diff options
author | security tracker role <sectracker@soriano.debian.org> | 2021-04-02 08:10:22 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2021-04-02 08:10:22 +0000 |
commit | 2e213ecf689ce2e8ee3c581a51188e5dc50d19a6 (patch) | |
tree | 9cb8307e0147929353dc6604301da02a8d29aa2a /data/CVE/2020.list | |
parent | 04080c6a1f00fbd5c0a44c6ae7782aa15412f600 (diff) |
automatic update
Diffstat (limited to 'data/CVE/2020.list')
-rw-r--r-- | data/CVE/2020.list | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index c6ca8f2a22..e8b182a0d1 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -7103,7 +7103,7 @@ CVE-2020-27841 (There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib NOTE: https://github.com/rouault/openjpeg/commit/00383e162ae2f8fc951f5745bf1011771acb8dce (v2.4.0) CVE-2020-27840 [Heap corruption via crafted DN strings] RESERVED - {DLA-2611-1} + {DSA-4884-1 DLA-2611-1} - ldb 2:2.2.0-3.1 (bug #985936) - samba <unfixed> (unimportant) NOTE: https://www.samba.org/samba/security/CVE-2020-27840.html @@ -46239,7 +46239,7 @@ CVE-2020-10732 (A flaw was found in the Linux kernel's implementation of Userspa CVE-2020-10731 (A flaw was found in the nova_libvirt container provided by the Red Hat ...) NOT-FOR-US: Red Hat OpenStack platform CVE-2020-10730 (A NULL pointer dereference, or possible use-after-free flaw was found ...) - {DLA-2463-1} + {DSA-4884-1 DLA-2463-1} - ldb 2:2.1.4-1 [stretch] - ldb <not-affected> (Vulnerable code introduced later) - samba 2:4.12.5+dfsg-1 @@ -66460,7 +66460,7 @@ CVE-2020-1948 (This vulnerability can affect all Dubbo users stay on version 2.7 CVE-2020-1947 (In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingS ...) NOT-FOR-US: Apache ShardingSphere CVE-2020-1946 (In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf ...) - {DSA-4879-1} + {DSA-4879-1 DLA-2615-1} - spamassassin 3.4.5~pre1-1 (bug #985962) NOTE: https://www.openwall.com/lists/oss-security/2021/03/24/3 NOTE: https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7793 (not public) |