"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-07-27 18:01:34 +00:00
parent 203941bf63
commit 644d0c468c
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
18 changed files with 82 additions and 2 deletions

View File

@ -91,6 +91,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190710-0002/", "name": "https://security.netapp.com/advisory/ntap-20190710-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190710-0002/" "url": "https://security.netapp.com/advisory/ntap-20190710-0002/"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
} }

View File

@ -116,6 +116,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191107-0005/", "name": "https://security.netapp.com/advisory/ntap-20191107-0005/",
"url": "https://security.netapp.com/advisory/ntap-20191107-0005/" "url": "https://security.netapp.com/advisory/ntap-20191107-0005/"
},
{
"refsource": "UBUNTU",
"name": "USN-4428-1",
"url": "https://usn.ubuntu.com/4428-1/"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"name": "USN-4284-1", "name": "USN-4284-1",
"url": "https://usn.ubuntu.com/4284-1/" "url": "https://usn.ubuntu.com/4284-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:0935", "name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
} }

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2020-e9251de272", "name": "FEDORA-2020-e9251de272",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/"
},
{
"refsource": "UBUNTU",
"name": "USN-4428-1",
"url": "https://usn.ubuntu.com/4428-1/"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[oss-security] 20200720 Re: Re: lockdown bypass on ubuntu 18.04's 4.15 kernel for loading unsigned modules", "name": "[oss-security] 20200720 Re: Re: lockdown bypass on ubuntu 18.04's 4.15 kernel for loading unsigned modules",
"url": "http://www.openwall.com/lists/oss-security/2020/07/20/6" "url": "http://www.openwall.com/lists/oss-security/2020/07/20/6"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
} }

View File

@ -91,6 +91,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:0696", "name": "openSUSE-SU-2020:0696",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4428-1",
"url": "https://usn.ubuntu.com/4428-1/"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2020-d0737711b6", "name": "FEDORA-2020-d0737711b6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/"
},
{
"refsource": "UBUNTU",
"name": "USN-4430-1",
"url": "https://usn.ubuntu.com/4430-1/"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2020-d0737711b6", "name": "FEDORA-2020-d0737711b6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/"
},
{
"refsource": "UBUNTU",
"name": "USN-4430-1",
"url": "https://usn.ubuntu.com/4430-1/"
} }
] ]
} }

View File

@ -88,6 +88,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"name": "USN-4411-1", "name": "USN-4411-1",
"url": "https://usn.ubuntu.com/4411-1/" "url": "https://usn.ubuntu.com/4411-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
}, },

View File

@ -86,6 +86,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2020-d0737711b6", "name": "FEDORA-2020-d0737711b6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/"
},
{
"refsource": "UBUNTU",
"name": "USN-4430-1",
"url": "https://usn.ubuntu.com/4430-1/"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2020-d0737711b6", "name": "FEDORA-2020-d0737711b6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/"
},
{
"refsource": "UBUNTU",
"name": "USN-4430-1",
"url": "https://usn.ubuntu.com/4430-1/"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:0935", "name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4427-1",
"url": "https://usn.ubuntu.com/4427-1/"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:1087", "name": "openSUSE-SU-2020:1087",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1095",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html"
} }
] ]
} }

View File

@ -106,6 +106,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200724-0004/", "name": "https://security.netapp.com/advisory/ntap-20200724-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200724-0004/" "url": "https://security.netapp.com/advisory/ntap-20200724-0004/"
},
{
"refsource": "UBUNTU",
"name": "USN-4428-1",
"url": "https://usn.ubuntu.com/4428-1/"
} }
] ]
} }

View File

@ -35,7 +35,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`)\n\nThis has been fixed in 2.2.0.\n\nAs a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto " "value": "In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto"
} }
] ]
}, },

View File

@ -35,7 +35,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code.\n\nWith the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated." "value": "An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated."
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2020:1087", "name": "openSUSE-SU-2020:1087",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1095",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html"
} }
] ]
} }