From 498798175c69bf784c399b6aac1d587bee306584 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Apr 2020 05:01:16 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11669.json | 31 ++++++++++------- 2020/11xxx/CVE-2020-11871.json | 18 ++++++++++ 2020/11xxx/CVE-2020-11872.json | 62 ++++++++++++++++++++++++++++++++++ 3 files changed, 98 insertions(+), 13 deletions(-) create mode 100644 2020/11xxx/CVE-2020-11871.json create mode 100644 2020/11xxx/CVE-2020-11872.json diff --git a/2020/11xxx/CVE-2020-11669.json b/2020/11xxx/CVE-2020-11669.json index 5a4c7ef7efe..e50a8cd1d53 100644 --- a/2020/11xxx/CVE-2020-11669.json +++ b/2020/11xxx/CVE-2020-11669.json @@ -52,35 +52,40 @@ }, "references": { "reference_data": [ + { + "refsource": "REDHAT", + "name": "RHSA-2019:3517", + "url": "https://access.redhat.com/errata/RHSA-2019:3517" + }, { "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2", "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2" }, { - "url": "https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0", "refsource": "MISC", - "name": "https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0" + "name": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html", + "url": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html" }, { - "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0", "refsource": "MISC", - "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0" + "name": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html", + "url": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html" }, { - "refsource": "MLIST", - "name": "[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts", - "url": "http://www.openwall.com/lists/oss-security/2020/04/15/1" + "refsource": "MISC", + "name": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html", + "url": "https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html" }, { - "refsource": "MLIST", - "name": "[oss-security] 20200415 Re: CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts", - "url": "http://www.openwall.com/lists/oss-security/2020/04/15/2" + "refsource": "CONFIRM", + "name": "https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0", + "url": "https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0" }, { - "refsource": "MLIST", - "name": "[oss-security] 20200416 Re: CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts", - "url": "http://www.openwall.com/lists/oss-security/2020/04/16/2" + "refsource": "CONFIRM", + "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0", + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0" } ] } diff --git a/2020/11xxx/CVE-2020-11871.json b/2020/11xxx/CVE-2020-11871.json new file mode 100644 index 00000000000..2f659f97231 --- /dev/null +++ b/2020/11xxx/CVE-2020-11871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-11871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/11xxx/CVE-2020-11872.json b/2020/11xxx/CVE-2020-11872.json new file mode 100644 index 00000000000..cfb95c27ed6 --- /dev/null +++ b/2020/11xxx/CVE-2020-11872.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-11872", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Cloud Functions subsystem in OpenTrace 1.0 might allow fabrication attacks by making billions of TempID requests before an AES-256-GCM key rotation occurs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/opentrace-community/opentrace-cloud-functions/issues/7", + "refsource": "MISC", + "name": "https://github.com/opentrace-community/opentrace-cloud-functions/issues/7" + } + ] + } +} \ No newline at end of file