diff --git a/2020/27xxx/CVE-2020-27670.json b/2020/27xxx/CVE-2020-27670.json index 2c90a19ecba..6e2dbd22809 100644 --- a/2020/27xxx/CVE-2020-27670.json +++ b/2020/27xxx/CVE-2020-27670.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-4804", "url": "https://www.debian.org/security/2020/dsa-4804" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 347 v3 (CVE-2020-27670) - unsafe AMD IOMMU page table updates", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/9" } ] } diff --git a/2020/27xxx/CVE-2020-27671.json b/2020/27xxx/CVE-2020-27671.json index e2229bb8adc..fdd922dbe87 100644 --- a/2020/27xxx/CVE-2020-27671.json +++ b/2020/27xxx/CVE-2020-27671.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-4804", "url": "https://www.debian.org/security/2020/dsa-4804" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 346 v3 (CVE-2020-27671) - undue deferral of IOMMU TLB flushes", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/8" } ] } diff --git a/2020/27xxx/CVE-2020-27672.json b/2020/27xxx/CVE-2020-27672.json index 8f434406107..ba1d605f4b0 100644 --- a/2020/27xxx/CVE-2020-27672.json +++ b/2020/27xxx/CVE-2020-27672.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-4804", "url": "https://www.debian.org/security/2020/dsa-4804" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 345 v4 (CVE-2020-27672) - x86: Race condition in Xen mapping code", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/7" } ] } diff --git a/2020/27xxx/CVE-2020-27673.json b/2020/27xxx/CVE-2020-27673.json index 9e5e4b3483d..815cef3211f 100644 --- a/2020/27xxx/CVE-2020-27673.json +++ b/2020/27xxx/CVE-2020-27673.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/6" } ] } diff --git a/2020/27xxx/CVE-2020-27674.json b/2020/27xxx/CVE-2020-27674.json index cf2ab5601a7..357e126a0d0 100644 --- a/2020/27xxx/CVE-2020-27674.json +++ b/2020/27xxx/CVE-2020-27674.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-4804", "url": "https://www.debian.org/security/2020/dsa-4804" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 286 v6 (CVE-2020-27674) - x86 PV guest INVLPG-like flushes may leave stale TLB entries", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/5" } ] } diff --git a/2020/27xxx/CVE-2020-27675.json b/2020/27xxx/CVE-2020-27675.json index 24fdf24b818..214aa6eae4c 100644 --- a/2020/27xxx/CVE-2020-27675.json +++ b/2020/27xxx/CVE-2020-27675.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 331 v3 (CVE-2020-27675) - Race condition in Linux event handler may crash dom0", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/3" } ] } diff --git a/2020/28xxx/CVE-2020-28208.json b/2020/28xxx/CVE-2020-28208.json index e626065d1ab..bd92b9a3e20 100644 --- a/2020/28xxx/CVE-2020-28208.json +++ b/2020/28xxx/CVE-2020-28208.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210113 Re: Trovent Security Advisory 2010-01 [updated] / CVE-2020-28208: Rocket.Chat email address enumeration vulnerability", "url": "http://www.openwall.com/lists/oss-security/2021/01/13/1" + }, + { + "refsource": "FULLDISC", + "name": "20210119 Re: Trovent Security Advisory 2010-01 [updated] / CVE-2020-28208: Rocket.Chat email address enumeration vulnerability", + "url": "http://seclists.org/fulldisclosure/2021/Jan/43" } ] } diff --git a/2020/29xxx/CVE-2020-29040.json b/2020/29xxx/CVE-2020-29040.json index f3c87629bb3..bce37003be6 100644 --- a/2020/29xxx/CVE-2020-29040.json +++ b/2020/29xxx/CVE-2020-29040.json @@ -56,6 +56,11 @@ "url": "https://xenbits.xen.org/xsa/advisory-355.html", "refsource": "MISC", "name": "https://xenbits.xen.org/xsa/advisory-355.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Xen Security Advisory 355 v3 (CVE-2020-29040) - stack corruption from XSA-346 change", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/4" } ] } diff --git a/2021/3xxx/CVE-2021-3181.json b/2021/3xxx/CVE-2021-3181.json index 0dcd674d00e..e963456562e 100644 --- a/2021/3xxx/CVE-2021-3181.json +++ b/2021/3xxx/CVE-2021-3181.json @@ -71,6 +71,11 @@ "url": "https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14", "refsource": "MISC", "name": "https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20210119 Re: mutt recipient parsing memory leak", + "url": "http://www.openwall.com/lists/oss-security/2021/01/19/10" } ] }