diff --git a/2019/13xxx/CVE-2019-13033.json b/2019/13xxx/CVE-2019-13033.json index 29f6dbe049e..24dc50eab91 100644 --- a/2019/13xxx/CVE-2019-13033.json +++ b/2019/13xxx/CVE-2019-13033.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-f251753b0f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-059e1591d6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD/" } ] } diff --git a/2020/12xxx/CVE-2020-12695.json b/2020/12xxx/CVE-2020-12695.json index 39f608d818b..032c0b1249d 100644 --- a/2020/12xxx/CVE-2020-12695.json +++ b/2020/12xxx/CVE-2020-12695.json @@ -91,6 +91,11 @@ "refsource": "MISC", "name": "https://github.com/corelight/callstranger-detector", "url": "https://github.com/corelight/callstranger-detector" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-df3e1cfde9", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" } ] } diff --git a/2020/13xxx/CVE-2020-13625.json b/2020/13xxx/CVE-2020-13625.json index 15493635125..55674a8869b 100644 --- a/2020/13xxx/CVE-2020-13625.json +++ b/2020/13xxx/CVE-2020-13625.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-06e87e71fe", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-0bbe6304e3", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/" } ] } diff --git a/2020/13xxx/CVE-2020-13775.json b/2020/13xxx/CVE-2020-13775.json index e8b9f785be5..1b332692c5e 100644 --- a/2020/13xxx/CVE-2020-13775.json +++ b/2020/13xxx/CVE-2020-13775.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-0091083d6d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HS3DWGXLVRROQQA57UIPMDM6XMVEMBRA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-12237dbae2", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNVBE4T2DRJRQHFRMHYBTN4OSOL6DBHR/" } ] } diff --git a/2020/13xxx/CVE-2020-13882.json b/2020/13xxx/CVE-2020-13882.json index 124daed5d1b..732f388ccb7 100644 --- a/2020/13xxx/CVE-2020-13882.json +++ b/2020/13xxx/CVE-2020-13882.json @@ -61,6 +61,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-f251753b0f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-059e1591d6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD/" } ] } diff --git a/2020/14xxx/CVE-2020-14929.json b/2020/14xxx/CVE-2020-14929.json index 408ff5ded1a..d062319d58e 100644 --- a/2020/14xxx/CVE-2020-14929.json +++ b/2020/14xxx/CVE-2020-14929.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200625 [SECURITY] [DLA 2254-1] alpine security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00025.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-386249cec2", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJLY6JDVGDNAJZ3UQDWYWSDBWOAOXMNX/" } ] } diff --git a/2020/14xxx/CVE-2020-14954.json b/2020/14xxx/CVE-2020-14954.json index aad012d26bf..c2531f30265 100644 --- a/2020/14xxx/CVE-2020-14954.json +++ b/2020/14xxx/CVE-2020-14954.json @@ -111,6 +111,16 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-1cb4c3697b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3LXFVPTLK4PNHL6MPKJNJQJ25CH7GLQ/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4403-1", + "url": "https://usn.ubuntu.com/4403-1/" } ] } diff --git a/2020/5xxx/CVE-2020-5963.json b/2020/5xxx/CVE-2020-5963.json index a3390772047..4c1cd4e7d77 100644 --- a/2020/5xxx/CVE-2020-5963.json +++ b/2020/5xxx/CVE-2020-5963.json @@ -1,62 +1,72 @@ { - "data_type" : "CVE", - "data_format" : "MITRE", - "data_version" : "4.0", - "CVE_data_meta" : { - "ID" : "CVE-2020-5963", - "ASSIGNER" : "psirt@nvidia.com", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "NVIDIA", - "product" : { - "product_data" : [ - { - "product_name" : "NVIDIA GPU Display Driver", - "version" : { - "version_data" : [ - { - "version_value" : "All" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "code execution or denial of service or escalation of privileges" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the Inter Process Communication APIs, in which improper access control may lead to code execution, denial of service, or information disclosure." - } - ] - } -} + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-5963", + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA GPU Display Driver", + "version": { + "version_data": [ + { + "version_value": "All" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution or denial of service or escalation of privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-2", + "url": "https://usn.ubuntu.com/4404-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-1", + "url": "https://usn.ubuntu.com/4404-1/" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the Inter Process Communication APIs, in which improper access control may lead to code execution, denial of service, or information disclosure." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5967.json b/2020/5xxx/CVE-2020-5967.json index 9bc4a906fb6..013e9b22038 100644 --- a/2020/5xxx/CVE-2020-5967.json +++ b/2020/5xxx/CVE-2020-5967.json @@ -1,62 +1,72 @@ { - "data_type" : "CVE", - "data_format" : "MITRE", - "data_version" : "4.0", - "CVE_data_meta" : { - "ID" : "CVE-2020-5967", - "ASSIGNER" : "psirt@nvidia.com", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "NVIDIA", - "product" : { - "product_data" : [ - { - "product_name" : "NVIDIA GPU Display Driver", - "version" : { - "version_data" : [ - { - "version_value" : "All" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service." - } - ] - } -} + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-5967", + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA GPU Display Driver", + "version": { + "version_data": [ + { + "version_value": "All" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-2", + "url": "https://usn.ubuntu.com/4404-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-1", + "url": "https://usn.ubuntu.com/4404-1/" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5973.json b/2020/5xxx/CVE-2020-5973.json index 741358efdca..b018e86a8bb 100644 --- a/2020/5xxx/CVE-2020-5973.json +++ b/2020/5xxx/CVE-2020-5973.json @@ -1,62 +1,72 @@ { - "data_type" : "CVE", - "data_format" : "MITRE", - "data_version" : "4.0", - "CVE_data_meta" : { - "ID" : "CVE-2020-5973", - "ASSIGNER" : "psirt@nvidia.com", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "NVIDIA", - "product" : { - "product_data" : [ - { - "product_name" : "NVIDIA vGPU Software", - "version" : { - "version_data" : [ - { - "version_value" : "All" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Virtual GPU Manager and the guest drivers contain a vulnerability in vGPU plugin, in which there is the potential to execute privileged operations, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3)." - } - ] - } -} + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-5973", + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "NVIDIA vGPU Software", + "version": { + "version_data": [ + { + "version_value": "All" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5031" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-2", + "url": "https://usn.ubuntu.com/4404-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4404-1", + "url": "https://usn.ubuntu.com/4404-1/" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Virtual GPU Manager and the guest drivers contain a vulnerability in vGPU plugin, in which there is the potential to execute privileged operations, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3)." + } + ] + } +} \ No newline at end of file