{"id":"USN-7465-1","summary":"mistral, python-mistral-lib vulnerabilities","details":"It was discovered that Mistral incorrectly handled nested anchors in YAML\nfiles. An attacker could possibly use this issue to cause a denial of\nservice. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-16848)\n\nPierre Gaxatte discovered that Mistral incorrectly handled erroneous SSH\nprivate key filename commands. An attacker could possibly use this issue to\nexpose sensitive information. (CVE-2018-16849)\n\nIt was discovered that Mistral incorrectly handled the permissions of\nsensitive log files. An attacker could possibly use this issue to expose\nsensitive information. This issue only affected Ubuntu 18.04 LTS.\n(CVE-2019-3866)\n","modified":"2026-02-10T04:48:34Z","published":"2025-04-28T12:07:52Z","related":["UBUNTU-CVE-2018-16848","UBUNTU-CVE-2018-16849","UBUNTU-CVE-2019-3866"],"upstream":["CVE-2018-16848","CVE-2018-16849","CVE-2019-3866","UBUNTU-CVE-2018-16848","UBUNTU-CVE-2018-16849","UBUNTU-CVE-2019-3866"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7465-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16848"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-3866"}],"affected":[{"package":{"name":"mistral","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/mistral@2.0.0-1ubuntu2+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0-1ubuntu2+esm1"}]}],"versions":["1.0.0-1","1.0.0-4","2.0.0~b3-3","2.0.0~rc1-1","2.0.0~rc2-1","2.0.0-1","2.0.0-1ubuntu2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"2.0.0-1ubuntu2+esm1","binary_name":"mistral-api"},{"binary_version":"2.0.0-1ubuntu2+esm1","binary_name":"mistral-common"},{"binary_version":"2.0.0-1ubuntu2+esm1","binary_name":"mistral-engine"},{"binary_version":"2.0.0-1ubuntu2+esm1","binary_name":"mistral-executor"},{"binary_version":"2.0.0-1ubuntu2+esm1","binary_name":"python-mistral"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7465-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16849"}]}}},{"package":{"name":"mistral","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/mistral@6.0.0-0ubuntu1.1+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0.0-0ubuntu1.1+esm1"}]}],"versions":["5.0.0-0ubuntu1","6.0.0~b1-0ubuntu1","6.0.0~b1-0ubuntu2","6.0.0~b2-0ubuntu1","6.0.0~rc1-0ubuntu1","6.0.0-0ubuntu1","6.0.0-0ubuntu1.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"mistral-api"},{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"mistral-common"},{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"mistral-engine"},{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"mistral-event-engine"},{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"mistral-executor"},{"binary_version":"6.0.0-0ubuntu1.1+esm1","binary_name":"python-mistral"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7465-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16848"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16849"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-3866"}]}}},{"package":{"name":"python-mistral-lib","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/python-mistral-lib@0.4.0-0ubuntu1+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.0-0ubuntu1+esm1"}]}],"versions":["0.2.0-0ubuntu2","0.3.2-0ubuntu1","0.3.3-0ubuntu1","0.4.0-0ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"0.4.0-0ubuntu1+esm1","binary_name":"python-mistral-lib"},{"binary_version":"0.4.0-0ubuntu1+esm1","binary_name":"python3-mistral-lib"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7465-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16848"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16849"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-3866"}]}}}],"schema_version":"1.7.3"}