"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-06-10 12:58:53 +00:00
parent 31c21ceded
commit 6e8632f120
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
56 changed files with 1370 additions and 36 deletions

View File

@ -116,6 +116,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -101,6 +101,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -71,6 +71,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"url": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/", "url": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/" "name": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
} }

View File

@ -91,6 +91,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528",
"refsource": "MISC", "refsource": "MISC",
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528" "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e",
"refsource": "MISC", "refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e" "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
} }

View File

@ -48,6 +48,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://source.android.com/security/bulletin/pixel/2019-09-01", "name": "https://source.android.com/security/bulletin/pixel/2019-09-01",
"url": "https://source.android.com/security/bulletin/pixel/2019-09-01" "url": "https://source.android.com/security/bulletin/pixel/2019-09-01"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
}, },

View File

@ -93,6 +93,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
}, },

View File

@ -58,6 +58,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
}, },

View File

@ -58,6 +58,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
}, },

View File

@ -58,6 +58,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/", "name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/" "url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
}, },

View File

@ -73,6 +73,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
}, },

View File

@ -58,6 +58,11 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"name": "Red Hat", "name": "Red Hat",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
}, },

View File

@ -111,6 +111,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -91,6 +91,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -66,6 +66,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -86,6 +86,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -76,6 +76,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -81,6 +81,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -81,6 +81,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -86,6 +86,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -71,6 +71,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13999",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-14000",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-14001",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-14002",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -118,6 +118,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -4,14 +4,75 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6239", "ID": "CVE-2020-6239",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Business One (Backup service)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "9.3"
},
{
"version_name": "<",
"version_value": "10.0"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Under certain conditions SAP Business One (Backup service), versions 9.3, 10.0, allows an attacker with admin permissions to view SYSTEM user password in clear text, leading to Information Disclosure."
}
]
},
"impact": {
"cvss": {
"baseScore": "4.4",
"vectorString": "CVSS:/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2908382",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2908382"
} }
] ]
} }

View File

@ -4,14 +4,111 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6246", "ID": "CVE-2020-6246",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP NetWeaver AS ABAP (Business Server Pages Test Application SBSPEXT_TABLE)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "700"
},
{
"version_name": "<",
"version_value": "701"
},
{
"version_name": "<",
"version_value": "702"
},
{
"version_name": "<",
"version_value": "730"
},
{
"version_name": "<",
"version_value": "731"
},
{
"version_name": "<",
"version_value": "740"
},
{
"version_name": "<",
"version_value": "750"
},
{
"version_name": "<",
"version_value": "751"
},
{
"version_name": "<",
"version_value": "752"
},
{
"version_name": "<",
"version_value": "753"
},
{
"version_name": "<",
"version_value": "754"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_TABLE, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2878935",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2878935"
} }
] ]
} }

View File

@ -4,14 +4,71 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6260", "ID": "CVE-2020-6260",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Solution Manager (Trace Analysis)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.20"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.5",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incomplete XML Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2915126",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2915126"
} }
] ]
} }

View File

@ -4,14 +4,139 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6263", "ID": "CVE-2020-6263",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP NetWeaver AS JAVA",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "SAP-JEECOR 7.00"
},
{
"version_name": "<",
"version_value": "7.01 SERVERCOR 7.10"
},
{
"version_name": "<",
"version_value": "7.11"
},
{
"version_name": "<",
"version_value": "7.20"
},
{
"version_name": "<",
"version_value": "7.30"
},
{
"version_name": "<",
"version_value": "7.31"
},
{
"version_name": "<",
"version_value": "7.40"
},
{
"version_name": "<",
"version_value": "7.50 CORE-TOOLS 7.00"
},
{
"version_name": "<",
"version_value": "7.01"
},
{
"version_name": "<",
"version_value": "7.02"
},
{
"version_name": "<",
"version_value": "7.05"
},
{
"version_name": "<",
"version_value": "7.10"
},
{
"version_name": "<",
"version_value": "7.11"
},
{
"version_name": "<",
"version_value": "7.20"
},
{
"version_name": "<",
"version_value": "7.30"
},
{
"version_name": "<",
"version_value": "7.31"
},
{
"version_name": "<",
"version_value": "7.40"
},
{
"version_name": "<",
"version_value": "7.50"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Standalone clients connecting to SAP NetWeaver AS Java via P4 Protocol, versions (SAP-JEECOR 7.00, 7.01; SERVERCOR 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; CORE-TOOLS 7.00, 7.01, 7.02, 7.05, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50) do not perform any authentication checks for operations that require user identity leading to Authentication Bypass."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.9",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2878568",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2878568"
} }
] ]
} }

View File

@ -4,14 +4,83 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6264", "ID": "CVE-2020-6264",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Commerce",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "6.7"
},
{
"version_name": "<",
"version_value": "1808"
},
{
"version_name": "<",
"version_value": "1811"
},
{
"version_name": "<",
"version_value": "1905"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP Commerce, versions - 6.7, 1808, 1811, 1905, may allow an attacker to access information under certain conditions which would otherwise be restricted, leading to Information Disclosure."
}
]
},
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2906366",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2906366"
} }
] ]
} }

View File

@ -4,14 +4,83 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6266", "ID": "CVE-2020-6266",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Fiori for SAP S/4HANA",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "200"
},
{
"version_name": "<",
"version_value": "300"
},
{
"version_name": "<",
"version_value": "400"
},
{
"version_name": "<",
"version_value": "500"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP Fiori for SAP S/4HANA, versions - 100, 200, 300, 400, allows an attacker to redirect users to a malicious site due to insufficient URL validation, leading to URL Redirection."
}
]
},
"impact": {
"cvss": {
"baseScore": "5.4",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "URL Redirection"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2911704",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2911704"
} }
] ]
} }

View File

@ -4,14 +4,115 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6268", "ID": "CVE-2020-6268",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP ERP (Statutory Reporting for Insurance Companies)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "EA-FINSERV 600"
},
{
"version_name": "<",
"version_value": "603"
},
{
"version_name": "<",
"version_value": "604"
},
{
"version_name": "<",
"version_value": "605"
},
{
"version_name": "<",
"version_value": "606"
},
{
"version_name": "<",
"version_value": "616"
},
{
"version_name": "<",
"version_value": "617"
},
{
"version_name": "<",
"version_value": "618"
},
{
"version_name": "<",
"version_value": "800S4CORE 101"
},
{
"version_name": "<",
"version_value": "102"
},
{
"version_name": "<",
"version_value": "103"
},
{
"version_name": "<",
"version_value": "104"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Statutory Reporting for Insurance Companies in SAP ERP (EA-FINSERV versions - 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) does not execute the required authorization checks for an authenticated user, allowing an attacker to view and tamper with certain restricted data leading to Missing Authorization Check."
}
]
},
"impact": {
"cvss": {
"baseScore": "5.4",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing Authorization Check"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2906996",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2906996"
} }
] ]
} }

View File

@ -4,14 +4,71 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6269", "ID": "CVE-2020-6269",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Business Objects Business Intelligence Platform",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "4.2"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Under certain conditions SAP Business Objects Business Intelligence Platform, version 4.2, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure."
}
]
},
"impact": {
"cvss": {
"baseScore": "4.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2905836",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2905836"
} }
] ]
} }

View File

@ -4,14 +4,111 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6270", "ID": "CVE-2020-6270",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP NetWeaver AS ABAP (Banking Services)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "710"
},
{
"version_name": "<",
"version_value": "711"
},
{
"version_name": "<",
"version_value": "740"
},
{
"version_name": "<",
"version_value": "750"
},
{
"version_name": "<",
"version_value": "751"
},
{
"version_name": "<",
"version_value": "752"
},
{
"version_name": "<",
"version_value": "75A"
},
{
"version_name": "<",
"version_value": "75B"
},
{
"version_name": "<",
"version_value": "75C"
},
{
"version_name": "<",
"version_value": "75D"
},
{
"version_name": "<",
"version_value": "75E"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP NetWeaver AS ABAP (Banking Services), versions - 710, 711, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not perform necessary authorization checks for an authenticated user due to Missing Authorization Check, allowing wrong and unexpected change of individual conditions by a malicious user leading to wrong prices."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.5",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing Authorization Check"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2916562",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2916562"
} }
] ]
} }

View File

@ -4,14 +4,71 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6271", "ID": "CVE-2020-6271",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Solution Manager (Problem Context Manager)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.2"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent)."
}
]
},
"impact": {
"cvss": {
"baseScore": "8.2",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing XML Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2931391",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2931391"
} }
] ]
} }

View File

@ -4,14 +4,119 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6275", "ID": "CVE-2020-6275",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Netweaver AS ABAP",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "700"
},
{
"version_name": "<",
"version_value": "701"
},
{
"version_name": "<",
"version_value": "702"
},
{
"version_name": "<",
"version_value": "710"
},
{
"version_name": "<",
"version_value": "711"
},
{
"version_name": "<",
"version_value": "730"
},
{
"version_name": "<",
"version_value": "731"
},
{
"version_name": "<",
"version_value": "740"
},
{
"version_name": "<",
"version_value": "750"
},
{
"version_name": "<",
"version_value": "751"
},
{
"version_name": "<",
"version_value": "752"
},
{
"version_name": "<",
"version_value": "753"
},
{
"version_name": "<",
"version_value": "754"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database."
}
]
},
"impact": {
"cvss": {
"baseScore": "7.6",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Server Side Request Forgery"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2912939",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2912939"
} }
] ]
} }

View File

@ -4,14 +4,71 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-6279", "ID": "CVE-2020-6279",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cna@sap.com",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP SuccessFactors Recruiting",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "2005"
}
]
}
}
]
}
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "OData APIs and JobApplicationInterview and JobApplication export permissions in SAP SuccessFactors Recruiting, version 2005, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
}
]
},
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing Authorization Check"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2933282",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2933282"
} }
] ]
} }

View File

@ -121,6 +121,11 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"name": "DSA-4667", "name": "DSA-4667",
"url": "https://www.debian.org/security/2020/dsa-4667" "url": "https://www.debian.org/security/2020/dsa-4667"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
} }
] ]
}, },

View File

@ -66,6 +66,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -86,6 +86,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -66,6 +66,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }

View File

@ -91,6 +91,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
} }
] ]
} }