From 9d3b314b1534aa592a3d86cd9df5d58abd2e5915 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 30 Jul 2019 19:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/7xxx/CVE-2015-7672.json | 22 ++++++++++- 2017/18xxx/CVE-2017-18381.json | 67 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19271.json | 14 ++++++- 2018/19xxx/CVE-2018-19280.json | 9 ++++- 2018/19xxx/CVE-2018-19281.json | 19 ++++++++- 2018/19xxx/CVE-2018-19311.json | 12 +++++- 2018/19xxx/CVE-2018-19312.json | 22 ++++++++++- 2018/20xxx/CVE-2018-20859.json | 72 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20860.json | 62 +++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20861.json | 62 +++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20871.json | 62 +++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14380.json | 62 +++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14382.json | 62 +++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14383.json | 62 +++++++++++++++++++++++++++++ 2019/8xxx/CVE-2019-8324.json | 5 +++ 15 files changed, 605 insertions(+), 9 deletions(-) create mode 100644 2017/18xxx/CVE-2017-18381.json create mode 100644 2018/20xxx/CVE-2018-20859.json create mode 100644 2018/20xxx/CVE-2018-20860.json create mode 100644 2018/20xxx/CVE-2018-20861.json create mode 100644 2018/20xxx/CVE-2018-20871.json create mode 100644 2019/14xxx/CVE-2019-14380.json create mode 100644 2019/14xxx/CVE-2019-14382.json create mode 100644 2019/14xxx/CVE-2019-14383.json diff --git a/2015/7xxx/CVE-2015-7672.json b/2015/7xxx/CVE-2015-7672.json index 9487aa9d316..aa5c1e9a8f6 100644 --- a/2015/7xxx/CVE-2015-7672.json +++ b/2015/7xxx/CVE-2015-7672.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Cross-site scripting (XSS) vulnerability in Centreon 2.6.1." + "value": "Cross-site scripting (XSS) vulnerability in Centreon 2.6.1 (fixed in Centreon 18.10.0 and Centreon web 2.8.27)." } ] }, @@ -56,6 +56,26 @@ "name": "https://www.youtube.com/watch?v=sIONzwQAngU", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=sIONzwQAngU" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/6953", + "url": "https://github.com/centreon/centreon/pull/6953" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/6637", + "url": "https://github.com/centreon/centreon/pull/6637" } ] } diff --git a/2017/18xxx/CVE-2017-18381.json b/2017/18xxx/CVE-2017-18381.json new file mode 100644 index 00000000000..6cf38bfeb01 --- /dev/null +++ b/2017/18xxx/CVE-2017-18381.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18381", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://groups.google.com/forum/#!topic/openedx-announce/mpyyx34LWSY", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!topic/openedx-announce/mpyyx34LWSY" + }, + { + "url": "https://groups.google.com/forum/#!topic/openedx-announce/jRXyo1HJzNk", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!topic/openedx-announce/jRXyo1HJzNk" + } + ] + } +} \ No newline at end of file diff --git a/2018/19xxx/CVE-2018-19271.json b/2018/19xxx/CVE-2018-19271.json index 0f4c2d4f8fd..50712df51a3 100644 --- a/2018/19xxx/CVE-2018-19271.json +++ b/2018/19xxx/CVE-2018-19271.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Centreon 3.4.x allows SQL Injection via the main.php searchH parameter." + "value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.28) allows SQL Injection via the main.php searchH parameter." } ] }, @@ -58,9 +58,19 @@ "url": "http://www.rootlabs.com.br/authenticated-sql-injection-in-centreon-3-4-x/" }, { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", "name": "https://github.com/centreon/centreon/pull/6625", - "refsource": "MISC", "url": "https://github.com/centreon/centreon/pull/6625" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.28.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.28.html" } ] } diff --git a/2018/19xxx/CVE-2018-19280.json b/2018/19xxx/CVE-2018-19280.json index 2dbaaecde34..b57a91fb208 100644 --- a/2018/19xxx/CVE-2018-19280.json +++ b/2018/19xxx/CVE-2018-19280.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro." + "value": "Centreon 3.4.x (fixed in Centreon 18.10.0) has XSS via the resource name or macro expression of a poller macro." } ] }, @@ -53,8 +53,13 @@ "references": { "reference_data": [ { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", "name": "https://github.com/centreon/centreon/pull/6626", - "refsource": "MISC", "url": "https://github.com/centreon/centreon/pull/6626" } ] diff --git a/2018/19xxx/CVE-2018-19281.json b/2018/19xxx/CVE-2018-19281.json index 4a83a316c79..5386e9d4c6a 100644 --- a/2018/19xxx/CVE-2018-19281.json +++ b/2018/19xxx/CVE-2018-19281.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Centreon 3.4.x allows SNMP trap SQL Injection." + "value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection." } ] }, @@ -53,9 +53,24 @@ "references": { "reference_data": [ { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", "name": "https://github.com/centreon/centreon/pull/6627", - "refsource": "MISC", "url": "https://github.com/centreon/centreon/pull/6627" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/7069", + "url": "https://github.com/centreon/centreon/pull/7069" } ] } diff --git a/2018/19xxx/CVE-2018-19311.json b/2018/19xxx/CVE-2018-19311.json index cf4dc5537c5..8bc1851d9c8 100644 --- a/2018/19xxx/CVE-2018-19311.json +++ b/2018/19xxx/CVE-2018-19311.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the \"Monitoring > Status Details > Services\" screen." + "value": "Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the \"Monitoring > Status Details > Services\" screen." } ] }, @@ -56,6 +56,16 @@ "name": "http://www.roothc.com.br/1349-2/", "refsource": "MISC", "url": "http://www.roothc.com.br/1349-2/" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/6632", + "url": "https://github.com/centreon/centreon/pull/6632" } ] } diff --git a/2018/19xxx/CVE-2018-19312.json b/2018/19xxx/CVE-2018-19312.json index 4b5798e16c5..902c4383fab 100644 --- a/2018/19xxx/CVE-2018-19312.json +++ b/2018/19xxx/CVE-2018-19312.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI." + "value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI." } ] }, @@ -52,10 +52,30 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/6257", + "url": "https://github.com/centreon/centreon/pull/6257" + }, { "name": "http://www.roothc.com.br/1349-2/", "refsource": "MISC", "url": "http://www.roothc.com.br/1349-2/" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html", + "url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/centreon/centreon/pull/6628", + "url": "https://github.com/centreon/centreon/pull/6628" } ] } diff --git a/2018/20xxx/CVE-2018-20859.json b/2018/20xxx/CVE-2018-20859.json new file mode 100644 index 00000000000..9fd53e84a42 --- /dev/null +++ b/2018/20xxx/CVE-2018-20859.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20859", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "edx-platform before 2018-07-18 allows XSS via a response to a Chemical Equation advanced problem." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://groups.google.com/forum/#!topic/openedx-announce/wsm5mtUhhME", + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!topic/openedx-announce/wsm5mtUhhME" + }, + { + "refsource": "MISC", + "name": "https://github.com/edx/edx-platform/commit/5b144559fbdba7ff673cc1c165aa2d343e07b6bd.patch", + "url": "https://github.com/edx/edx-platform/commit/5b144559fbdba7ff673cc1c165aa2d343e07b6bd.patch" + }, + { + "refsource": "MISC", + "name": "https://patch-diff.githubusercontent.com/raw/edx/edx-platform/pull/18639.patch", + "url": "https://patch-diff.githubusercontent.com/raw/edx/edx-platform/pull/18639.patch" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20860.json b/2018/20xxx/CVE-2018-20860.json new file mode 100644 index 00000000000..ba695cf9e62 --- /dev/null +++ b/2018/20xxx/CVE-2018-20860.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20860", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "libopenmpt before 0.3.13 allows a crash with malformed MED files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/", + "refsource": "MISC", + "name": "https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20861.json b/2018/20xxx/CVE-2018-20861.json new file mode 100644 index 00000000000..c154988c753 --- /dev/null +++ b/2018/20xxx/CVE-2018-20861.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20861", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "libopenmpt before 0.3.11 allows a crash with certain malformed custom tunings in MPTM files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/", + "refsource": "MISC", + "name": "https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20871.json b/2018/20xxx/CVE-2018-20871.json new file mode 100644 index 00000000000..4e0a93c761b --- /dev/null +++ b/2018/20xxx/CVE-2018-20871.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20871", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Univa Grid Engine before 8.6.3, when configured for Docker jobs and execd spooling on root_squash, weak file permissions (\"other\" write access) occur in certain cases (GE-6890)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.univa.com/resources/files/Release_Notes_Univa_Grid_Engine_8.6.6.pdf", + "refsource": "MISC", + "name": "http://www.univa.com/resources/files/Release_Notes_Univa_Grid_Engine_8.6.6.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14380.json b/2019/14xxx/CVE-2019-14380.json new file mode 100644 index 00000000000..08a902a58b9 --- /dev/null +++ b/2019/14xxx/CVE-2019-14380.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14380", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "libopenmpt before 0.4.5 allows a crash during playback due to an out-of-bounds read in XM and MT2 files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/", + "refsource": "MISC", + "name": "https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14382.json b/2019/14xxx/CVE-2019-14382.json new file mode 100644 index 00000000000..ff256277ab9 --- /dev/null +++ b/2019/14xxx/CVE-2019-14382.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14382", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "DSM in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/", + "refsource": "MISC", + "name": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14383.json b/2019/14xxx/CVE-2019-14383.json new file mode 100644 index 00000000000..1043b4f6dd8 --- /dev/null +++ b/2019/14xxx/CVE-2019-14383.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14383", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "J2B in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/", + "refsource": "MISC", + "name": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/" + } + ] + } +} \ No newline at end of file diff --git a/2019/8xxx/CVE-2019-8324.json b/2019/8xxx/CVE-2019-8324.json index e76dbfc41d3..1bfedd76e94 100644 --- a/2019/8xxx/CVE-2019-8324.json +++ b/2019/8xxx/CVE-2019-8324.json @@ -61,6 +61,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1771", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1972", + "url": "https://access.redhat.com/errata/RHSA-2019:1972" } ] }