"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-09-30 20:01:31 +00:00
parent b120eb5c60
commit 12873d2cb7
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
35 changed files with 464 additions and 68 deletions

View File

@ -81,6 +81,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202006-06", "name": "GLSA-202006-06",
"url": "https://security.gentoo.org/glsa/202006-06" "url": "https://security.gentoo.org/glsa/202006-06"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202006-06", "name": "GLSA-202006-06",
"url": "https://security.gentoo.org/glsa/202006-06" "url": "https://security.gentoo.org/glsa/202006-06"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202006-06", "name": "GLSA-202006-06",
"url": "https://security.gentoo.org/glsa/202006-06" "url": "https://security.gentoo.org/glsa/202006-06"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202006-06", "name": "GLSA-202006-06",
"url": "https://security.gentoo.org/glsa/202006-06" "url": "https://security.gentoo.org/glsa/202006-06"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update", "name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html" "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -106,6 +106,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update", "name": "[debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html" "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
} }

View File

@ -83,6 +83,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:1071", "name": "openSUSE-SU-2020:1071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4547-1",
"url": "https://usn.ubuntu.com/4547-1/"
} }
] ]
}, },

View File

@ -76,6 +76,11 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"name": "DSA-4715", "name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715" "url": "https://www.debian.org/security/2020/dsa-4715"
},
{
"refsource": "UBUNTU",
"name": "USN-4549-1",
"url": "https://usn.ubuntu.com/4549-1/"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update", "name": "[debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4549-1",
"url": "https://usn.ubuntu.com/4549-1/"
} }
] ]
} }

View File

@ -4,14 +4,63 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-14374", "ID": "CVE-2020-14374",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "dpdk",
"version": {
"version_data": [
{
"version_value": "All dpdk versions before 18.11.10 and before 19.11.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/09/28/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/28/3"
},
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879466"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
} }
] ]
} }

View File

@ -53,6 +53,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/09/28/3", "name": "https://www.openwall.com/lists/oss-security/2020/09/28/3",
"url": "https://www.openwall.com/lists/oss-security/2020/09/28/3" "url": "https://www.openwall.com/lists/oss-security/2020/09/28/3"
},
{
"refsource": "UBUNTU",
"name": "USN-4550-1",
"url": "https://usn.ubuntu.com/4550-1/"
} }
] ]
}, },

View File

@ -53,6 +53,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879470", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879470" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879470"
},
{
"refsource": "UBUNTU",
"name": "USN-4550-1",
"url": "https://usn.ubuntu.com/4550-1/"
} }
] ]
}, },

View File

@ -53,6 +53,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879472", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879472" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879472"
},
{
"refsource": "UBUNTU",
"name": "USN-4550-1",
"url": "https://usn.ubuntu.com/4550-1/"
} }
] ]
}, },

View File

@ -53,6 +53,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879473", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1879473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879473" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879473"
},
{
"refsource": "UBUNTU",
"name": "USN-4550-1",
"url": "https://usn.ubuntu.com/4550-1/"
} }
] ]
}, },

View File

@ -173,6 +173,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[ant-user] 20200930 [CVE-2020-11979] Apache Ant insecure temporary file vulnerability", "name": "[ant-user] 20200930 [CVE-2020-11979] Apache Ant insecure temporary file vulnerability",
"url": "https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E" "url": "https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[creadur-dev] 20200930 [jira] [Updated] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979",
"url": "https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[creadur-dev] 20200930 [jira] [Created] (RAT-274) Update to latest Ant in order to fix CVE-2020-11979",
"url": "https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E"
} }
] ]
}, },

View File

@ -4,14 +4,58 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-25626", "ID": "CVE-2020-25626",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Django REST Framework",
"version": {
"version_data": [
{
"version_value": "All django-rest-framework versions before 3.12.0 and before 3.11.2"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20->CWE-77->CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1878635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878635"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability."
} }
] ]
} }

View File

@ -1,66 +1,17 @@
{ {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-25726",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25726",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A Directory Traversal issue was discovered on Hak5 WiFi Pineapple Mark VII 1.x before 1.0.1-beta.2020091914551 devices. An unauthenticated user can connect to the wireless management network, including the open wireless network, and access all files and subdirectories under /pineapple/ui, regardless of file permissions." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://downloads.hak5.org/pineapple",
"refsource": "MISC",
"name": "https://downloads.hak5.org/pineapple"
},
{
"refsource": "MISC",
"name": "https://forums.hak5.org/topic/53122-unauthenticated-filesystem-access/",
"url": "https://forums.hak5.org/topic/53122-unauthenticated-filesystem-access/"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-25816",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2020-25816",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "HashiCorp Vault and Vault Enterprise 1.0 before 1.5.4 have Incorrect Access Control."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.hashicorp.com/blog/category/vault",
"refsource": "MISC",
"name": "https://www.hashicorp.com/blog/category/vault"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154",
"url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26168",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26169",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26170",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26171",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26172",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26173",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26174",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26175",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26176",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26177",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26178",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -58,6 +58,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202009-15", "name": "GLSA-202009-15",
"url": "https://security.gentoo.org/glsa/202009-15" "url": "https://security.gentoo.org/glsa/202009-15"
},
{
"refsource": "UBUNTU",
"name": "USN-4548-1",
"url": "https://usn.ubuntu.com/4548-1/"
} }
] ]
}, },