Show plain JSON{"acknowledgement": "Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Gauvain Pocentek and Cl\u00e9ment Beaufils (Kindred Group PLC) as the original reporter.", "affected_release": [{"advisory": "RHEA-2020:0283", "cpe": "cpe:/a:redhat:openstack:16::el8", "package": "openstack-mistral-0:9.0.2-0.20191125120837.6651519.el8ost", "product_name": "Red Hat OpenStack Platform 16.0 (Train)", "release_date": "2020-02-06T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/clair-rhel8:v3.4.0-25", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-bridge-operator-bundle:v3.4.0-3", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-bridge-operator-rhel8:v3.4.0-17", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-builder-qemu-rhcos-rhel8:v3.4.0-17", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-builder-rhel8:v3.4.0-18", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-container-security-operator-bundle:v3.4.0-2", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-container-security-operator-rhel8:v3.4.0-2", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-openshift-bridge-rhel8-operator:v3.4.0-17", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-operator-bundle:v3.4.0-89", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-operator-rhel8:v3.4.0-132", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}, {"advisory": "RHSA-2021:0420", "cpe": "cpe:/a:redhat:quay:3::el8", "package": "quay/quay-rhel8:v3.4.0-51", "product_name": "Red Hat Quay 3", "release_date": "2021-02-04T00:00:00Z"}], "bugzilla": {"description": "openstack-mistral: information disclosure in mistral log", "id": "1768731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768731"}, "csaw": false, "cvss3": {"cvss3_base_score": "5.9", "cvss3_scoring_vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "status": "verified"}, "cwe": "CWE-732", "details": ["An information-exposure vulnerability was discovered where openstack-mistral's undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information.", "An information-exposure vulnerability was discovered where openstack-mistral's undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information."], "mitigation": {"lang": "en:us", "value": "Plain text information can be masked by ensuring that all mistral log files are not world readable."}, "name": "CVE-2019-3866", "package_state": [{"cpe": "cpe:/a:redhat:openstack:10", "fix_state": "Will not fix", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 10 (Newton)"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Will not fix", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:14", "fix_state": "Out of support scope", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 14 (Rocky)"}, {"cpe": "cpe:/a:redhat:openstack:15", "fix_state": "Out of support scope", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 15 (Stein)"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Not affected", "package_name": "openstack-mistral", "product_name": "Red Hat OpenStack Platform 16.1"}], "public_date": "2019-11-07T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2019-3866\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3866"], "statement": "In Red Hat OpenStack Platform 10/13, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP10/13 openstack-mistral package.", "threat_severity": "Moderate"}