From 875082211d65ab9834a3e7b43895088243409ac7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 17 Jul 2020 23:01:22 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13753.json | 5 ++ 2020/14xxx/CVE-2020-14928.json | 5 ++ 2020/8xxx/CVE-2020-8573.json | 16 ++-- 2020/9xxx/CVE-2020-9102.json | 131 ++++++++++++++++++++++++++++++++- 2020/9xxx/CVE-2020-9227.json | 50 ++++++++++++- 2020/9xxx/CVE-2020-9252.json | 80 +++++++++++++++++++- 2020/9xxx/CVE-2020-9254.json | 56 +++++++++++++- 2020/9xxx/CVE-2020-9255.json | 50 ++++++++++++- 2020/9xxx/CVE-2020-9257.json | 56 +++++++++++++- 2020/9xxx/CVE-2020-9259.json | 50 ++++++++++++- 2020/9xxx/CVE-2020-9802.json | 5 ++ 2020/9xxx/CVE-2020-9803.json | 5 ++ 2020/9xxx/CVE-2020-9805.json | 5 ++ 2020/9xxx/CVE-2020-9806.json | 5 ++ 2020/9xxx/CVE-2020-9807.json | 5 ++ 2020/9xxx/CVE-2020-9843.json | 5 ++ 2020/9xxx/CVE-2020-9850.json | 5 ++ 17 files changed, 508 insertions(+), 26 deletions(-) diff --git a/2020/13xxx/CVE-2020-13753.json b/2020/13xxx/CVE-2020-13753.json index 4499a6d9e47..8750926bd25 100644 --- a/2020/13xxx/CVE-2020-13753.json +++ b/2020/13xxx/CVE-2020-13753.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://www.openwall.com/lists/oss-security/2020/07/10/1", "url": "https://www.openwall.com/lists/oss-security/2020/07/10/1" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] } diff --git a/2020/14xxx/CVE-2020-14928.json b/2020/14xxx/CVE-2020-14928.json index b76e5dca9bc..f1d379e8d7c 100644 --- a/2020/14xxx/CVE-2020-14928.json +++ b/2020/14xxx/CVE-2020-14928.json @@ -86,6 +86,11 @@ "refsource": "CONFIRM", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1173910", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1173910" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4725", + "url": "https://www.debian.org/security/2020/dsa-4725" } ] } diff --git a/2020/8xxx/CVE-2020-8573.json b/2020/8xxx/CVE-2020-8573.json index 95756b94829..1c198922fd3 100644 --- a/2020/8xxx/CVE-2020-8573.json +++ b/2020/8xxx/CVE-2020-8573.json @@ -11,15 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", + "vendor_name": "NetApp", "product": { "product_data": [ { - "product_name": "NetApp HCI Baseboard Management Controller (BMC) - H610S", + "product_name": "NetApp HCI Baseboard Management Controller (BMC) HCI H610C, NetApp HCI Baseboard Management Controller (BMC) HCI H615C, NetApp HCI Baseboard Management Controller (BMC) HCI H610S", "version": { "version_data": [ { - "version_value": "Element OS versions 11.8 and 12.0" + "version_value": "Element OS v11.8" + }, + { + "version_value": "Element OS v12.0" + }, + { + "version_value": "Compute Firmware Bundle v12.2.92" } ] } @@ -45,7 +51,7 @@ "references": { "reference_data": [ { - "refsource": "MISC", + "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200626-0001/", "url": "https://security.netapp.com/advisory/ntap-20200626-0001/" } @@ -55,7 +61,7 @@ "description_data": [ { "lang": "eng", - "value": "The NetApp HCI H610S Baseboard Management Controller (BMC) is shipped with a documented default account and password that should be changed during the initial node setup. During upgrades to Element 11.8 and 12.0 the H610S BMC account password is reset to the default documented value which allows remote attackers to cause a Denial of Service (DoS)." + "value": "The NetApp HCI H610C, H615C and H610S Baseboard Management Controllers (BMC) are shipped with a documented default account and password that should be changed during the initial node setup. During upgrades to Element 11.8 and 12.0 or the Compute Firmware Bundle 12.2.92 the BMC account password on the H610C, H615C and H610S platforms is reset to the default documented value which could allow remote attackers to cause a Denial of Service (DoS)." } ] } diff --git a/2020/9xxx/CVE-2020-9102.json b/2020/9xxx/CVE-2020-9102.json index 73fac148ddd..bda70eb6cdb 100644 --- a/2020/9xxx/CVE-2020-9102.json +++ b/2020/9xxx/CVE-2020-9102.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9102", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "CloudEngine 12800", + "version": { + "version_data": [ + { + "version_value": "V200R002C50SPC800" + }, + { + "version_value": "V200R003C00SPC810" + }, + { + "version_value": "V200R005C00SPC800" + }, + { + "version_value": "V200R005C10SPC800" + }, + { + "version_value": "V200R019C00SPC800" + } + ] + } + }, + { + "product_name": "CloudEngine 5800", + "version": { + "version_data": [ + { + "version_value": "V200R002C50SPC800" + }, + { + "version_value": "V200R003C00SPC810" + }, + { + "version_value": "V200R005C00SPC800" + }, + { + "version_value": "V200R005C10SPC800" + }, + { + "version_value": "V200R019C00SPC800" + } + ] + } + }, + { + "product_name": "CloudEngine 6800", + "version": { + "version_data": [ + { + "version_value": "V200R002C50SPC800" + }, + { + "version_value": "V200R003C00SPC810" + }, + { + "version_value": "V200R005C00SPC800" + }, + { + "version_value": "V200R005C10SPC800" + }, + { + "version_value": "V200R005C20SPC800" + }, + { + "version_value": "V200R019C00SPC800" + } + ] + } + }, + { + "product_name": "CloudEngine 7800", + "version": { + "version_data": [ + { + "version_value": "V200R002C50SPC800" + }, + { + "version_value": "V200R003C00SPC810" + }, + { + "version_value": "V200R005C00SPC800" + }, + { + "version_value": "V200R005C10SPC800" + }, + { + "version_value": "V200R019C00SPC800" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-03-informationleak-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-03-informationleak-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a information leak vulnerability in some Huawei products, and it could allow a local attacker to get information. The vulnerability is due to the improper management of the username. An attacker with the ability to access the device and cause the username information leak. Affected product versions include: CloudEngine 12800 versions V200R002C50SPC800, V200R003C00SPC810, V200R005C00SPC800, V200R005C10SPC800, V200R019C00SPC800; CloudEngine 5800 versions V200R002C50SPC800, V200R003C00SPC810, V200R005C00SPC800, V200R005C10SPC800, V200R019C00SPC800; CloudEngine 6800 versions V200R002C50SPC800, V200R003C00SPC810, V200R005C00SPC800, V200R005C10SPC800, V200R005C20SPC800, V200R019C00SPC800; CloudEngine 7800 versions V200R002C50SPC800, V200R003C00SPC810, V200R005C00SPC800, V200R005C10SPC800, V200R019C00SPC800" } ] } diff --git a/2020/9xxx/CVE-2020-9227.json b/2020/9xxx/CVE-2020-9227.json index e682a0cb512..b3fb2f78e21 100644 --- a/2020/9xxx/CVE-2020-9227.json +++ b/2020/9xxx/CVE-2020-9227.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9227", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Moana-AL00B", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.166" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing Initialization of Resource" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-09-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-09-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Smart Phones Moana-AL00B with versions earlier than 10.1.0.166 have a missing initialization of resource vulnerability. An attacker tricks the user into installing then running a crafted application. Due to improper initialization of specific parameters, successful exploit of this vulnerability may cause device exceptions." } ] } diff --git a/2020/9xxx/CVE-2020-9252.json b/2020/9xxx/CVE-2020-9252.json index 78eb64e6289..30a9bbeb0c0 100644 --- a/2020/9xxx/CVE-2020-9252.json +++ b/2020/9xxx/CVE-2020-9252.json @@ -4,14 +4,88 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9252", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "HUAWEI Mate 20", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.160(C00E160R3P8)" + } + ] + } + }, + { + "product_name": "HUAWEI Mate 20 X", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.135(C00E135R2P8)" + } + ] + } + }, + { + "product_name": "HUAWEI Mate 20 RS", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.160(C786E160R3P8)" + } + ] + } + }, + { + "product_name": "Honor Magic2", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-07-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-07-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HUAWEI Mate 20 versions earlier than 10.1.0.160(C00E160R3P8), HUAWEI Mate 20 X versions earlier than 10.1.0.135(C00E135R2P8), HUAWEI Mate 20 RS versions earlier than 10.1.0.160(C786E160R3P8), and Honor Magic2 smartphones versions earlier than 10.1.0.160(C00E160R2P11) have a path traversal vulnerability. The system does not sufficiently validate certain pathname from certain process, successful exploit could allow the attacker write files to a crafted path." } ] } diff --git a/2020/9xxx/CVE-2020-9254.json b/2020/9xxx/CVE-2020-9254.json index 86e22c522f4..abe8b082bb5 100644 --- a/2020/9xxx/CVE-2020-9254.json +++ b/2020/9xxx/CVE-2020-9254.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9254", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "HUAWEI P30 Pro", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.123(C432E19R2P5patch02)" + }, + { + "version_value": "Versions earlier than 10.1.0.126(C10E11R5P1)" + }, + { + "version_value": "Versions earlier than 10.1.0.160(C00E160R2P8)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Logic Check Error" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-04-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-04-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HUAWEI P30 Pro smartphones with versions earlier than 10.1.0.123(C432E19R2P5patch02), versions earlier than 10.1.0.126(C10E11R5P1), and versions earlier than 10.1.0.160(C00E160R2P8) have a logic check error vulnerability. A logic error occurs when the software checking the size of certain parameter, the attacker should trick the user into installing a malicious application, successful exploit may cause code execution." } ] } diff --git a/2020/9xxx/CVE-2020-9255.json b/2020/9xxx/CVE-2020-9255.json index 56435f4f17c..9ccd11b60db 100644 --- a/2020/9xxx/CVE-2020-9255.json +++ b/2020/9xxx/CVE-2020-9255.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9255", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Honor 10", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.0.0.178(C00E178R1P4)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-06-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-06-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Honor 10 smartphones with versions earlier than 10.0.0.178(C00E178R1P4) have a denial of service vulnerability. Certain service in the system does not sufficiently validate certain parameter which is received, the attacker should trick the user into installing a malicious application, successful exploit could cause a denial of service condition." } ] } diff --git a/2020/9xxx/CVE-2020-9257.json b/2020/9xxx/CVE-2020-9257.json index 9d6c9a91bb2..efc2c1ab874 100644 --- a/2020/9xxx/CVE-2020-9257.json +++ b/2020/9xxx/CVE-2020-9257.json @@ -4,14 +4,64 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9257", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "HUAWEI P30 Pro", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.123(C432E19R2P5patch02)" + }, + { + "version_value": "Versions earlier than 10.1.0.126(C10E11R5P1)" + }, + { + "version_value": "Versions earlier than 10.1.0.160(C00E160R2P8)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-03-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-03-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HUAWEI P30 Pro smartphones with versions earlier than 10.1.0.123(C432E19R2P5patch02), versions earlier than 10.1.0.126(C10E11R5P1), and versions earlier than 10.1.0.160(C00E160R2P8) have a buffer overflow vulnerability. The software access data past the end, or before the beginning, of the intended buffer when handling certain operations of certificate, the attacker should trick the user into installing a malicious application, successful exploit may cause code execution." } ] } diff --git a/2020/9xxx/CVE-2020-9259.json b/2020/9xxx/CVE-2020-9259.json index e61d234f1c4..aa9c63136e8 100644 --- a/2020/9xxx/CVE-2020-9259.json +++ b/2020/9xxx/CVE-2020-9259.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9259", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "Honor V30", + "version": { + "version_data": [ + { + "version_value": "Versions earlier than 10.1.0.212(C00E210R5P1)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-02-smartphone-en", + "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-02-smartphone-en" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Huawei Honor V30 smartphones with versions earlier than 10.1.0.212(C00E210R5P1) have an improper authentication vulnerability. The system does not sufficiently validate certain parameter passed from the bottom level, the attacker should trick the user into installing a malicious application and control the bottom level, successful exploit could cause information disclosure." } ] } diff --git a/2020/9xxx/CVE-2020-9802.json b/2020/9xxx/CVE-2020-9802.json index d40394533bd..cb86be350a4 100644 --- a/2020/9xxx/CVE-2020-9802.json +++ b/2020/9xxx/CVE-2020-9802.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9803.json b/2020/9xxx/CVE-2020-9803.json index 40c86b9119e..63a4c18c050 100644 --- a/2020/9xxx/CVE-2020-9803.json +++ b/2020/9xxx/CVE-2020-9803.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9805.json b/2020/9xxx/CVE-2020-9805.json index a35ba50bbdf..5073cf67aaf 100644 --- a/2020/9xxx/CVE-2020-9805.json +++ b/2020/9xxx/CVE-2020-9805.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9806.json b/2020/9xxx/CVE-2020-9806.json index 63180366117..fa87add9fa5 100644 --- a/2020/9xxx/CVE-2020-9806.json +++ b/2020/9xxx/CVE-2020-9806.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9807.json b/2020/9xxx/CVE-2020-9807.json index 4eccf33be69..9780c1c81cc 100644 --- a/2020/9xxx/CVE-2020-9807.json +++ b/2020/9xxx/CVE-2020-9807.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9843.json b/2020/9xxx/CVE-2020-9843.json index 0a4591e26e2..d67abcef61f 100644 --- a/2020/9xxx/CVE-2020-9843.json +++ b/2020/9xxx/CVE-2020-9843.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] }, diff --git a/2020/9xxx/CVE-2020-9850.json b/2020/9xxx/CVE-2020-9850.json index 7e23796384b..12b9912f041 100644 --- a/2020/9xxx/CVE-2020-9850.json +++ b/2020/9xxx/CVE-2020-9850.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-ab074c6cdf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4724", + "url": "https://www.debian.org/security/2020/dsa-4724" } ] },