summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-04-10 09:35:15 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-04-10 09:35:15 +0200
commit8207f7e92a135e98bf3b08e3efc68518132f249b (patch)
tree338b3c48f808e90f7c0c349f728551de8716c5dc
parent3293be41e85f41e44a5b337e870ac71250ab2d93 (diff)
Add CVE-2020-10707/netty which we probably should drop
The pull request referenced is the same as for CVE-2020-11612 and the issue correlation seem to be the same. This might be just a duplicate candidate assignment of CVE-2020-11612 itself thus. For now track it separately until situation on the CVE is clarified by either upstream or Red Hat as the assigning CNA for CVE-2020-10707.
-rw-r--r--data/CVE/list.20206
1 files changed, 5 insertions, 1 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020
index 9b1526aca1..6cfcd1df0f 100644
--- a/data/CVE/list.2020
+++ b/data/CVE/list.2020
@@ -2066,8 +2066,12 @@ CVE-2020-10709
RESERVED
CVE-2020-10708
RESERVED
-CVE-2020-10707
+CVE-2020-10707 [compression/decompression codecs don't enforce limits on buffer allocation sizes]
RESERVED
+ - netty 1:4.1.48-1
+ NOTE: https://github.com/netty/netty/pull/9924
+ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1816216
+ TODO: This seem to be a duplicate of CVE-2020-11612, pending request with Red Hat secalert
CVE-2020-10706
RESERVED
CVE-2020-10705

© 2014-2024 Faster IT GmbH | imprint | privacy policy