diff --git a/2019/0xxx/CVE-2019-0205.json b/2019/0xxx/CVE-2019-0205.json index 09a1a94b91f..f246c0ae744 100644 --- a/2019/0xxx/CVE-2019-0205.json +++ b/2019/0xxx/CVE-2019-0205.json @@ -143,6 +143,26 @@ "refsource": "MLIST", "name": "[thrift-commits] 20200208 [thrift] 01/01: THRIFT-5075: Backport changes for CVE-2019-0205 to 0.9.3.1 branch", "url": "https://lists.apache.org/thread.html/r573029c2f8632e3174b9eea7cd57f9c9df33f2f706450e23fc57750a@%3Ccommits.thrift.apache.org%3E" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] }, diff --git a/2019/0xxx/CVE-2019-0210.json b/2019/0xxx/CVE-2019-0210.json index 5e1b90d8f19..56a854cdf17 100644 --- a/2019/0xxx/CVE-2019-0210.json +++ b/2019/0xxx/CVE-2019-0210.json @@ -48,6 +48,26 @@ "refsource": "CONFIRM", "name": "http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E", "url": "http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] }, diff --git a/2019/10xxx/CVE-2019-10086.json b/2019/10xxx/CVE-2019-10086.json index 3065e783fb1..1fe31ff6338 100644 --- a/2019/10xxx/CVE-2019-10086.json +++ b/2019/10xxx/CVE-2019-10086.json @@ -148,6 +148,26 @@ "refsource": "REDHAT", "name": "RHSA-2020:0194", "url": "https://access.redhat.com/errata/RHSA-2020:0194" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] }, diff --git a/2019/12xxx/CVE-2019-12400.json b/2019/12xxx/CVE-2019-12400.json index 269071d82eb..7acd93955f0 100644 --- a/2019/12xxx/CVE-2019-12400.json +++ b/2019/12xxx/CVE-2019-12400.json @@ -66,6 +66,26 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190910-0003/", "url": "https://security.netapp.com/advisory/ntap-20190910-0003/" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] }, diff --git a/2019/20xxx/CVE-2019-20444.json b/2019/20xxx/CVE-2019-20444.json index b3836ee78a8..0ca010ceec7 100644 --- a/2019/20xxx/CVE-2019-20444.json +++ b/2019/20xxx/CVE-2019-20444.json @@ -271,6 +271,26 @@ "refsource": "MLIST", "name": "[hadoop-common-issues] 20200310 [jira] [Commented] (HADOOP-16871) Upgrade Netty version to 4.1.45.Final to handle CVE-2019-20444,CVE-2019-16869", "url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] } diff --git a/2019/20xxx/CVE-2019-20445.json b/2019/20xxx/CVE-2019-20445.json index e8445711593..b6d6283b899 100644 --- a/2019/20xxx/CVE-2019-20445.json +++ b/2019/20xxx/CVE-2019-20445.json @@ -201,6 +201,26 @@ "refsource": "MLIST", "name": "[spark-reviews] 20200310 [GitHub] [spark] dongjoon-hyun commented on issue #27870: [SPARK-31095][BUILD][2.4] Upgrade netty-all to 4.1.47.Final", "url": "https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] } diff --git a/2020/0xxx/CVE-2020-0508.json b/2020/0xxx/CVE-2020-0508.json new file mode 100644 index 00000000000..a66b50b4c1b --- /dev/null +++ b/2020/0xxx/CVE-2020-0508.json @@ -0,0 +1,77 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0508", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before versions 15.33.49.5100" + }, + { + "version_value": "15.36.38.5117" + }, + { + "version_value": "15.40.44.5107" + }, + { + "version_value": "15.45.30.5103" + }, + { + "version_value": "and 26.20.100.7212" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0511.json b/2020/0xxx/CVE-2020-0511.json new file mode 100644 index 00000000000..87e50ac626c --- /dev/null +++ b/2020/0xxx/CVE-2020-0511.json @@ -0,0 +1,65 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0511", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before version 15.40.44.5107" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0514.json b/2020/0xxx/CVE-2020-0514.json new file mode 100644 index 00000000000..b3efaaa00a0 --- /dev/null +++ b/2020/0xxx/CVE-2020-0514.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0514", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before versions 26.20.100.7463" + }, + { + "version_value": "15.45.30.5103" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0515.json b/2020/0xxx/CVE-2020-0515.json new file mode 100644 index 00000000000..d05a00ef372 --- /dev/null +++ b/2020/0xxx/CVE-2020-0515.json @@ -0,0 +1,77 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0515", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before versions 26.20.100.7584" + }, + { + "version_value": "15.45.30.5103" + }, + { + "version_value": "15.40.44.5107" + }, + { + "version_value": "15.36.38.5117" + }, + { + "version_value": "15.33.49.5100" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access" + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0516.json b/2020/0xxx/CVE-2020-0516.json new file mode 100644 index 00000000000..81890ec0c4e --- /dev/null +++ b/2020/0xxx/CVE-2020-0516.json @@ -0,0 +1,65 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0516", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before version 26.20.100.7463" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0517.json b/2020/0xxx/CVE-2020-0517.json new file mode 100644 index 00000000000..7b5773e23cb --- /dev/null +++ b/2020/0xxx/CVE-2020-0517.json @@ -0,0 +1,65 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0517", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before version 15.36.38.5117" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege, Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0519.json b/2020/0xxx/CVE-2020-0519.json new file mode 100644 index 00000000000..7d7e6b4dc4d --- /dev/null +++ b/2020/0xxx/CVE-2020-0519.json @@ -0,0 +1,68 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0519", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before versions 15.33.49.5100" + }, + { + "version_value": "15.36.38.5117" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege, Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/0xxx/CVE-2020-0520.json b/2020/0xxx/CVE-2020-0520.json new file mode 100644 index 00000000000..294a4bb9195 --- /dev/null +++ b/2020/0xxx/CVE-2020-0520.json @@ -0,0 +1,74 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0520", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intel", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Graphics Drivers", + "version": { + "version_data": [ + { + "version_value": "before versions 15.45.30.5103" + }, + { + "version_value": "15.40.44.5107" + }, + { + "version_value": "15.36.38.5117" + }, + { + "version_value": "15.33.49.5100" + }, + { + "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Escalation of Privilege, Denial of Service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7238.json b/2020/7xxx/CVE-2020-7238.json index 787bdeec3f3..33dd42856f6 100644 --- a/2020/7xxx/CVE-2020-7238.json +++ b/2020/7xxx/CVE-2020-7238.json @@ -96,6 +96,26 @@ "refsource": "REDHAT", "name": "RHSA-2020:0567", "url": "https://access.redhat.com/errata/RHSA-2020:0567" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0806", + "url": "https://access.redhat.com/errata/RHSA-2020:0806" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0811", + "url": "https://access.redhat.com/errata/RHSA-2020:0811" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0804", + "url": "https://access.redhat.com/errata/RHSA-2020:0804" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2020:0805", + "url": "https://access.redhat.com/errata/RHSA-2020:0805" } ] }