mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
31c21ceded
commit
6e8632f120
@ -116,6 +116,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"url": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lore.kernel.org/lkml/20191129013745.7168-1-dja@axtens.net/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://source.android.com/security/bulletin/pixel/2019-09-01",
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2019-09-01"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "Red Hat",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -111,6 +111,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2020/13xxx/CVE-2020-13999.json
Normal file
18
2020/13xxx/CVE-2020-13999.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-13999",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2020/14xxx/CVE-2020-14000.json
Normal file
18
2020/14xxx/CVE-2020-14000.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14000",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2020/14xxx/CVE-2020-14001.json
Normal file
18
2020/14xxx/CVE-2020-14001.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14001",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2020/14xxx/CVE-2020-14002.json
Normal file
18
2020/14xxx/CVE-2020-14002.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-14002",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -118,6 +118,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,75 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6239",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Business One (Backup service)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "9.3"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "10.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Under certain conditions SAP Business One (Backup service), versions 9.3, 10.0, allows an attacker with admin permissions to view SYSTEM user password in clear text, leading to Information Disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "4.4",
|
||||
"vectorString": "CVSS:/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2908382",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2908382"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,111 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6246",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP NetWeaver AS ABAP (Business Server Pages Test Application SBSPEXT_TABLE)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "700"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "701"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "702"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "730"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "731"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "740"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "750"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "751"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "752"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "753"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "754"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_TABLE, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "6.1",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross Site Scripting"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2878935",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2878935"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,71 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6260",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Solution Manager (Trace Analysis)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "6.5",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Incomplete XML Validation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2915126",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2915126"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,139 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6263",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP NetWeaver AS JAVA",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "SAP-JEECOR 7.00"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.01 SERVERCOR 7.10"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.11"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.20"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.30"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.31"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.40"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.50 CORE-TOOLS 7.00"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.01"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.02"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.05"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.10"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.11"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.20"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.30"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.31"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.40"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.50"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Standalone clients connecting to SAP NetWeaver AS Java via P4 Protocol, versions (SAP-JEECOR 7.00, 7.01; SERVERCOR 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; CORE-TOOLS 7.00, 7.01, 7.02, 7.05, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50) do not perform any authentication checks for operations that require user identity leading to Authentication Bypass."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "6.9",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Authentication Bypass"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2878568",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2878568"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,83 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6264",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Commerce",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "6.7"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "1808"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "1811"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "1905"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP Commerce, versions - 6.7, 1808, 1811, 1905, may allow an attacker to access information under certain conditions which would otherwise be restricted, leading to Information Disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "8.6",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2906366",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2906366"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,83 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6266",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Fiori for SAP S/4HANA",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "200"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "300"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "400"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "500"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP Fiori for SAP S/4HANA, versions - 100, 200, 300, 400, allows an attacker to redirect users to a malicious site due to insufficient URL validation, leading to URL Redirection."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "5.4",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "URL Redirection"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2911704",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2911704"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,115 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6268",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP ERP (Statutory Reporting for Insurance Companies)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "EA-FINSERV 600"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "603"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "604"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "605"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "606"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "616"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "617"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "618"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "800S4CORE 101"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "102"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "103"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "104"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Statutory Reporting for Insurance Companies in SAP ERP (EA-FINSERV versions - 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) does not execute the required authorization checks for an authenticated user, allowing an attacker to view and tamper with certain restricted data leading to Missing Authorization Check."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "5.4",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Missing Authorization Check"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2906996",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2906996"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,71 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6269",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Business Objects Business Intelligence Platform",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "4.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Under certain conditions SAP Business Objects Business Intelligence Platform, version 4.2, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "4.3",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2905836",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2905836"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,111 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6270",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP NetWeaver AS ABAP (Banking Services)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "710"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "711"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "740"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "750"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "751"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "752"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "75A"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "75B"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "75C"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "75D"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "75E"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP NetWeaver AS ABAP (Banking Services), versions - 710, 711, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not perform necessary authorization checks for an authenticated user due to Missing Authorization Check, allowing wrong and unexpected change of individual conditions by a malicious user leading to wrong prices."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "6.5",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Missing Authorization Check"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2916562",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2916562"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,71 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6271",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Solution Manager (Problem Context Manager)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "7.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "8.2",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Missing XML Validation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2931391",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2931391"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,119 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6275",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP Netweaver AS ABAP",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "700"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "701"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "702"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "710"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "711"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "730"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "731"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "740"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "750"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "751"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "752"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "753"
|
||||
},
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "754"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "7.6",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Server Side Request Forgery"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2912939",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2912939"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,71 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6279",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@sap.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "SAP SE",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SAP SuccessFactors Recruiting",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "<",
|
||||
"version_value": "2005"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "OData APIs and JobApplicationInterview and JobApplication export permissions in SAP SuccessFactors Recruiting, version 2005, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"baseScore": "8.1",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Missing Authorization Check"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775"
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2933282",
|
||||
"refsource": "MISC",
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2933282"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -121,6 +121,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4667",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4667"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user