From 6f8b6a4d749377e712f33feef6e845aadaeec27c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 28 Feb 2020 15:01:12 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10064.json | 76 +++++++++++++++++++++++++++++++--- 2019/10xxx/CVE-2019-10799.json | 8 ++-- 2020/9xxx/CVE-2020-9446.json | 18 ++++++++ 3 files changed, 92 insertions(+), 10 deletions(-) create mode 100644 2020/9xxx/CVE-2020-9446.json diff --git a/2019/10xxx/CVE-2019-10064.json b/2019/10xxx/CVE-2019-10064.json index f8b07b4d0e9..7b5897fa35e 100644 --- a/2019/10xxx/CVE-2019-10064.json +++ b/2019/10xxx/CVE-2019-10064.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10064", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10064", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389", + "refsource": "MISC", + "name": "https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20200227 Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)", + "url": "http://www.openwall.com/lists/oss-security/2020/02/27/1" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20200227 Re: Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)", + "url": "http://www.openwall.com/lists/oss-security/2020/02/27/2" + }, + { + "refsource": "FULLDISC", + "name": "20200227 Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)", + "url": "http://seclists.org/fulldisclosure/2020/Feb/26" + }, + { + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2020/02/27/1", + "url": "http://www.openwall.com/lists/oss-security/2020/02/27/1" } ] } diff --git a/2019/10xxx/CVE-2019-10799.json b/2019/10xxx/CVE-2019-10799.json index c7e4448590d..d5f7bb864ef 100644 --- a/2019/10xxx/CVE-2019-10799.json +++ b/2019/10xxx/CVE-2019-10799.json @@ -46,13 +46,13 @@ "reference_data": [ { "refsource": "MISC", - "name": "https://snyk.io/vuln/SNYK-JS-RPI-548942", - "url": "https://snyk.io/vuln/SNYK-JS-RPI-548942" + "name": "https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2", + "url": "https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2" }, { "refsource": "MISC", - "name": "https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2", - "url": "https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2" + "name": "https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804", + "url": "https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804" } ] }, diff --git a/2020/9xxx/CVE-2020-9446.json b/2020/9xxx/CVE-2020-9446.json new file mode 100644 index 00000000000..b3f5293b0e4 --- /dev/null +++ b/2020/9xxx/CVE-2020-9446.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9446", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file