From d58043de41206266667fd052be9795c3f8336a84 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 29 Jan 2020 21:01:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/20xxx/CVE-2019-20444.json | 67 ++++++++++++++++++++++++++++++++++ 2019/20xxx/CVE-2019-20445.json | 67 ++++++++++++++++++++++++++++++++++ 2019/2xxx/CVE-2019-2204.json | 4 +- 2019/2xxx/CVE-2019-2208.json | 4 +- 2019/2xxx/CVE-2019-2218.json | 4 +- 2020/0xxx/CVE-2020-0002.json | 4 +- 2020/0xxx/CVE-2020-0003.json | 4 +- 2020/0xxx/CVE-2020-0004.json | 6 +-- 2020/0xxx/CVE-2020-0006.json | 4 +- 2020/0xxx/CVE-2020-0007.json | 4 +- 2020/0xxx/CVE-2020-0008.json | 4 +- 2020/0xxx/CVE-2020-0009.json | 4 +- 12 files changed, 155 insertions(+), 21 deletions(-) create mode 100644 2019/20xxx/CVE-2019-20444.json create mode 100644 2019/20xxx/CVE-2019-20445.json diff --git a/2019/20xxx/CVE-2019-20444.json b/2019/20xxx/CVE-2019-20444.json new file mode 100644 index 00000000000..ac70c482731 --- /dev/null +++ b/2019/20xxx/CVE-2019-20444.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-20444", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an \"invalid fold.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/netty/netty/issues/9866", + "refsource": "MISC", + "name": "https://github.com/netty/netty/issues/9866" + }, + { + "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final", + "refsource": "MISC", + "name": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20445.json b/2019/20xxx/CVE-2019-20445.json new file mode 100644 index 00000000000..25d22ce6c34 --- /dev/null +++ b/2019/20xxx/CVE-2019-20445.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-20445", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final", + "refsource": "MISC", + "name": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" + }, + { + "url": "https://github.com/netty/netty/issues/9861", + "refsource": "MISC", + "name": "https://github.com/netty/netty/issues/9861" + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2204.json b/2019/2xxx/CVE-2019-2204.json index c1e62fe7203..263009f270e 100644 --- a/2019/2xxx/CVE-2019-2204.json +++ b/2019/2xxx/CVE-2019-2204.json @@ -49,8 +49,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-09", - "url": "https://source.android.com/security/bulletin/2020-01-09" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2019/2xxx/CVE-2019-2208.json b/2019/2xxx/CVE-2019-2208.json index a2c00d0c26c..57a38c7d79f 100644 --- a/2019/2xxx/CVE-2019-2208.json +++ b/2019/2xxx/CVE-2019-2208.json @@ -49,8 +49,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-10", - "url": "https://source.android.com/security/bulletin/2020-01-10" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2019/2xxx/CVE-2019-2218.json b/2019/2xxx/CVE-2019-2218.json index 667877d3661..1a474ff48ab 100644 --- a/2019/2xxx/CVE-2019-2218.json +++ b/2019/2xxx/CVE-2019-2218.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-08", - "url": "https://source.android.com/security/bulletin/2020-01-08" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0002.json b/2020/0xxx/CVE-2020-0002.json index d2faf8e1da2..17fe7213e24 100644 --- a/2020/0xxx/CVE-2020-0002.json +++ b/2020/0xxx/CVE-2020-0002.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-04", - "url": "https://source.android.com/security/bulletin/2020-01-04" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0003.json b/2020/0xxx/CVE-2020-0003.json index aa94829785d..1495ef533e9 100644 --- a/2020/0xxx/CVE-2020-0003.json +++ b/2020/0xxx/CVE-2020-0003.json @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-02", - "url": "https://source.android.com/security/bulletin/2020-01-02" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0004.json b/2020/0xxx/CVE-2020-0004.json index 2da238b8688..76fc7c865d3 100644 --- a/2020/0xxx/CVE-2020-0004.json +++ b/2020/0xxx/CVE-2020-0004.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-03", - "url": "https://source.android.com/security/bulletin/2020-01-03" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, @@ -64,7 +64,7 @@ "description_data": [ { "lang": "eng", - "value": "In generateCrop of WallpaperManagerService.java, there is a possible sysui crash due to image exceeding maximum texture size. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-120847476" + "value": "In generateCrop of WallpaperManagerService.java, there is a possible sysui crash due to image exceeding maximum texture size. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120847476" } ] } diff --git a/2020/0xxx/CVE-2020-0006.json b/2020/0xxx/CVE-2020-0006.json index 53e14a8adf3..6c046cc39ad 100644 --- a/2020/0xxx/CVE-2020-0006.json +++ b/2020/0xxx/CVE-2020-0006.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-05", - "url": "https://source.android.com/security/bulletin/2020-01-05" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0007.json b/2020/0xxx/CVE-2020-0007.json index a53a70945c0..46d6ce4f30e 100644 --- a/2020/0xxx/CVE-2020-0007.json +++ b/2020/0xxx/CVE-2020-0007.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-06", - "url": "https://source.android.com/security/bulletin/2020-01-06" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0008.json b/2020/0xxx/CVE-2020-0008.json index 0044c50b410..9506928f3e8 100644 --- a/2020/0xxx/CVE-2020-0008.json +++ b/2020/0xxx/CVE-2020-0008.json @@ -55,8 +55,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-07", - "url": "https://source.android.com/security/bulletin/2020-01-07" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" } ] }, diff --git a/2020/0xxx/CVE-2020-0009.json b/2020/0xxx/CVE-2020-0009.json index 1d167870520..fc892315301 100644 --- a/2020/0xxx/CVE-2020-0009.json +++ b/2020/0xxx/CVE-2020-0009.json @@ -46,8 +46,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://source.android.com/security/bulletin/2020-01-11", - "url": "https://source.android.com/security/bulletin/2020-01-11" + "name": "https://source.android.com/security/bulletin/2020-01-01", + "url": "https://source.android.com/security/bulletin/2020-01-01" }, { "refsource": "MISC",