"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-19 19:01:45 +00:00
parent dbe5c47506
commit 0a471d4930
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
9 changed files with 45 additions and 0 deletions

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4804",
"url": "https://www.debian.org/security/2020/dsa-4804"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 347 v3 (CVE-2020-27670) - unsafe AMD IOMMU page table updates",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/9"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4804",
"url": "https://www.debian.org/security/2020/dsa-4804"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 346 v3 (CVE-2020-27671) - undue deferral of IOMMU TLB flushes",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/8"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4804",
"url": "https://www.debian.org/security/2020/dsa-4804"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 345 v4 (CVE-2020-27672) - x86: Race condition in Xen mapping code",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/7"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/6"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4804",
"url": "https://www.debian.org/security/2020/dsa-4804"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 286 v6 (CVE-2020-27674) - x86 PV guest INVLPG-like flushes may leave stale TLB entries",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/5"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 331 v3 (CVE-2020-27675) - Race condition in Linux event handler may crash dom0",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/3"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20210113 Re: Trovent Security Advisory 2010-01 [updated] / CVE-2020-28208: Rocket.Chat email address enumeration vulnerability",
"url": "http://www.openwall.com/lists/oss-security/2021/01/13/1"
},
{
"refsource": "FULLDISC",
"name": "20210119 Re: Trovent Security Advisory 2010-01 [updated] / CVE-2020-28208: Rocket.Chat email address enumeration vulnerability",
"url": "http://seclists.org/fulldisclosure/2021/Jan/43"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://xenbits.xen.org/xsa/advisory-355.html",
"refsource": "MISC",
"name": "https://xenbits.xen.org/xsa/advisory-355.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Xen Security Advisory 355 v3 (CVE-2020-29040) - stack corruption from XSA-346 change",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/4"
}
]
}

View File

@ -71,6 +71,11 @@
"url": "https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14",
"refsource": "MISC",
"name": "https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210119 Re: mutt recipient parsing memory leak",
"url": "http://www.openwall.com/lists/oss-security/2021/01/19/10"
}
]
}