"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-03-12 20:01:20 +00:00
parent d74cb199ec
commit 9be2474bcb
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
15 changed files with 699 additions and 0 deletions

View File

@ -143,6 +143,26 @@
"refsource": "MLIST",
"name": "[thrift-commits] 20200208 [thrift] 01/01: THRIFT-5075: Backport changes for CVE-2019-0205 to 0.9.3.1 branch",
"url": "https://lists.apache.org/thread.html/r573029c2f8632e3174b9eea7cd57f9c9df33f2f706450e23fc57750a@%3Ccommits.thrift.apache.org%3E"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
},

View File

@ -48,6 +48,26 @@
"refsource": "CONFIRM",
"name": "http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E",
"url": "http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
},

View File

@ -148,6 +148,26 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0194",
"url": "https://access.redhat.com/errata/RHSA-2020:0194"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
},

View File

@ -66,6 +66,26 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190910-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190910-0003/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
},

View File

@ -271,6 +271,26 @@
"refsource": "MLIST",
"name": "[hadoop-common-issues] 20200310 [jira] [Commented] (HADOOP-16871) Upgrade Netty version to 4.1.45.Final to handle CVE-2019-20444,CVE-2019-16869",
"url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
}

View File

@ -201,6 +201,26 @@
"refsource": "MLIST",
"name": "[spark-reviews] 20200310 [GitHub] [spark] dongjoon-hyun commented on issue #27870: [SPARK-31095][BUILD][2.4] Upgrade netty-all to 4.1.47.Final",
"url": "https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
}

View File

@ -0,0 +1,77 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0508",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before versions 15.33.49.5100"
},
{
"version_value": "15.36.38.5117"
},
{
"version_value": "15.40.44.5107"
},
{
"version_value": "15.45.30.5103"
},
{
"version_value": "and 26.20.100.7212"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
}
}

View File

@ -0,0 +1,65 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0511",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before version 15.40.44.5107"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access."
}
]
}
}

View File

@ -0,0 +1,68 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0514",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before versions 26.20.100.7463"
},
{
"version_value": "15.45.30.5103"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
}
}

View File

@ -0,0 +1,77 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0515",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before versions 26.20.100.7584"
},
{
"version_value": "15.45.30.5103"
},
{
"version_value": "15.40.44.5107"
},
{
"version_value": "15.36.38.5117"
},
{
"version_value": "15.33.49.5100"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access"
}
]
}
}

View File

@ -0,0 +1,65 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0516",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before version 26.20.100.7463"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access."
}
]
}
}

View File

@ -0,0 +1,65 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0517",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before version 15.36.38.5117"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access."
}
]
}
}

View File

@ -0,0 +1,68 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0519",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before versions 15.33.49.5100"
},
{
"version_value": "15.36.38.5117"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access."
}
]
}
}

View File

@ -0,0 +1,74 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-0520",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Intel",
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before versions 15.45.30.5103"
},
{
"version_value": "15.40.44.5107"
},
{
"version_value": "15.36.38.5117"
},
{
"version_value": "15.33.49.5100"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access."
}
]
}
}

View File

@ -96,6 +96,26 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0567",
"url": "https://access.redhat.com/errata/RHSA-2020:0567"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0806",
"url": "https://access.redhat.com/errata/RHSA-2020:0806"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0811",
"url": "https://access.redhat.com/errata/RHSA-2020:0811"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0804",
"url": "https://access.redhat.com/errata/RHSA-2020:0804"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0805",
"url": "https://access.redhat.com/errata/RHSA-2020:0805"
}
]
}