522fa4a1e30e https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:2813 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/security/cve/cve-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:2412 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:3247 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:3369 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:3807 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:4211 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:4298 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:4847 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:5249 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2020:5412 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/security/cve/cve-2020-11023 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2021:0778 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2021:0860 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2021:1846 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2021:4142 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2022:6393 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:0553 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:0552 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:0554 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:0556 https://bugzilla.redhat.com/show_bug.cgi?id=1850004
ubuntu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023 https://ubuntu.com/security/CVE-2020-11023
ubuntu https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://ubuntu.com/security/CVE-2020-11023
ubuntu https://jquery.com/upgrade-guide/3.5/ https://ubuntu.com/security/CVE-2020-11023
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2020-11023 https://ubuntu.com/security/CVE-2020-11023
ubuntu https://launchpad.net/bugs/cve/CVE-2020-11023 https://ubuntu.com/security/CVE-2020-11023
ubuntu https://security-tracker.debian.org/tracker/CVE-2020-11023 https://ubuntu.com/security/CVE-2020-11023

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/jquery/jquery/commit/966a70909019aa09632c87c0002c522fa4a1e30e redhat_bugzilla
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html nvd
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html nvd
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html nvd
http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html nvd
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released nvd
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 nvd
https://jquery.com/upgrade-guide/3.5/ nvd
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@<commits.felix.apache.org> nvd
https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@<commits.hive.apache.org> nvd
https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@<dev.flink.apache.org> nvd
https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@<issues.hive.apache.org> nvd
https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@<commits.nifi.apache.org> nvd
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@<issues.flink.apache.org> nvd
https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@<dev.felix.apache.org> nvd
https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@<gitbox.hive.apache.org> nvd
https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@<dev.hive.apache.org> nvd
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html nvd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/ nvd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/ nvd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/ nvd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/ nvd
https://security.gentoo.org/glsa/202007-03 nvd
https://security.netapp.com/advisory/ntap-20200511-0006/ nvd
https://www.debian.org/security/2020/dsa-4693 nvd
https://www.drupal.org/sa-core-2020-002 nvd
https://www.oracle.com//security-alerts/cpujul2021.html nvd
https://www.oracle.com/security-alerts/cpuApr2021.html nvd
https://www.oracle.com/security-alerts/cpuapr2022.html nvd
https://www.oracle.com/security-alerts/cpujan2021.html nvd
https://www.oracle.com/security-alerts/cpujan2022.html nvd
https://www.oracle.com/security-alerts/cpujul2020.html nvd
https://www.oracle.com/security-alerts/cpujul2022.html nvd
https://www.oracle.com/security-alerts/cpuoct2020.html nvd
https://www.oracle.com/security-alerts/cpuoct2021.html nvd
https://www.tenable.com/security/tns-2021-02 nvd
https://www.tenable.com/security/tns-2021-10 nvd
drupal7 https://github.com/jquery/jquery/pull/4647/commits/25c0a6e0523b3b2d501f4f7c66a3f351fa96ca32 ubuntu

二、漏洞分析结构反馈
影响性分析说明:

openEuler评分:
6.1
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
受影响版本排查(受影响/不受影响):
1.master(4.4.4.1):
2.openEuler-20.03-LTS-SP4(4.4.4.1):
3.openEuler-22.03-LTS-SP1(4.4.4.1):
4.openEuler-22.03-LTS-SP3(4.4.4.1):
5.openEuler-22.03-LTS-SP4(4.4.4.1):
6.openEuler-24.03-LTS(4.4.4.1):
7.openEuler-24.03-LTS-Next(4.4.4.1):
8.openEuler-24.03-LTS-SP2(4.4.4.1):

修复是否涉及abi变化(是/否):
1.master(4.4.4.1):
2.openEuler-20.03-LTS-SP4(4.4.4.1):
3.openEuler-22.03-LTS-SP1(4.4.4.1):
4.openEuler-22.03-LTS-SP3(4.4.4.1):
5.openEuler-22.03-LTS-SP4(4.4.4.1):
6.openEuler-24.03-LTS(4.4.4.1):
7.openEuler-24.03-LTS-Next(4.4.4.1):
8.openEuler-24.03-LTS-SP2(4.4.4.1):

原因说明:
1.master(4.4.4.1):
2.openEuler-20.03-LTS-SP4(4.4.4.1):
3.openEuler-22.03-LTS-SP3(4.4.4.1):
4.openEuler-22.03-LTS-SP4(4.4.4.1):
5.openEuler-24.03-LTS(4.4.4.1):
6.openEuler-24.03-LTS-Next(4.4.4.1):
7.openEuler-24.03-LTS-SP1(4.4.4.1):
8.openEuler-24.03-LTS-SP2(4.4.4.1):

评论 (4)

openeuler-ci-bot 创建了CVE和安全问题 9个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
9个月前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/oVirt
标签
9个月前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2020-11023
https://www.opencve.io/cve/CVE-2020-11023
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-11023NoneNonehttps://github.com/jquery/jquery/commit/966a70909019aa09632c87c0002c522fa4a1e30e
https://security-tracker.debian.org/tracker/CVE-2020-11023

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

/reason 误报,该CVE应属于js-jquery组件

openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 计划开始日期设置为2024-08-21 9个月前
openeuler-ci-bot 计划截止日期设置为2024-09-20 9个月前
openeuler-ci-bot 优先级设置为次要 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 9个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 负责人设置为wangdi 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 8个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 29天前

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(2)
5329419 openeuler ci bot 1632792936 yanjianqing-yanjianqing_kylin
1
https://gitee.com/src-openeuler/ovirt-engine.git
git@gitee.com:src-openeuler/ovirt-engine.git
src-openeuler
ovirt-engine
ovirt-engine

搜索帮助