summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-04-10 09:35:15 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-04-10 09:35:15 +0200
commit67f0d3ff0b4b917d8fea241b4f7af231c3896a4a (patch)
treea6d76886b0f5828b5f144149aee0cb328aabd720
parent2f923b825a5d74b1e962208fd06a57926750f6ed (diff)
Add CVE-2020-10707/netty which we probably should drop
The pull request referenced is the same as for CVE-2020-11612 and the issue correlation seem to be the same. This might be just a duplicate candidate assignment of CVE-2020-11612 itself thus. For now track it separately until situation on the CVE is clarified by either upstream or Red Hat as the assigning CNA for CVE-2020-10707.
-rw-r--r--data/CVE/list6
1 files changed, 5 insertions, 1 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 1695db5a8b..b1da14de10 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -2605,8 +2605,12 @@ CVE-2020-10709
RESERVED
CVE-2020-10708
RESERVED
-CVE-2020-10707
+CVE-2020-10707 [compression/decompression codecs don't enforce limits on buffer allocation sizes]
RESERVED
+ - netty 1:4.1.48-1
+ NOTE: https://github.com/netty/netty/pull/9924
+ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1816216
+ TODO: This seem to be a duplicate of CVE-2020-11612, pending request with Red Hat secalert
CVE-2020-10706
RESERVED
CVE-2020-10705

© 2014-2024 Faster IT GmbH | imprint | privacy policy