From b9e04869d14d800f4d4c31eed957702cb7777648 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 30 Apr 2020 19:01:23 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18276.json | 5 +++++ 2019/20xxx/CVE-2019-20636.json | 5 +++++ 2020/11xxx/CVE-2020-11494.json | 5 +++++ 2020/11xxx/CVE-2020-11608.json | 5 +++++ 2020/11xxx/CVE-2020-11609.json | 5 +++++ 2020/11xxx/CVE-2020-11668.json | 5 +++++ 2020/11xxx/CVE-2020-11669.json | 5 +++++ 2020/11xxx/CVE-2020-11736.json | 5 +++++ 2020/12xxx/CVE-2020-12078.json | 5 +++++ 2020/12xxx/CVE-2020-12593.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12594.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12595.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12596.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12597.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12598.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12599.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12600.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12601.json | 18 ++++++++++++++++++ 2020/12xxx/CVE-2020-12602.json | 18 ++++++++++++++++++ 2020/1xxx/CVE-2020-1751.json | 5 +++++ 2020/5xxx/CVE-2020-5863.json | 5 +++++ 2020/5xxx/CVE-2020-5864.json | 5 +++++ 2020/5xxx/CVE-2020-5865.json | 5 +++++ 2020/5xxx/CVE-2020-5866.json | 5 +++++ 2020/5xxx/CVE-2020-5867.json | 5 +++++ 2020/8xxx/CVE-2020-8832.json | 5 +++++ 2020/8xxx/CVE-2020-8835.json | 5 +++++ 27 files changed, 265 insertions(+) create mode 100644 2020/12xxx/CVE-2020-12593.json create mode 100644 2020/12xxx/CVE-2020-12594.json create mode 100644 2020/12xxx/CVE-2020-12595.json create mode 100644 2020/12xxx/CVE-2020-12596.json create mode 100644 2020/12xxx/CVE-2020-12597.json create mode 100644 2020/12xxx/CVE-2020-12598.json create mode 100644 2020/12xxx/CVE-2020-12599.json create mode 100644 2020/12xxx/CVE-2020-12600.json create mode 100644 2020/12xxx/CVE-2020-12601.json create mode 100644 2020/12xxx/CVE-2020-12602.json diff --git a/2019/18xxx/CVE-2019-18276.json b/2019/18xxx/CVE-2019-18276.json index ac8fefeedce..4bcda6f3d0c 100644 --- a/2019/18xxx/CVE-2019-18276.json +++ b/2019/18xxx/CVE-2019-18276.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0003/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0003/" } ] } diff --git a/2019/20xxx/CVE-2019-20636.json b/2019/20xxx/CVE-2019-20636.json index 249dd2c320b..847aac5c3eb 100644 --- a/2019/20xxx/CVE-2019-20636.json +++ b/2019/20xxx/CVE-2019-20636.json @@ -66,6 +66,11 @@ "url": "https://github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784", "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] } diff --git a/2020/11xxx/CVE-2020-11494.json b/2020/11xxx/CVE-2020-11494.json index d3bcc447e5b..2368a57b1a1 100644 --- a/2020/11xxx/CVE-2020-11494.json +++ b/2020/11xxx/CVE-2020-11494.json @@ -61,6 +61,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0543", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] } diff --git a/2020/11xxx/CVE-2020-11608.json b/2020/11xxx/CVE-2020-11608.json index db342ec8a37..83fdbacb903 100644 --- a/2020/11xxx/CVE-2020-11608.json +++ b/2020/11xxx/CVE-2020-11608.json @@ -66,6 +66,11 @@ "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1", "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] } diff --git a/2020/11xxx/CVE-2020-11609.json b/2020/11xxx/CVE-2020-11609.json index 1bd57e30fef..119da1525b9 100644 --- a/2020/11xxx/CVE-2020-11609.json +++ b/2020/11xxx/CVE-2020-11609.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] } diff --git a/2020/11xxx/CVE-2020-11668.json b/2020/11xxx/CVE-2020-11668.json index 075f26b5f83..fe47ac9e9f5 100644 --- a/2020/11xxx/CVE-2020-11668.json +++ b/2020/11xxx/CVE-2020-11668.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a246b4d547708f33ff4d4b9a7a5dbac741dc89d8", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a246b4d547708f33ff4d4b9a7a5dbac741dc89d8" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] } diff --git a/2020/11xxx/CVE-2020-11669.json b/2020/11xxx/CVE-2020-11669.json index 9ca38ad8ebe..62f8303abda 100644 --- a/2020/11xxx/CVE-2020-11669.json +++ b/2020/11xxx/CVE-2020-11669.json @@ -91,6 +91,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0543", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0001/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0001/" } ] } diff --git a/2020/11xxx/CVE-2020-11736.json b/2020/11xxx/CVE-2020-11736.json index 3bc1ddcd642..1c8ad1da374 100644 --- a/2020/11xxx/CVE-2020-11736.json +++ b/2020/11xxx/CVE-2020-11736.json @@ -66,6 +66,11 @@ "refsource": "UBUNTU", "name": "USN-4332-1", "url": "https://usn.ubuntu.com/4332-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4332-2", + "url": "https://usn.ubuntu.com/4332-2/" } ] } diff --git a/2020/12xxx/CVE-2020-12078.json b/2020/12xxx/CVE-2020-12078.json index 21674e389de..43f889580d7 100644 --- a/2020/12xxx/CVE-2020-12078.json +++ b/2020/12xxx/CVE-2020-12078.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a", "url": "https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html" } ] } diff --git a/2020/12xxx/CVE-2020-12593.json b/2020/12xxx/CVE-2020-12593.json new file mode 100644 index 00000000000..d0cae3d3c70 --- /dev/null +++ b/2020/12xxx/CVE-2020-12593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12594.json b/2020/12xxx/CVE-2020-12594.json new file mode 100644 index 00000000000..87811c2921f --- /dev/null +++ b/2020/12xxx/CVE-2020-12594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12594", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12595.json b/2020/12xxx/CVE-2020-12595.json new file mode 100644 index 00000000000..242374c7e33 --- /dev/null +++ b/2020/12xxx/CVE-2020-12595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12595", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12596.json b/2020/12xxx/CVE-2020-12596.json new file mode 100644 index 00000000000..d56eb0853ca --- /dev/null +++ b/2020/12xxx/CVE-2020-12596.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12596", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12597.json b/2020/12xxx/CVE-2020-12597.json new file mode 100644 index 00000000000..e986899a82c --- /dev/null +++ b/2020/12xxx/CVE-2020-12597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12597", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12598.json b/2020/12xxx/CVE-2020-12598.json new file mode 100644 index 00000000000..ce02b71c74d --- /dev/null +++ b/2020/12xxx/CVE-2020-12598.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12598", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12599.json b/2020/12xxx/CVE-2020-12599.json new file mode 100644 index 00000000000..8cdaa554031 --- /dev/null +++ b/2020/12xxx/CVE-2020-12599.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12599", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12600.json b/2020/12xxx/CVE-2020-12600.json new file mode 100644 index 00000000000..f982f95ff59 --- /dev/null +++ b/2020/12xxx/CVE-2020-12600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12601.json b/2020/12xxx/CVE-2020-12601.json new file mode 100644 index 00000000000..c0df2c5eeb4 --- /dev/null +++ b/2020/12xxx/CVE-2020-12601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/12xxx/CVE-2020-12602.json b/2020/12xxx/CVE-2020-12602.json new file mode 100644 index 00000000000..c46be5ca3d0 --- /dev/null +++ b/2020/12xxx/CVE-2020-12602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/1xxx/CVE-2020-1751.json b/2020/1xxx/CVE-2020-1751.json index 6a7e3d3f620..d3ce835a87a 100644 --- a/2020/1xxx/CVE-2020-1751.json +++ b/2020/1xxx/CVE-2020-1751.json @@ -53,6 +53,11 @@ "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25423", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=25423", "refsource": "MISC" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0002/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0002/" } ] }, diff --git a/2020/5xxx/CVE-2020-5863.json b/2020/5xxx/CVE-2020-5863.json index d3cf3040e33..e3a84eced72 100644 --- a/2020/5xxx/CVE-2020-5863.json +++ b/2020/5xxx/CVE-2020-5863.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.f5.com/csp/article/K14631834", "url": "https://support.f5.com/csp/article/K14631834" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0005/" } ] }, diff --git a/2020/5xxx/CVE-2020-5864.json b/2020/5xxx/CVE-2020-5864.json index c3e7be7bdde..64378121f57 100644 --- a/2020/5xxx/CVE-2020-5864.json +++ b/2020/5xxx/CVE-2020-5864.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K27205552", "url": "https://support.f5.com/csp/article/K27205552" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0005/" } ] }, diff --git a/2020/5xxx/CVE-2020-5865.json b/2020/5xxx/CVE-2020-5865.json index 646e207d9b7..42b31ceb998 100644 --- a/2020/5xxx/CVE-2020-5865.json +++ b/2020/5xxx/CVE-2020-5865.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K21009022", "url": "https://support.f5.com/csp/article/K21009022" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0005/" } ] }, diff --git a/2020/5xxx/CVE-2020-5866.json b/2020/5xxx/CVE-2020-5866.json index 65dda54556f..d45d9b386dd 100644 --- a/2020/5xxx/CVE-2020-5866.json +++ b/2020/5xxx/CVE-2020-5866.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K11922628", "url": "https://support.f5.com/csp/article/K11922628" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0005/" } ] }, diff --git a/2020/5xxx/CVE-2020-5867.json b/2020/5xxx/CVE-2020-5867.json index 627a123e536..5acabbf327e 100644 --- a/2020/5xxx/CVE-2020-5867.json +++ b/2020/5xxx/CVE-2020-5867.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K00958787", "url": "https://support.f5.com/csp/article/K00958787" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0005/" } ] }, diff --git a/2020/8xxx/CVE-2020-8832.json b/2020/8xxx/CVE-2020-8832.json index 98a518ba6f6..8ead7efa86f 100644 --- a/2020/8xxx/CVE-2020-8832.json +++ b/2020/8xxx/CVE-2020-8832.json @@ -90,6 +90,11 @@ "name": "USN-4302-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-4302-1" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] }, diff --git a/2020/8xxx/CVE-2020-8835.json b/2020/8xxx/CVE-2020-8835.json index 6a299549573..9a9cbd31aaf 100644 --- a/2020/8xxx/CVE-2020-8835.json +++ b/2020/8xxx/CVE-2020-8835.json @@ -149,6 +149,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-73c00eda1c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TF4PQZBEPNXDSK5DOBMW54OCLP25FTCD/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200430-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200430-0004/" } ] },