From 6e8632f120046afb70f5b5ffec03ca3b0db0692e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Jun 2020 12:58:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/8xxx/CVE-2015-8839.json | 5 ++ 2018/14xxx/CVE-2018-14610.json | 5 ++ 2018/14xxx/CVE-2018-14611.json | 5 ++ 2018/14xxx/CVE-2018-14612.json | 5 ++ 2018/14xxx/CVE-2018-14613.json | 5 ++ 2019/19xxx/CVE-2019-19319.json | 10 +++ 2019/19xxx/CVE-2019-19447.json | 5 ++ 2019/19xxx/CVE-2019-19462.json | 5 ++ 2019/19xxx/CVE-2019-19768.json | 10 +++ 2019/20xxx/CVE-2019-20636.json | 5 ++ 2019/20xxx/CVE-2019-20806.json | 5 ++ 2019/20xxx/CVE-2019-20811.json | 5 ++ 2019/2xxx/CVE-2019-2182.json | 5 ++ 2019/5xxx/CVE-2019-5108.json | 10 +++ 2020/0xxx/CVE-2020-0009.json | 5 ++ 2020/10xxx/CVE-2020-10690.json | 5 ++ 2020/10xxx/CVE-2020-10711.json | 5 ++ 2020/10xxx/CVE-2020-10751.json | 10 +++ 2020/10xxx/CVE-2020-10757.json | 5 ++ 2020/10xxx/CVE-2020-10942.json | 10 +++ 2020/11xxx/CVE-2020-11494.json | 10 +++ 2020/11xxx/CVE-2020-11565.json | 10 +++ 2020/11xxx/CVE-2020-11608.json | 10 +++ 2020/11xxx/CVE-2020-11609.json | 10 +++ 2020/11xxx/CVE-2020-11668.json | 10 +++ 2020/12xxx/CVE-2020-12114.json | 10 +++ 2020/12xxx/CVE-2020-12464.json | 10 +++ 2020/12xxx/CVE-2020-12652.json | 10 +++ 2020/12xxx/CVE-2020-12653.json | 10 +++ 2020/12xxx/CVE-2020-12654.json | 10 +++ 2020/12xxx/CVE-2020-12769.json | 5 ++ 2020/12xxx/CVE-2020-12770.json | 10 +++ 2020/12xxx/CVE-2020-12826.json | 5 ++ 2020/13xxx/CVE-2020-13143.json | 10 +++ 2020/13xxx/CVE-2020-13999.json | 18 +++++ 2020/14xxx/CVE-2020-14000.json | 18 +++++ 2020/14xxx/CVE-2020-14001.json | 18 +++++ 2020/14xxx/CVE-2020-14002.json | 18 +++++ 2020/2xxx/CVE-2020-2732.json | 10 +++ 2020/6xxx/CVE-2020-6239.json | 67 ++++++++++++++++- 2020/6xxx/CVE-2020-6246.json | 103 +++++++++++++++++++++++++- 2020/6xxx/CVE-2020-6260.json | 63 +++++++++++++++- 2020/6xxx/CVE-2020-6263.json | 131 ++++++++++++++++++++++++++++++++- 2020/6xxx/CVE-2020-6264.json | 75 ++++++++++++++++++- 2020/6xxx/CVE-2020-6266.json | 75 ++++++++++++++++++- 2020/6xxx/CVE-2020-6268.json | 107 ++++++++++++++++++++++++++- 2020/6xxx/CVE-2020-6269.json | 63 +++++++++++++++- 2020/6xxx/CVE-2020-6270.json | 103 +++++++++++++++++++++++++- 2020/6xxx/CVE-2020-6271.json | 63 +++++++++++++++- 2020/6xxx/CVE-2020-6275.json | 111 +++++++++++++++++++++++++++- 2020/6xxx/CVE-2020-6279.json | 63 +++++++++++++++- 2020/8xxx/CVE-2020-8428.json | 5 ++ 2020/8xxx/CVE-2020-8647.json | 10 +++ 2020/8xxx/CVE-2020-8648.json | 10 +++ 2020/8xxx/CVE-2020-8649.json | 10 +++ 2020/9xxx/CVE-2020-9383.json | 10 +++ 56 files changed, 1370 insertions(+), 36 deletions(-) create mode 100644 2020/13xxx/CVE-2020-13999.json create mode 100644 2020/14xxx/CVE-2020-14000.json create mode 100644 2020/14xxx/CVE-2020-14001.json create mode 100644 2020/14xxx/CVE-2020-14002.json diff --git a/2015/8xxx/CVE-2015-8839.json b/2015/8xxx/CVE-2015-8839.json index 2b9cd9d9de8..065f99bd7b3 100644 --- a/2015/8xxx/CVE-2015-8839.json +++ b/2015/8xxx/CVE-2015-8839.json @@ -116,6 +116,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2018/14xxx/CVE-2018-14610.json b/2018/14xxx/CVE-2018-14610.json index 17d67e17092..bb9981a4dc2 100644 --- a/2018/14xxx/CVE-2018-14610.json +++ b/2018/14xxx/CVE-2018-14610.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2018/14xxx/CVE-2018-14611.json b/2018/14xxx/CVE-2018-14611.json index f7806964a7c..28d6d08ab2d 100644 --- a/2018/14xxx/CVE-2018-14611.json +++ b/2018/14xxx/CVE-2018-14611.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2018/14xxx/CVE-2018-14612.json b/2018/14xxx/CVE-2018-14612.json index ecb74036e91..4dadde09b85 100644 --- a/2018/14xxx/CVE-2018-14612.json +++ b/2018/14xxx/CVE-2018-14612.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2018/14xxx/CVE-2018-14613.json b/2018/14xxx/CVE-2018-14613.json index db17080e2b0..7a0de6ed5f2 100644 --- a/2018/14xxx/CVE-2018-14613.json +++ b/2018/14xxx/CVE-2018-14613.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2019/19xxx/CVE-2019-19319.json b/2019/19xxx/CVE-2019-19319.json index b42af16de6f..8ec8246879f 100644 --- a/2019/19xxx/CVE-2019-19319.json +++ b/2019/19xxx/CVE-2019-19319.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2019/19xxx/CVE-2019-19447.json b/2019/19xxx/CVE-2019-19447.json index feaf016f9dc..de6994f37d0 100644 --- a/2019/19xxx/CVE-2019-19447.json +++ b/2019/19xxx/CVE-2019-19447.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2019/19xxx/CVE-2019-19462.json b/2019/19xxx/CVE-2019-19462.json index 604e03cf1a4..2819395ad46 100644 --- a/2019/19xxx/CVE-2019-19462.json +++ b/2019/19xxx/CVE-2019-19462.json @@ -76,6 +76,11 @@ "url": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/", "refsource": "MISC", "name": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] } diff --git a/2019/19xxx/CVE-2019-19768.json b/2019/19xxx/CVE-2019-19768.json index c88f9e87d28..be16a19bdec 100644 --- a/2019/19xxx/CVE-2019-19768.json +++ b/2019/19xxx/CVE-2019-19768.json @@ -91,6 +91,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2019/20xxx/CVE-2019-20636.json b/2019/20xxx/CVE-2019-20636.json index 6f571f33986..93a5c1fa3d9 100644 --- a/2019/20xxx/CVE-2019-20636.json +++ b/2019/20xxx/CVE-2019-20636.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2019/20xxx/CVE-2019-20806.json b/2019/20xxx/CVE-2019-20806.json index a0e06c931d7..99781693b52 100644 --- a/2019/20xxx/CVE-2019-20806.json +++ b/2019/20xxx/CVE-2019-20806.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] } diff --git a/2019/20xxx/CVE-2019-20811.json b/2019/20xxx/CVE-2019-20811.json index dc295e55379..f50ed1a6d88 100644 --- a/2019/20xxx/CVE-2019-20811.json +++ b/2019/20xxx/CVE-2019-20811.json @@ -61,6 +61,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] } diff --git a/2019/2xxx/CVE-2019-2182.json b/2019/2xxx/CVE-2019-2182.json index d587d14a568..70ea3610fc1 100644 --- a/2019/2xxx/CVE-2019-2182.json +++ b/2019/2xxx/CVE-2019-2182.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://source.android.com/security/bulletin/pixel/2019-09-01", "url": "https://source.android.com/security/bulletin/pixel/2019-09-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5108.json b/2019/5xxx/CVE-2019-5108.json index 1b4937573b6..16bfa6eb961 100644 --- a/2019/5xxx/CVE-2019-5108.json +++ b/2019/5xxx/CVE-2019-5108.json @@ -93,6 +93,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] }, diff --git a/2020/0xxx/CVE-2020-0009.json b/2020/0xxx/CVE-2020-0009.json index 54b6869edd1..16209dc22d7 100644 --- a/2020/0xxx/CVE-2020-0009.json +++ b/2020/0xxx/CVE-2020-0009.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10690.json b/2020/10xxx/CVE-2020-10690.json index ba90032868b..03f5fa11780 100644 --- a/2020/10xxx/CVE-2020-10690.json +++ b/2020/10xxx/CVE-2020-10690.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10711.json b/2020/10xxx/CVE-2020-10711.json index ee95916a330..eca43ee01f5 100644 --- a/2020/10xxx/CVE-2020-10711.json +++ b/2020/10xxx/CVE-2020-10711.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10751.json b/2020/10xxx/CVE-2020-10751.json index 7428605aa6a..37c9cb8e8e9 100644 --- a/2020/10xxx/CVE-2020-10751.json +++ b/2020/10xxx/CVE-2020-10751.json @@ -73,6 +73,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10757.json b/2020/10xxx/CVE-2020-10757.json index 2a6d6ca14dd..64340a9050a 100644 --- a/2020/10xxx/CVE-2020-10757.json +++ b/2020/10xxx/CVE-2020-10757.json @@ -58,6 +58,11 @@ "refsource": "REDHAT", "name": "Red Hat", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10942.json b/2020/10xxx/CVE-2020-10942.json index 48f3590dcdb..aeaee740101 100644 --- a/2020/10xxx/CVE-2020-10942.json +++ b/2020/10xxx/CVE-2020-10942.json @@ -111,6 +111,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/11xxx/CVE-2020-11494.json b/2020/11xxx/CVE-2020-11494.json index 6c7a27ee895..a76667771aa 100644 --- a/2020/11xxx/CVE-2020-11494.json +++ b/2020/11xxx/CVE-2020-11494.json @@ -91,6 +91,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/11xxx/CVE-2020-11565.json b/2020/11xxx/CVE-2020-11565.json index d63b332fed7..dba71207ea2 100644 --- a/2020/11xxx/CVE-2020-11565.json +++ b/2020/11xxx/CVE-2020-11565.json @@ -96,6 +96,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/11xxx/CVE-2020-11608.json b/2020/11xxx/CVE-2020-11608.json index 2ab4b7604f0..0601e543f3f 100644 --- a/2020/11xxx/CVE-2020-11608.json +++ b/2020/11xxx/CVE-2020-11608.json @@ -96,6 +96,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/11xxx/CVE-2020-11609.json b/2020/11xxx/CVE-2020-11609.json index edaf38f556a..7a99e19376b 100644 --- a/2020/11xxx/CVE-2020-11609.json +++ b/2020/11xxx/CVE-2020-11609.json @@ -96,6 +96,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/11xxx/CVE-2020-11668.json b/2020/11xxx/CVE-2020-11668.json index ccc77824345..3c079681edc 100644 --- a/2020/11xxx/CVE-2020-11668.json +++ b/2020/11xxx/CVE-2020-11668.json @@ -96,6 +96,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12114.json b/2020/12xxx/CVE-2020-12114.json index e4443ec40b8..33ab3106988 100644 --- a/2020/12xxx/CVE-2020-12114.json +++ b/2020/12xxx/CVE-2020-12114.json @@ -66,6 +66,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12464.json b/2020/12xxx/CVE-2020-12464.json index 9912c141cee..7e85972a783 100644 --- a/2020/12xxx/CVE-2020-12464.json +++ b/2020/12xxx/CVE-2020-12464.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12652.json b/2020/12xxx/CVE-2020-12652.json index 088e6b2c491..d9d417b758c 100644 --- a/2020/12xxx/CVE-2020-12652.json +++ b/2020/12xxx/CVE-2020-12652.json @@ -76,6 +76,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12653.json b/2020/12xxx/CVE-2020-12653.json index 84139f0c9d4..bf4436addd9 100644 --- a/2020/12xxx/CVE-2020-12653.json +++ b/2020/12xxx/CVE-2020-12653.json @@ -81,6 +81,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12654.json b/2020/12xxx/CVE-2020-12654.json index b972985296f..df8f0747560 100644 --- a/2020/12xxx/CVE-2020-12654.json +++ b/2020/12xxx/CVE-2020-12654.json @@ -81,6 +81,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12769.json b/2020/12xxx/CVE-2020-12769.json index 3242d8741ac..332d31c67f7 100644 --- a/2020/12xxx/CVE-2020-12769.json +++ b/2020/12xxx/CVE-2020-12769.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12770.json b/2020/12xxx/CVE-2020-12770.json index 88114476f33..eeedcca4679 100644 --- a/2020/12xxx/CVE-2020-12770.json +++ b/2020/12xxx/CVE-2020-12770.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/12xxx/CVE-2020-12826.json b/2020/12xxx/CVE-2020-12826.json index a41c51c7bdb..5334f3bae2f 100644 --- a/2020/12xxx/CVE-2020-12826.json +++ b/2020/12xxx/CVE-2020-12826.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/13xxx/CVE-2020-13143.json b/2020/13xxx/CVE-2020-13143.json index 4d264dd7560..1274231c090 100644 --- a/2020/13xxx/CVE-2020-13143.json +++ b/2020/13xxx/CVE-2020-13143.json @@ -71,6 +71,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/13xxx/CVE-2020-13999.json b/2020/13xxx/CVE-2020-13999.json new file mode 100644 index 00000000000..347f6fcd08a --- /dev/null +++ b/2020/13xxx/CVE-2020-13999.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-13999", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14000.json b/2020/14xxx/CVE-2020-14000.json new file mode 100644 index 00000000000..d4fe5707c47 --- /dev/null +++ b/2020/14xxx/CVE-2020-14000.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14000", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14001.json b/2020/14xxx/CVE-2020-14001.json new file mode 100644 index 00000000000..f9fb60b358f --- /dev/null +++ b/2020/14xxx/CVE-2020-14001.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14001", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/14xxx/CVE-2020-14002.json b/2020/14xxx/CVE-2020-14002.json new file mode 100644 index 00000000000..ea687e03cec --- /dev/null +++ b/2020/14xxx/CVE-2020-14002.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-14002", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/2xxx/CVE-2020-2732.json b/2020/2xxx/CVE-2020-2732.json index 924bdeff517..6f619240299 100644 --- a/2020/2xxx/CVE-2020-2732.json +++ b/2020/2xxx/CVE-2020-2732.json @@ -118,6 +118,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/6xxx/CVE-2020-6239.json b/2020/6xxx/CVE-2020-6239.json index e978a8ab7e8..6cb59224568 100644 --- a/2020/6xxx/CVE-2020-6239.json +++ b/2020/6xxx/CVE-2020-6239.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6239", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Business One (Backup service)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "9.3" + }, + { + "version_name": "<", + "version_value": "10.0" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Under certain conditions SAP Business One (Backup service), versions 9.3, 10.0, allows an attacker with admin permissions to view SYSTEM user password in clear text, leading to Information Disclosure." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.4", + "vectorString": "CVSS:/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2908382", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2908382" } ] } diff --git a/2020/6xxx/CVE-2020-6246.json b/2020/6xxx/CVE-2020-6246.json index 59a63a1ee1e..4b5d2da7f11 100644 --- a/2020/6xxx/CVE-2020-6246.json +++ b/2020/6xxx/CVE-2020-6246.json @@ -4,14 +4,111 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6246", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver AS ABAP (Business Server Pages Test Application SBSPEXT_TABLE)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "700" + }, + { + "version_name": "<", + "version_value": "701" + }, + { + "version_name": "<", + "version_value": "702" + }, + { + "version_name": "<", + "version_value": "730" + }, + { + "version_name": "<", + "version_value": "731" + }, + { + "version_name": "<", + "version_value": "740" + }, + { + "version_name": "<", + "version_value": "750" + }, + { + "version_name": "<", + "version_value": "751" + }, + { + "version_name": "<", + "version_value": "752" + }, + { + "version_name": "<", + "version_value": "753" + }, + { + "version_name": "<", + "version_value": "754" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_TABLE, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.1", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2878935", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2878935" } ] } diff --git a/2020/6xxx/CVE-2020-6260.json b/2020/6xxx/CVE-2020-6260.json index d17332d17b1..c75380b73de 100644 --- a/2020/6xxx/CVE-2020-6260.json +++ b/2020/6xxx/CVE-2020-6260.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6260", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Solution Manager (Trace Analysis)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "7.20" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.5", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incomplete XML Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2915126", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2915126" } ] } diff --git a/2020/6xxx/CVE-2020-6263.json b/2020/6xxx/CVE-2020-6263.json index 96c46670295..bc1ce5ece76 100644 --- a/2020/6xxx/CVE-2020-6263.json +++ b/2020/6xxx/CVE-2020-6263.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6263", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver AS JAVA", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "SAP-JEECOR 7.00" + }, + { + "version_name": "<", + "version_value": "7.01 SERVERCOR 7.10" + }, + { + "version_name": "<", + "version_value": "7.11" + }, + { + "version_name": "<", + "version_value": "7.20" + }, + { + "version_name": "<", + "version_value": "7.30" + }, + { + "version_name": "<", + "version_value": "7.31" + }, + { + "version_name": "<", + "version_value": "7.40" + }, + { + "version_name": "<", + "version_value": "7.50 CORE-TOOLS 7.00" + }, + { + "version_name": "<", + "version_value": "7.01" + }, + { + "version_name": "<", + "version_value": "7.02" + }, + { + "version_name": "<", + "version_value": "7.05" + }, + { + "version_name": "<", + "version_value": "7.10" + }, + { + "version_name": "<", + "version_value": "7.11" + }, + { + "version_name": "<", + "version_value": "7.20" + }, + { + "version_name": "<", + "version_value": "7.30" + }, + { + "version_name": "<", + "version_value": "7.31" + }, + { + "version_name": "<", + "version_value": "7.40" + }, + { + "version_name": "<", + "version_value": "7.50" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Standalone clients connecting to SAP NetWeaver AS Java via P4 Protocol, versions (SAP-JEECOR 7.00, 7.01; SERVERCOR 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; CORE-TOOLS 7.00, 7.01, 7.02, 7.05, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50) do not perform any authentication checks for operations that require user identity leading to Authentication Bypass." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.9", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2878568", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2878568" } ] } diff --git a/2020/6xxx/CVE-2020-6264.json b/2020/6xxx/CVE-2020-6264.json index 20397c16606..7d3febc5f23 100644 --- a/2020/6xxx/CVE-2020-6264.json +++ b/2020/6xxx/CVE-2020-6264.json @@ -4,14 +4,83 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6264", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Commerce", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "6.7" + }, + { + "version_name": "<", + "version_value": "1808" + }, + { + "version_name": "<", + "version_value": "1811" + }, + { + "version_name": "<", + "version_value": "1905" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Commerce, versions - 6.7, 1808, 1811, 1905, may allow an attacker to access information under certain conditions which would otherwise be restricted, leading to Information Disclosure." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "8.6", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2906366", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2906366" } ] } diff --git a/2020/6xxx/CVE-2020-6266.json b/2020/6xxx/CVE-2020-6266.json index 2d4c8518de4..74658149dd4 100644 --- a/2020/6xxx/CVE-2020-6266.json +++ b/2020/6xxx/CVE-2020-6266.json @@ -4,14 +4,83 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6266", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Fiori for SAP S/4HANA", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "200" + }, + { + "version_name": "<", + "version_value": "300" + }, + { + "version_name": "<", + "version_value": "400" + }, + { + "version_name": "<", + "version_value": "500" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Fiori for SAP S/4HANA, versions - 100, 200, 300, 400, allows an attacker to redirect users to a malicious site due to insufficient URL validation, leading to URL Redirection." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "5.4", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "URL Redirection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2911704", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2911704" } ] } diff --git a/2020/6xxx/CVE-2020-6268.json b/2020/6xxx/CVE-2020-6268.json index 788bce01d74..ea9dfd660bb 100644 --- a/2020/6xxx/CVE-2020-6268.json +++ b/2020/6xxx/CVE-2020-6268.json @@ -4,14 +4,115 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6268", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP ERP (Statutory Reporting for Insurance Companies)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "EA-FINSERV 600" + }, + { + "version_name": "<", + "version_value": "603" + }, + { + "version_name": "<", + "version_value": "604" + }, + { + "version_name": "<", + "version_value": "605" + }, + { + "version_name": "<", + "version_value": "606" + }, + { + "version_name": "<", + "version_value": "616" + }, + { + "version_name": "<", + "version_value": "617" + }, + { + "version_name": "<", + "version_value": "618" + }, + { + "version_name": "<", + "version_value": "800S4CORE 101" + }, + { + "version_name": "<", + "version_value": "102" + }, + { + "version_name": "<", + "version_value": "103" + }, + { + "version_name": "<", + "version_value": "104" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Statutory Reporting for Insurance Companies in SAP ERP (EA-FINSERV versions - 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) does not execute the required authorization checks for an authenticated user, allowing an attacker to view and tamper with certain restricted data leading to Missing Authorization Check." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "5.4", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization Check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2906996", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2906996" } ] } diff --git a/2020/6xxx/CVE-2020-6269.json b/2020/6xxx/CVE-2020-6269.json index 4b7e1813519..d6a42475a55 100644 --- a/2020/6xxx/CVE-2020-6269.json +++ b/2020/6xxx/CVE-2020-6269.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6269", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Business Objects Business Intelligence Platform", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "4.2" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Under certain conditions SAP Business Objects Business Intelligence Platform, version 4.2, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "4.3", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2905836", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2905836" } ] } diff --git a/2020/6xxx/CVE-2020-6270.json b/2020/6xxx/CVE-2020-6270.json index bb8ad62f5cf..1e57887fb41 100644 --- a/2020/6xxx/CVE-2020-6270.json +++ b/2020/6xxx/CVE-2020-6270.json @@ -4,14 +4,111 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6270", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP NetWeaver AS ABAP (Banking Services)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "710" + }, + { + "version_name": "<", + "version_value": "711" + }, + { + "version_name": "<", + "version_value": "740" + }, + { + "version_name": "<", + "version_value": "750" + }, + { + "version_name": "<", + "version_value": "751" + }, + { + "version_name": "<", + "version_value": "752" + }, + { + "version_name": "<", + "version_value": "75A" + }, + { + "version_name": "<", + "version_value": "75B" + }, + { + "version_name": "<", + "version_value": "75C" + }, + { + "version_name": "<", + "version_value": "75D" + }, + { + "version_name": "<", + "version_value": "75E" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP NetWeaver AS ABAP (Banking Services), versions - 710, 711, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not perform necessary authorization checks for an authenticated user due to Missing Authorization Check, allowing wrong and unexpected change of individual conditions by a malicious user leading to wrong prices." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.5", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization Check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2916562", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2916562" } ] } diff --git a/2020/6xxx/CVE-2020-6271.json b/2020/6xxx/CVE-2020-6271.json index 48e4e5a8d33..9648bad4d70 100644 --- a/2020/6xxx/CVE-2020-6271.json +++ b/2020/6xxx/CVE-2020-6271.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6271", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Solution Manager (Problem Context Manager)", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "7.2" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent)." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "8.2", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing XML Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2931391", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2931391" } ] } diff --git a/2020/6xxx/CVE-2020-6275.json b/2020/6xxx/CVE-2020-6275.json index 27d68858822..1b524bfc0d6 100644 --- a/2020/6xxx/CVE-2020-6275.json +++ b/2020/6xxx/CVE-2020-6275.json @@ -4,14 +4,119 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6275", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP Netweaver AS ABAP", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "700" + }, + { + "version_name": "<", + "version_value": "701" + }, + { + "version_name": "<", + "version_value": "702" + }, + { + "version_name": "<", + "version_value": "710" + }, + { + "version_name": "<", + "version_value": "711" + }, + { + "version_name": "<", + "version_value": "730" + }, + { + "version_name": "<", + "version_value": "731" + }, + { + "version_name": "<", + "version_value": "740" + }, + { + "version_name": "<", + "version_value": "750" + }, + { + "version_name": "<", + "version_value": "751" + }, + { + "version_name": "<", + "version_value": "752" + }, + { + "version_name": "<", + "version_value": "753" + }, + { + "version_name": "<", + "version_value": "754" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "7.6", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Server Side Request Forgery" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2912939", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2912939" } ] } diff --git a/2020/6xxx/CVE-2020-6279.json b/2020/6xxx/CVE-2020-6279.json index ab1655427f2..e9dd044e2b2 100644 --- a/2020/6xxx/CVE-2020-6279.json +++ b/2020/6xxx/CVE-2020-6279.json @@ -4,14 +4,71 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-6279", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@sap.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SAP SE", + "product": { + "product_data": [ + { + "product_name": "SAP SuccessFactors Recruiting", + "version": { + "version_data": [ + { + "version_name": "<", + "version_value": "2005" + } + ] + } + } + ] + } + } + ] + } }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OData APIs and JobApplicationInterview and JobApplication export permissions in SAP SuccessFactors Recruiting, version 2005, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." + } + ] + }, + "impact": { + "cvss": { + "baseScore": "8.1", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Authorization Check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775", + "refsource": "MISC", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775" + }, + { + "url": "https://launchpad.support.sap.com/#/notes/2933282", + "refsource": "MISC", + "name": "https://launchpad.support.sap.com/#/notes/2933282" } ] } diff --git a/2020/8xxx/CVE-2020-8428.json b/2020/8xxx/CVE-2020-8428.json index ddb821bc0e3..d21b5062a0c 100644 --- a/2020/8xxx/CVE-2020-8428.json +++ b/2020/8xxx/CVE-2020-8428.json @@ -121,6 +121,11 @@ "refsource": "DEBIAN", "name": "DSA-4667", "url": "https://www.debian.org/security/2020/dsa-4667" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8647.json b/2020/8xxx/CVE-2020-8647.json index 7807fcc2ec8..d8f7ca4f870 100644 --- a/2020/8xxx/CVE-2020-8647.json +++ b/2020/8xxx/CVE-2020-8647.json @@ -66,6 +66,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/8xxx/CVE-2020-8648.json b/2020/8xxx/CVE-2020-8648.json index a4751c0d003..3ea448cea76 100644 --- a/2020/8xxx/CVE-2020-8648.json +++ b/2020/8xxx/CVE-2020-8648.json @@ -86,6 +86,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/8xxx/CVE-2020-8649.json b/2020/8xxx/CVE-2020-8649.json index 6ad5200338b..77ad307084f 100644 --- a/2020/8xxx/CVE-2020-8649.json +++ b/2020/8xxx/CVE-2020-8649.json @@ -66,6 +66,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] } diff --git a/2020/9xxx/CVE-2020-9383.json b/2020/9xxx/CVE-2020-9383.json index 695bb8b4e17..5d176fe6f2a 100644 --- a/2020/9xxx/CVE-2020-9383.json +++ b/2020/9xxx/CVE-2020-9383.json @@ -91,6 +91,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" } ] }