mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c130ef6862
commit
0e9b2b164c
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d",
|
||||
"url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://piwigo.org/release-2.8.1,",
|
||||
@ -58,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Piwigo/Piwigo/issues/470,",
|
||||
"url": "https://github.com/Piwigo/Piwigo/issues/470,"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d",
|
||||
"url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,16 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
|
||||
"url": "https://www.exim.org/static/doc/security/CVE-2019-10149.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit",
|
||||
@ -104,21 +94,11 @@
|
||||
"name": "openSUSE-SU-2019:1524",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20190611 The Return of the WIZard: RCE in Exim (CVE-2019-10149)",
|
||||
"url": "http://seclists.org/fulldisclosure/2019/Jun/16"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190725 Re: Statistics for distros lists updated for 2019Q2",
|
||||
@ -134,15 +114,35 @@
|
||||
"name": "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/26/4"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/05/04/7"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
|
||||
"url": "https://www.exim.org/static/doc/security/CVE-2019-10149.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,11 +50,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0513",
|
||||
@ -69,6 +64,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4950",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4950"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,16 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.dpdk.org/show_bug.cgi?id=363",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.dpdk.org/show_bug.cgi?id=363"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2019-019df9a459",
|
||||
@ -92,6 +82,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0171",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0171"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.dpdk.org/show_bug.cgi?id=363",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.dpdk.org/show_bug.cgi?id=363"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,6 +44,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4516-1",
|
||||
"url": "https://usn.ubuntu.com/4516-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://rwc.iacr.org/2020/slides/Leurent.pdf",
|
||||
"refsource": "MISC",
|
||||
@ -63,11 +68,6 @@
|
||||
"url": "https://dev.gnupg.org/T4755",
|
||||
"name": "https://dev.gnupg.org/T4755",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4516-1",
|
||||
"url": "https://usn.ubuntu.com/4516-1/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,6 +44,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1569",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1569"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1571",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1571"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cockpit-project/cockpit/pull/10819",
|
||||
"name": "https://github.com/cockpit-project/cockpit/pull/10819",
|
||||
@ -58,16 +68,6 @@
|
||||
"url": "https://github.com/cockpit-project/cockpit/commit/c51f6177576d7e12",
|
||||
"name": "https://github.com/cockpit-project/cockpit/commit/c51f6177576d7e12",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1569",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1569"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1571",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1571"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -62,21 +62,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://bugzilla.suse.com/show_bug.cgi?id=1122623",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.suse.com/show_bug.cgi?id=1122623"
|
||||
},
|
||||
{
|
||||
"name": "107368",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107368"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816"
|
||||
},
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "107409",
|
||||
@ -116,6 +106,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:0972",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0972"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.suse.com/show_bug.cgi?id=1122623",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.suse.com/show_bug.cgi?id=1122623"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "107777",
|
||||
@ -78,6 +73,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHBA-2019:3723",
|
||||
"url": "https://access.redhat.com/errata/RHBA-2019:3723"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3887",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3887",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "107850",
|
||||
@ -83,6 +78,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2741",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2741"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3887",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3887",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,11 +66,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-1b6ce91e37",
|
||||
@ -95,6 +90,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4950",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4950"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -59,16 +59,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ansible/ansible/pull/68433",
|
||||
"name": "https://github.com/ansible/ansible/pull/68433",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-11",
|
||||
@ -78,6 +68,16 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4950",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4950"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ansible/ansible/pull/68433",
|
||||
"name": "https://github.com/ansible/ansible/pull/68433",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,6 +44,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202008-22",
|
||||
"url": "https://security.gentoo.org/glsa/202008-22"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699",
|
||||
@ -53,11 +58,6 @@
|
||||
"url": "https://github.com/open-iscsi/targetcli-fb/issues/162",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/open-iscsi/targetcli-fb/issues/162"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202008-22",
|
||||
"url": "https://security.gentoo.org/glsa/202008-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,16 +50,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2020-10704.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.samba.org/samba/security/CVE-2020-10704.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-e244c98af5",
|
||||
@ -89,6 +79,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2020-10704.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.samba.org/samba/security/CVE-2020-10704.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,6 +44,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202011-09",
|
||||
"url": "https://security.gentoo.org/glsa/202011-09"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10717",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10717",
|
||||
@ -63,11 +68,6 @@
|
||||
"url": "https://www.openwall.com/lists/oss-security/2020/05/04/1",
|
||||
"name": "https://www.openwall.com/lists/oss-security/2020/05/04/1",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202011-09",
|
||||
"url": "https://security.gentoo.org/glsa/202011-09"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,41 +44,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d",
|
||||
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a",
|
||||
"name": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/kmsan/issues/76",
|
||||
"name": "https://github.com/google/kmsan/issues/76",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/grsecurity/status/1252558055629299712",
|
||||
"name": "https://twitter.com/grsecurity/status/1252558055629299712",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0801",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/",
|
||||
"url": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0935",
|
||||
@ -109,6 +79,36 @@
|
||||
"name": "USN-4485-1",
|
||||
"url": "https://usn.ubuntu.com/4485-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d",
|
||||
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a",
|
||||
"name": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/kmsan/issues/76",
|
||||
"name": "https://github.com/google/kmsan/issues/76",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/grsecurity/status/1252558055629299712",
|
||||
"name": "https://twitter.com/grsecurity/status/1252558055629299712",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/",
|
||||
"url": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210129-0005/",
|
||||
|
@ -64,15 +64,15 @@
|
||||
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
|
||||
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926",
|
||||
"url": "https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202208-30",
|
||||
"url": "https://security.gentoo.org/glsa/202208-30"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926",
|
||||
"url": "https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220812 [SECURITY] [DLA 3071-1] libtirpc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00004.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-0358",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-0358"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0008/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -103,6 +103,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst",
|
||||
"url": "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0003/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -132,6 +132,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221007-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221007-0007/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2022/3xxx/CVE-2022-3426.json
Normal file
18
2022/3xxx/CVE-2022-3426.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3426",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user