diff --git a/2020/10xxx/CVE-2020-10741.json b/2020/10xxx/CVE-2020-10741.json index d476d7dfb16..26a4a6ee8fa 100644 --- a/2020/10xxx/CVE-2020-10741.json +++ b/2020/10xxx/CVE-2020-10741.json @@ -4,84 +4,15 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10741", - "ASSIGNER": "secalert@redhat.com", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "[UNKNOWN]", - "product": { - "product_data": [ - { - "product_name": "kernel", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-94" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1", - "refsource": "MISC", - "name": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10741", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10741", - "refsource": "CONFIRM" - }, - { - "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803", - "refsource": "MISC", - "name": "https://lists.openwall.net/linux-kernel/2020/03/24/1803" - }, - { - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da", - "refsource": "MISC", - "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da" - } - ] + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-12826. Reason: This candidate is a duplicate of CVE-2020-12826. Notes: All CVE users should reference CVE-2020-12826 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", - "version": "3.0" - } - ] - ] } } \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11055.json b/2020/11xxx/CVE-2020-11055.json index 0f0be012389..d5ea2fa635f 100644 --- a/2020/11xxx/CVE-2020-11055.json +++ b/2020/11xxx/CVE-2020-11055.json @@ -83,6 +83,11 @@ "name": "https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2", "refsource": "MISC", "url": "https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2" + }, + { + "refsource": "JVN", + "name": "JVN#41035278", + "url": "http://jvn.jp/en/jp/JVN41035278/index.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12826.json b/2020/12xxx/CVE-2020-12826.json index 20ca8903b40..31f52749d34 100644 --- a/2020/12xxx/CVE-2020-12826.json +++ b/2020/12xxx/CVE-2020-12826.json @@ -71,6 +71,11 @@ "url": "https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef", "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef" + }, + { + "refsource": "CONFIRM", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077" } ] }