mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1572306fe5
commit
8e4eec490a
@ -1,17 +1,61 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2014-3648",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2014-3648",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jboss Aerogear",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Jboss Aerogear 1.0.0.final"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://issues.redhat.com/browse/AEROGEAR-6091",
|
||||
"url": "https://issues.redhat.com/browse/AEROGEAR-6091"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2014-3650",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2014-3650",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jboss Aerogear",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Jboss Aerogear 1.0.0.final"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1144212",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144212"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://issues.redhat.com/browse/AEROGEAR-5978",
|
||||
"url": "https://issues.redhat.com/browse/AEROGEAR-5978"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Multiple persistent cross-site scripting (XSS) flaws were found in the way Aerogear handled certain user-supplied content. A remote attacker could use these flaws to compromise the application with specially crafted input."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lkml.org/lkml/2021/9/13/2565",
|
||||
"url": "https://lkml.org/lkml/2021/9/13/2565"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5161",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5161"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5161",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5161"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220629-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220629-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220619 Linux kernel: CVE-2022-1516: NULL pointer dereference in Linux kernel`s X.25 network protocol",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/06/19/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220609 Re: Linux kernel: UAF, null-ptr-deref and double-free vulnerabilities in nfcmrvl module",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/06/09/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-925fc688c1",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-925fc688c1",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-925fc688c1",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0008/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5127",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5127"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220419-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220419-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220419-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220419-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220506-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220506-0006/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220513-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220513-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2022/2xxx/CVE-2022-2283.json
Normal file
18
2022/2xxx/CVE-2022-2283.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2283",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220620 Re: Linux Kernel use-after-free write in netfilter",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/06/20/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user