diff --git a/2020/11xxx/CVE-2020-11994.json b/2020/11xxx/CVE-2020-11994.json index 2de4b6f31bc..c8fd396c2aa 100644 --- a/2020/11xxx/CVE-2020-11994.json +++ b/2020/11xxx/CVE-2020-11994.json @@ -55,7 +55,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11998.json b/2020/11xxx/CVE-2020-11998.json index 9c750785415..d1008aa05f3 100644 --- a/2020/11xxx/CVE-2020-11998.json +++ b/2020/11xxx/CVE-2020-11998.json @@ -65,7 +65,9 @@ "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12114.json b/2020/12xxx/CVE-2020-12114.json index e45283669fb..6fee9680a39 100644 --- a/2020/12xxx/CVE-2020-12114.json +++ b/2020/12xxx/CVE-2020-12114.json @@ -52,16 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "http://www.openwall.com/lists/oss-security/2020/05/04/2", - "url": "http://www.openwall.com/lists/oss-security/2020/05/04/2" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", - "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update", @@ -122,13 +112,25 @@ "name": "USN-4391-1", "url": "https://usn.ubuntu.com/4391-1/" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", + "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" + }, + { + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2020/05/04/2", + "url": "http://www.openwall.com/lists/oss-security/2020/05/04/2" + }, { "refsource": "MISC", "name": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html", "url": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/12xxx/CVE-2020-12723.json b/2020/12xxx/CVE-2020-12723.json index 22226a753c1..d60b3a2653c 100644 --- a/2020/12xxx/CVE-2020-12723.json +++ b/2020/12xxx/CVE-2020-12723.json @@ -108,7 +108,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/12xxx/CVE-2020-12771.json b/2020/12xxx/CVE-2020-12771.json index 58e7db73f10..b1cbfe60190 100644 --- a/2020/12xxx/CVE-2020-12771.json +++ b/2020/12xxx/CVE-2020-12771.json @@ -52,16 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "CONFIRM", - "name": "https://lkml.org/lkml/2020/4/26/87", - "url": "https://lkml.org/lkml/2020/4/26/87" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", - "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1062", @@ -113,7 +103,19 @@ "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", + "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" + }, + { + "refsource": "CONFIRM", + "name": "https://lkml.org/lkml/2020/4/26/87", + "url": "https://lkml.org/lkml/2020/4/26/87" } ] } diff --git a/2020/13xxx/CVE-2020-13434.json b/2020/13xxx/CVE-2020-13434.json index c16b73a655c..3d134e599e1 100644 --- a/2020/13xxx/CVE-2020-13434.json +++ b/2020/13xxx/CVE-2020-13434.json @@ -102,6 +102,26 @@ "name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/19" + }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/20" + }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/22" + }, + { + "refsource": "FULLDISC", + "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", + "url": "http://seclists.org/fulldisclosure/2020/Dec/32" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211843", @@ -122,38 +142,20 @@ "name": "https://support.apple.com/kb/HT211931", "url": "https://support.apple.com/kb/HT211931" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211952", "url": "https://support.apple.com/kb/HT211952" }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/19" - }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/20" - }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/22" - }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211935", "url": "https://support.apple.com/kb/HT211935" - }, - { - "refsource": "FULLDISC", - "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", - "url": "http://seclists.org/fulldisclosure/2020/Dec/32" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13435.json b/2020/13xxx/CVE-2020-13435.json index 7c50d62e530..14f8d244236 100644 --- a/2020/13xxx/CVE-2020-13435.json +++ b/2020/13xxx/CVE-2020-13435.json @@ -87,6 +87,26 @@ "name": "FreeBSD-SA-20:22", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/19" + }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/20" + }, + { + "refsource": "FULLDISC", + "name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0", + "url": "http://seclists.org/fulldisclosure/2020/Nov/22" + }, + { + "refsource": "FULLDISC", + "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", + "url": "http://seclists.org/fulldisclosure/2020/Dec/32" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211843", @@ -107,38 +127,20 @@ "name": "https://support.apple.com/kb/HT211931", "url": "https://support.apple.com/kb/HT211931" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211952", "url": "https://support.apple.com/kb/HT211952" }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/19" - }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/20" - }, - { - "refsource": "FULLDISC", - "name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0", - "url": "http://seclists.org/fulldisclosure/2020/Nov/22" - }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211935", "url": "https://support.apple.com/kb/HT211935" - }, - { - "refsource": "FULLDISC", - "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", - "url": "http://seclists.org/fulldisclosure/2020/Dec/32" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13871.json b/2020/13xxx/CVE-2020-13871.json index d069569e390..2d34173e8b8 100644 --- a/2020/13xxx/CVE-2020-13871.json +++ b/2020/13xxx/CVE-2020-13871.json @@ -93,7 +93,9 @@ "url": "https://security.netapp.com/advisory/ntap-20200619-0002/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13934.json b/2020/13xxx/CVE-2020-13934.json index 72c745cc464..126ec5f9219 100644 --- a/2020/13xxx/CVE-2020-13934.json +++ b/2020/13xxx/CVE-2020-13934.json @@ -95,7 +95,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13935.json b/2020/13xxx/CVE-2020-13935.json index 4b6f6c7645f..836573590d0 100644 --- a/2020/13xxx/CVE-2020-13935.json +++ b/2020/13xxx/CVE-2020-13935.json @@ -105,7 +105,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13943.json b/2020/13xxx/CVE-2020-13943.json index c0da390e4d1..935bcbf8b00 100644 --- a/2020/13xxx/CVE-2020-13943.json +++ b/2020/13xxx/CVE-2020-13943.json @@ -54,11 +54,6 @@ "name": "[debian-lts-announce] 20201014 [SECURITY] [DLA 2407-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20201016-0007/", - "url": "https://security.netapp.com/advisory/ntap-20201016-0007/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1799", @@ -75,7 +70,14 @@ "url": "https://www.debian.org/security/2021/dsa-4835" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20201016-0007/", + "url": "https://security.netapp.com/advisory/ntap-20201016-0007/" } ] }, diff --git a/2020/13xxx/CVE-2020-13947.json b/2020/13xxx/CVE-2020-13947.json index c1a758ae896..d5109b26699 100644 --- a/2020/13xxx/CVE-2020-13947.json +++ b/2020/13xxx/CVE-2020-13947.json @@ -65,7 +65,9 @@ "url": "https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13954.json b/2020/13xxx/CVE-2020-13954.json index b293b1f2530..54fa4e4d2a3 100644 --- a/2020/13xxx/CVE-2020-13954.json +++ b/2020/13xxx/CVE-2020-13954.json @@ -113,18 +113,20 @@ "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210513-0010/", - "url": "https://security.netapp.com/advisory/ntap-20210513-0010/" - }, { "refsource": "MLIST", "name": "[syncope-dev] 20210526 [GitHub] [syncope] coheigea opened a new pull request #268: Disable CXF Services Listing", "url": "https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210513-0010/", + "url": "https://security.netapp.com/advisory/ntap-20210513-0010/" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 8955cc6ed7d..554ee8c055e 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -225,7 +225,9 @@ "url": "https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14039.json b/2020/14xxx/CVE-2020-14039.json index 4d9bd9e9714..35d81e819e3 100644 --- a/2020/14xxx/CVE-2020-14039.json +++ b/2020/14xxx/CVE-2020-14039.json @@ -57,11 +57,6 @@ "refsource": "MISC", "name": "https://groups.google.com/forum/#!forum/golang-announce" }, - { - "refsource": "CONFIRM", - "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", - "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1087", @@ -72,11 +67,6 @@ "name": "openSUSE-SU-2020:1095", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", - "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1405", @@ -88,7 +78,19 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", + "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" } ] } diff --git a/2020/14xxx/CVE-2020-14060.json b/2020/14xxx/CVE-2020-14060.json index bb9442bda5d..bb0da9a2a1c 100644 --- a/2020/14xxx/CVE-2020-14060.json +++ b/2020/14xxx/CVE-2020-14060.json @@ -83,7 +83,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14061.json b/2020/14xxx/CVE-2020-14061.json index 301e53e6376..10e0992e24e 100644 --- a/2020/14xxx/CVE-2020-14061.json +++ b/2020/14xxx/CVE-2020-14061.json @@ -83,7 +83,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14062.json b/2020/14xxx/CVE-2020-14062.json index 274fc63ebb2..005a6d6290d 100644 --- a/2020/14xxx/CVE-2020-14062.json +++ b/2020/14xxx/CVE-2020-14062.json @@ -83,7 +83,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14195.json b/2020/14xxx/CVE-2020-14195.json index 240a9d96601..91d4f3b491a 100644 --- a/2020/14xxx/CVE-2020-14195.json +++ b/2020/14xxx/CVE-2020-14195.json @@ -78,7 +78,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/15xxx/CVE-2020-15358.json b/2020/15xxx/CVE-2020-15358.json index 6cba4b986ac..1a6f7f2864e 100644 --- a/2020/15xxx/CVE-2020-15358.json +++ b/2020/15xxx/CVE-2020-15358.json @@ -137,18 +137,20 @@ "name": "https://support.apple.com/kb/HT211931", "url": "https://support.apple.com/kb/HT211931" }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212147", - "url": "https://support.apple.com/kb/HT212147" - }, { "refsource": "FULLDISC", "name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave", "url": "http://seclists.org/fulldisclosure/2021/Feb/14" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212147", + "url": "https://support.apple.com/kb/HT212147" } ] } diff --git a/2020/15xxx/CVE-2020-15586.json b/2020/15xxx/CVE-2020-15586.json index de22d5553ea..74b998a8fe7 100644 --- a/2020/15xxx/CVE-2020-15586.json +++ b/2020/15xxx/CVE-2020-15586.json @@ -52,21 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g", - "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" - }, - { - "refsource": "CONFIRM", - "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", - "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" - }, - { - "refsource": "CONFIRM", - "name": "https://www.cloudfoundry.org/blog/cve-2020-15586/", - "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1087", @@ -87,11 +72,6 @@ "name": "FEDORA-2020-9cd1204ba0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", - "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1405", @@ -118,7 +98,29 @@ "url": "https://www.debian.org/security/2021/dsa-4848" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", + "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", + "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g", + "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" + }, + { + "refsource": "CONFIRM", + "name": "https://www.cloudfoundry.org/blog/cve-2020-15586/", + "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" } ] } diff --git a/2020/16xxx/CVE-2020-16166.json b/2020/16xxx/CVE-2020-16166.json index 259e11ad34e..89496fea351 100644 --- a/2020/16xxx/CVE-2020-16166.json +++ b/2020/16xxx/CVE-2020-16166.json @@ -72,11 +72,6 @@ "name": "FEDORA-2020-8d634e31c0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200814-0004/", - "url": "https://security.netapp.com/advisory/ntap-20200814-0004/" - }, { "refsource": "FEDORA", "name": "FEDORA-2020-2cd6393548", @@ -112,6 +107,16 @@ "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200814-0004/", + "url": "https://security.netapp.com/advisory/ntap-20200814-0004/" + }, { "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638", @@ -121,9 +126,6 @@ "refsource": "MISC", "name": "https://arxiv.org/pdf/2012.07432.pdf", "url": "https://arxiv.org/pdf/2012.07432.pdf" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/16xxx/CVE-2020-16845.json b/2020/16xxx/CVE-2020-16845.json index cf9440bec86..30d53e2c255 100644 --- a/2020/16xxx/CVE-2020-16845.json +++ b/2020/16xxx/CVE-2020-16845.json @@ -57,11 +57,6 @@ "refsource": "MISC", "name": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q" }, - { - "refsource": "CONFIRM", - "name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo", - "url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1178", @@ -102,11 +97,6 @@ "name": "openSUSE-SU-2020:1407", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200924-0002/", - "url": "https://security.netapp.com/advisory/ntap-20200924-0002/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", @@ -123,7 +113,19 @@ "url": "https://www.debian.org/security/2021/dsa-4848" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo", + "url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200924-0002/", + "url": "https://security.netapp.com/advisory/ntap-20200924-0002/" } ] } diff --git a/2020/17xxx/CVE-2020-17521.json b/2020/17xxx/CVE-2020-17521.json index 0e858c51496..89fb46e1138 100644 --- a/2020/17xxx/CVE-2020-17521.json +++ b/2020/17xxx/CVE-2020-17521.json @@ -84,7 +84,9 @@ "url": "https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json index b41d298cf8f..19e7e6b25bd 100644 --- a/2020/17xxx/CVE-2020-17527.json +++ b/2020/17xxx/CVE-2020-17527.json @@ -124,11 +124,6 @@ "name": "[tomee-commits] 20201207 [jira] [Assigned] (TOMEE-2936) TomEE plus(7.0.9) is affected by CVE-2020-17527(BDSA-2020-3628) vulnerability.", "url": "https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20201210-0003/", - "url": "https://security.netapp.com/advisory/ntap-20201210-0003/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20201216 [SECURITY] [DLA 2495-1] tomcat8 security update", @@ -175,7 +170,14 @@ "url": "https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20201210-0003/", + "url": "https://security.netapp.com/advisory/ntap-20201210-0003/" } ] }, diff --git a/2020/17xxx/CVE-2020-17530.json b/2020/17xxx/CVE-2020-17530.json index 0fa4e2d4de7..72814f5b22d 100644 --- a/2020/17xxx/CVE-2020-17530.json +++ b/2020/17xxx/CVE-2020-17530.json @@ -70,7 +70,9 @@ "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1472.json b/2020/1xxx/CVE-2020-1472.json index 430c784caaa..12d2e3104ee 100644 --- a/2020/1xxx/CVE-2020-1472.json +++ b/2020/1xxx/CVE-2020-1472.json @@ -177,11 +177,6 @@ "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472" }, - { - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html", - "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html" - }, { "refsource": "CERT-VN", "name": "VU#490028", @@ -197,11 +192,6 @@ "name": "USN-4510-1", "url": "https://usn.ubuntu.com/4510-1/" }, - { - "refsource": "CONFIRM", - "name": "https://www.synology.com/security/advisory/Synology_SA_20_21", - "url": "https://www.synology.com/security/advisory/Synology_SA_20_21" - }, { "refsource": "UBUNTU", "name": "USN-4510-2", @@ -237,11 +227,6 @@ "name": "USN-4559-1", "url": "https://usn.ubuntu.com/4559-1/" }, - { - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html", - "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", @@ -253,7 +238,24 @@ "url": "https://security.gentoo.org/glsa/202012-24" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html", + "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.synology.com/security/advisory/Synology_SA_20_21", + "url": "https://www.synology.com/security/advisory/Synology_SA_20_21" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html" } ] } diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json index d3782943bab..314fc6ce8bc 100644 --- a/2020/1xxx/CVE-2020-1927.json +++ b/2020/1xxx/CVE-2020-1927.json @@ -165,7 +165,9 @@ "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1941.json b/2020/1xxx/CVE-2020-1941.json index 5d81ca1cbb3..60b28be1c27 100644 --- a/2020/1xxx/CVE-2020-1941.json +++ b/2020/1xxx/CVE-2020-1941.json @@ -75,7 +75,9 @@ "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1945.json b/2020/1xxx/CVE-2020-1945.json index 1339e413395..7833794c883 100644 --- a/2020/1xxx/CVE-2020-1945.json +++ b/2020/1xxx/CVE-2020-1945.json @@ -280,7 +280,9 @@ "url": "https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1967.json b/2020/1xxx/CVE-2020-1967.json index 84987e4a352..c0a6c949c26 100644 --- a/2020/1xxx/CVE-2020-1967.json +++ b/2020/1xxx/CVE-2020-1967.json @@ -207,13 +207,15 @@ "name": "https://www.tenable.com/security/tns-2020-11", "url": "https://www.tenable.com/security/tns-2020-11" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/1xxx/CVE-2020-1968.json b/2020/1xxx/CVE-2020-1968.json index 4e093865ce7..8a96875e31d 100644 --- a/2020/1xxx/CVE-2020-1968.json +++ b/2020/1xxx/CVE-2020-1968.json @@ -93,7 +93,9 @@ "url": "https://security.netapp.com/advisory/ntap-20200911-0004/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/1xxx/CVE-2020-1971.json b/2020/1xxx/CVE-2020-1971.json index f4ad132ebcf..f43c950f690 100644 --- a/2020/1xxx/CVE-2020-1971.json +++ b/2020/1xxx/CVE-2020-1971.json @@ -150,6 +150,16 @@ "name": "[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-10", + "url": "https://www.tenable.com/security/tns-2021-10" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-09", @@ -159,14 +169,6 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0002/", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" - }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-10", - "url": "https://www.tenable.com/security/tns-2021-10" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24394.json b/2020/24xxx/CVE-2020-24394.json index 87569269ca6..c06f86addaa 100644 --- a/2020/24xxx/CVE-2020-24394.json +++ b/2020/24xxx/CVE-2020-24394.json @@ -77,11 +77,6 @@ "name": "openSUSE-SU-2020:1325", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20200904-0003/", - "url": "https://security.netapp.com/advisory/ntap-20200904-0003/" - }, { "refsource": "UBUNTU", "name": "USN-4483-1", @@ -93,7 +88,14 @@ "url": "https://usn.ubuntu.com/4485-1/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20200904-0003/", + "url": "https://security.netapp.com/advisory/ntap-20200904-0003/" } ] } diff --git a/2020/24xxx/CVE-2020-24553.json b/2020/24xxx/CVE-2020-24553.json index fca52fe9a55..9490fda9f7c 100644 --- a/2020/24xxx/CVE-2020-24553.json +++ b/2020/24xxx/CVE-2020-24553.json @@ -57,6 +57,26 @@ "name": "20200902 [RT-SA-2020-004] Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to Cross-Site Scripting", "url": "http://seclists.org/fulldisclosure/2020/Sep/5" }, + { + "refsource": "FEDORA", + "name": "FEDORA-2020-741cfa13d0", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1584", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2020:1587", + "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "MISC", "name": "https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs", @@ -76,24 +96,6 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200924-0003/", "url": "https://security.netapp.com/advisory/ntap-20200924-0003/" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-741cfa13d0", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/" - }, - { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:1584", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html" - }, - { - "refsource": "SUSE", - "name": "openSUSE-SU-2020:1587", - "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24616.json b/2020/24xxx/CVE-2020-24616.json index e35099b2dbf..699e9a79fb6 100644 --- a/2020/24xxx/CVE-2020-24616.json +++ b/2020/24xxx/CVE-2020-24616.json @@ -78,7 +78,9 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24750.json b/2020/24xxx/CVE-2020-24750.json index 9722cb5c8c9..740d8299f5c 100644 --- a/2020/24xxx/CVE-2020-24750.json +++ b/2020/24xxx/CVE-2020-24750.json @@ -78,7 +78,9 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json index 2e0a3fbac0b..41c57ec270e 100644 --- a/2020/25xxx/CVE-2020-25649.json +++ b/2020/25xxx/CVE-2020-25649.json @@ -124,11 +124,6 @@ "name": "[kafka-jira] 20201215 [GitHub] [kafka] ijuma edited a comment on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1", "url": "https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E" }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E", - "url": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E" - }, { "refsource": "MLIST", "name": "[zookeeper-issues] 20210105 [jira] [Created] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1", @@ -199,11 +194,6 @@ "name": "[zookeeper-commits] 20210106 [zookeeper] branch master updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1", "url": "https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210108-0007/", - "url": "https://security.netapp.com/advisory/ntap-20210108-0007/" - }, { "refsource": "MLIST", "name": "[zookeeper-issues] 20210116 [jira] [Commented] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1", @@ -335,7 +325,19 @@ "url": "https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210108-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210108-0007/" } ] }, diff --git a/2020/26xxx/CVE-2020-26217.json b/2020/26xxx/CVE-2020-26217.json index 44eb92ba9f8..04b077bbdfe 100644 --- a/2020/26xxx/CVE-2020-26217.json +++ b/2020/26xxx/CVE-2020-26217.json @@ -109,13 +109,15 @@ "name": "[activemq-issues] 20210104 [jira] [Resolved] (AMQ-8107) Does ActiveMQ use the affected functionality within Xstream libraries for CVE-2020-26217", "url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210409-0004/", "url": "https://security.netapp.com/advisory/ntap-20210409-0004/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26418.json b/2020/26xxx/CVE-2020-26418.json index 3df20dd6e29..64303d3b309 100644 --- a/2020/26xxx/CVE-2020-26418.json +++ b/2020/26xxx/CVE-2020-26418.json @@ -83,7 +83,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26419.json b/2020/26xxx/CVE-2020-26419.json index db0fe0c9d26..174b227f385 100644 --- a/2020/26xxx/CVE-2020-26419.json +++ b/2020/26xxx/CVE-2020-26419.json @@ -75,7 +75,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26420.json b/2020/26xxx/CVE-2020-26420.json index 9fb60a795c0..8a246e77153 100644 --- a/2020/26xxx/CVE-2020-26420.json +++ b/2020/26xxx/CVE-2020-26420.json @@ -78,7 +78,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26421.json b/2020/26xxx/CVE-2020-26421.json index bdf37c1ce00..17def26ccc4 100644 --- a/2020/26xxx/CVE-2020-26421.json +++ b/2020/26xxx/CVE-2020-26421.json @@ -83,7 +83,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26422.json b/2020/26xxx/CVE-2020-26422.json index cc99c75979e..5c67abe3f7b 100644 --- a/2020/26xxx/CVE-2020-26422.json +++ b/2020/26xxx/CVE-2020-26422.json @@ -65,7 +65,9 @@ "url": "https://security.gentoo.org/glsa/202101-12" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27193.json b/2020/27xxx/CVE-2020-27193.json index d8ae2701984..59a02c54324 100644 --- a/2020/27xxx/CVE-2020-27193.json +++ b/2020/27xxx/CVE-2020-27193.json @@ -57,6 +57,11 @@ "refsource": "MISC", "name": "https://ckeditor.com/ckeditor-4/download/" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://ckeditor.com/cke4/release/CKEditor-4.15.1", @@ -66,9 +71,6 @@ "refsource": "CONFIRM", "name": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/", "url": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 48e6c5f3f92..560e275838f 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -742,7 +742,9 @@ "url": "https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index c7d754d3f62..a0b91bdcbf0 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -168,11 +168,6 @@ "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20201218-0003/", - "url": "https://security.netapp.com/advisory/ntap-20201218-0003/" - }, { "refsource": "MLIST", "name": "[zookeeper-notifications] 20201224 [GitHub] [zookeeper] ztzg closed pull request #1552: ZOOKEEPER-4023: dependency-check:check failing - Jetty 9.4.34.v20201102 - CVE-2020-27218", @@ -548,11 +543,6 @@ "name": "[kafka-jira] 20210222 [GitHub] [kafka] ijuma commented on pull request #10177: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218", "url": "https://lists.apache.org/thread.html/r391d20ab6ec03d6becc7a9f0c5e0f45a7ad8af6b996ae0a49839f6bd@%3Cjira.kafka.apache.org%3E" }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E" - }, { "refsource": "MLIST", "name": "[kafka-jira] 20210222 [GitHub] [kafka] omkreddy closed pull request #10177: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218", @@ -583,21 +573,6 @@ "name": "[kafka-commits] 20210222 [kafka] branch 2.6 updated: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218", "url": "https://lists.apache.org/thread.html/r66456df852de06a0eed2c0a50252a2c8d360b8a5c005f63c0b1e3d25@%3Ccommits.kafka.apache.org%3E" }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E" - }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E" - }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E" - }, { "refsource": "MLIST", "name": "[nifi-commits] 20210222 svn commit: r1886814 - /nifi/site/trunk/security.html", @@ -619,7 +594,34 @@ "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20201218-0003/", + "url": "https://security.netapp.com/advisory/ntap-20201218-0003/" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 4a702b2a7db..b8a9b004a82 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -48,7 +48,6 @@ { "lang": "eng", "value": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of \u201cquality\u201d (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values." - } ] }, @@ -368,11 +367,6 @@ "name": "[spark-reviews] 20210316 [GitHub] [spark] xkrogen commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223", "url": "https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210401-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210401-0005/" - }, { "refsource": "MLIST", "name": "[solr-issues] 20210407 [jira] [Created] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)", @@ -384,7 +378,14 @@ "url": "https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210401-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210401-0005/" } ] } diff --git a/2020/27xxx/CVE-2020-27841.json b/2020/27xxx/CVE-2020-27841.json index b047fbc360b..568b18bb40e 100644 --- a/2020/27xxx/CVE-2020-27841.json +++ b/2020/27xxx/CVE-2020-27841.json @@ -70,7 +70,9 @@ "url": "https://www.debian.org/security/2021/dsa-4882" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27842.json b/2020/27xxx/CVE-2020-27842.json index cdbfd24c06a..73e83353368 100644 --- a/2020/27xxx/CVE-2020-27842.json +++ b/2020/27xxx/CVE-2020-27842.json @@ -65,7 +65,9 @@ "url": "https://www.debian.org/security/2021/dsa-4882" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27843.json b/2020/27xxx/CVE-2020-27843.json index e86a2095748..55ca1993570 100644 --- a/2020/27xxx/CVE-2020-27843.json +++ b/2020/27xxx/CVE-2020-27843.json @@ -65,7 +65,9 @@ "url": "https://www.debian.org/security/2021/dsa-4882" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27844.json b/2020/27xxx/CVE-2020-27844.json index 95d9bddb9f8..dcf367eced5 100644 --- a/2020/27xxx/CVE-2020-27844.json +++ b/2020/27xxx/CVE-2020-27844.json @@ -60,7 +60,9 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27845.json b/2020/27xxx/CVE-2020-27845.json index 68006934b6c..40e9f693559 100644 --- a/2020/27xxx/CVE-2020-27845.json +++ b/2020/27xxx/CVE-2020-27845.json @@ -70,7 +70,9 @@ "url": "https://www.debian.org/security/2021/dsa-4882" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/28xxx/CVE-2020-28052.json b/2020/28xxx/CVE-2020-28052.json index ebc9209d128..15de9ef7568 100644 --- a/2020/28xxx/CVE-2020-28052.json +++ b/2020/28xxx/CVE-2020-28052.json @@ -57,16 +57,6 @@ "refsource": "MISC", "name": "https://www.bouncycastle.org/releasenotes.html" }, - { - "refsource": "MISC", - "name": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052", - "url": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052" - }, - { - "refsource": "MISC", - "name": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/", - "url": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/" - }, { "refsource": "MLIST", "name": "[druid-commits] 20210107 [GitHub] [druid] jon-wei opened a new pull request #10733: Update deps for CVE-2020-28168 and CVE-2020-28052", @@ -103,7 +93,19 @@ "url": "https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052", + "url": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052" + }, + { + "refsource": "MISC", + "name": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/", + "url": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/" } ] } diff --git a/2020/28xxx/CVE-2020-28196.json b/2020/28xxx/CVE-2020-28196.json index 133353c7fdc..2c184fa8fab 100644 --- a/2020/28xxx/CVE-2020-28196.json +++ b/2020/28xxx/CVE-2020-28196.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "CONFIRM", - "name": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd", - "url": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20201107 [SECURITY] [DLA 2437-1] krb5 security update", @@ -88,9 +83,9 @@ "url": "https://www.debian.org/security/2020/dsa-4795" }, { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20201202-0001/", - "url": "https://security.netapp.com/advisory/ntap-20201202-0001/" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "refsource": "CONFIRM", @@ -98,7 +93,14 @@ "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "refsource": "CONFIRM", + "name": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd", + "url": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20201202-0001/", + "url": "https://security.netapp.com/advisory/ntap-20201202-0001/" } ] } diff --git a/2020/35xxx/CVE-2020-35490.json b/2020/35xxx/CVE-2020-35490.json index 849ef61e8a2..c77607f794e 100644 --- a/2020/35xxx/CVE-2020-35490.json +++ b/2020/35xxx/CVE-2020-35490.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2986" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210122-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210122-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210122-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210122-0005/" } ] } diff --git a/2020/35xxx/CVE-2020-35491.json b/2020/35xxx/CVE-2020-35491.json index 8d356cb34ed..8d4b659b76d 100644 --- a/2020/35xxx/CVE-2020-35491.json +++ b/2020/35xxx/CVE-2020-35491.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2986" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210122-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210122-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210122-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210122-0005/" } ] } diff --git a/2020/35xxx/CVE-2020-35728.json b/2020/35xxx/CVE-2020-35728.json index 631a1259372..d663cbf9552 100644 --- a/2020/35xxx/CVE-2020-35728.json +++ b/2020/35xxx/CVE-2020-35728.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2999" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210129-0007/", - "url": "https://security.netapp.com/advisory/ntap-20210129-0007/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210129-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210129-0007/" } ] } diff --git a/2020/36xxx/CVE-2020-36179.json b/2020/36xxx/CVE-2020-36179.json index 3c11b088231..7ea90e6378c 100644 --- a/2020/36xxx/CVE-2020-36179.json +++ b/2020/36xxx/CVE-2020-36179.json @@ -67,18 +67,20 @@ "name": "[spark-issues] 20210115 [jira] [Created] (SPARK-34124) Upgrade jackson version to fix CVE-2020-36179 in Spark 2.4", "url": "https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36180.json b/2020/36xxx/CVE-2020-36180.json index 10e3baac219..70de7452ef7 100644 --- a/2020/36xxx/CVE-2020-36180.json +++ b/2020/36xxx/CVE-2020-36180.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/3004" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36181.json b/2020/36xxx/CVE-2020-36181.json index 7f671ce65ab..efc4bc4366c 100644 --- a/2020/36xxx/CVE-2020-36181.json +++ b/2020/36xxx/CVE-2020-36181.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/3004" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36182.json b/2020/36xxx/CVE-2020-36182.json index 49c2edccbb6..f16ddd83c52 100644 --- a/2020/36xxx/CVE-2020-36182.json +++ b/2020/36xxx/CVE-2020-36182.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/3004" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36183.json b/2020/36xxx/CVE-2020-36183.json index 7d1b0671a01..cb415b5ddc8 100644 --- a/2020/36xxx/CVE-2020-36183.json +++ b/2020/36xxx/CVE-2020-36183.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/3003" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36184.json b/2020/36xxx/CVE-2020-36184.json index d0c5df81bf4..2e0cb0dd192 100644 --- a/2020/36xxx/CVE-2020-36184.json +++ b/2020/36xxx/CVE-2020-36184.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2998" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36185.json b/2020/36xxx/CVE-2020-36185.json index b727aa01f41..f379b07978e 100644 --- a/2020/36xxx/CVE-2020-36185.json +++ b/2020/36xxx/CVE-2020-36185.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2998" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36186.json b/2020/36xxx/CVE-2020-36186.json index aca060fe2c9..2afd7d295e1 100644 --- a/2020/36xxx/CVE-2020-36186.json +++ b/2020/36xxx/CVE-2020-36186.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2997" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36187.json b/2020/36xxx/CVE-2020-36187.json index 765c97a6cb0..64719f4cd27 100644 --- a/2020/36xxx/CVE-2020-36187.json +++ b/2020/36xxx/CVE-2020-36187.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2997" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36188.json b/2020/36xxx/CVE-2020-36188.json index d6d7981ec51..ce554817eb6 100644 --- a/2020/36xxx/CVE-2020-36188.json +++ b/2020/36xxx/CVE-2020-36188.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2996" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/36xxx/CVE-2020-36189.json b/2020/36xxx/CVE-2020-36189.json index 6ce46c76d45..e69064a6e84 100644 --- a/2020/36xxx/CVE-2020-36189.json +++ b/2020/36xxx/CVE-2020-36189.json @@ -62,18 +62,20 @@ "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2996" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210205-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210205-0005/" } ] } diff --git a/2020/5xxx/CVE-2020-5359.json b/2020/5xxx/CVE-2020-5359.json index 7eeae56a311..c566e0c04cf 100644 --- a/2020/5xxx/CVE-2020-5359.json +++ b/2020/5xxx/CVE-2020-5359.json @@ -68,7 +68,9 @@ "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/5xxx/CVE-2020-5360.json b/2020/5xxx/CVE-2020-5360.json index b64e1bd5409..d45b6cc4233 100644 --- a/2020/5xxx/CVE-2020-5360.json +++ b/2020/5xxx/CVE-2020-5360.json @@ -68,7 +68,9 @@ "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index ecd1d92491d..4ebbb81b087 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -244,6 +244,16 @@ "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, + { + "refsource": "MLIST", + "name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398", + "url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "MISC", "name": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E", @@ -258,14 +268,6 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E", "url": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E" - }, - { - "refsource": "MLIST", - "name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398", - "url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5407.json b/2020/5xxx/CVE-2020-5407.json index d3d90564070..99a91092f93 100644 --- a/2020/5xxx/CVE-2020-5407.json +++ b/2020/5xxx/CVE-2020-5407.json @@ -95,7 +95,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5408.json b/2020/5xxx/CVE-2020-5408.json index b444209518e..fc8c0bb2a3a 100644 --- a/2020/5xxx/CVE-2020-5408.json +++ b/2020/5xxx/CVE-2020-5408.json @@ -95,7 +95,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5413.json b/2020/5xxx/CVE-2020-5413.json index ad9590b9b3f..f7a408f80f8 100644 --- a/2020/5xxx/CVE-2020-5413.json +++ b/2020/5xxx/CVE-2020-5413.json @@ -80,7 +80,9 @@ "name": "https://tanzu.vmware.com/security/cve-2020-5413" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5421.json b/2020/5xxx/CVE-2020-5421.json index 33a741adab0..bbcebf55ecb 100644 --- a/2020/5xxx/CVE-2020-5421.json +++ b/2020/5xxx/CVE-2020-5421.json @@ -164,13 +164,15 @@ "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0009/", "url": "https://security.netapp.com/advisory/ntap-20210513-0009/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7059.json b/2020/7xxx/CVE-2020-7059.json index e10b9436856..7809cc0921e 100644 --- a/2020/7xxx/CVE-2020-7059.json +++ b/2020/7xxx/CVE-2020-7059.json @@ -152,7 +152,9 @@ "url": "https://seclists.org/bugtraq/2021/Jan/3" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7060.json b/2020/7xxx/CVE-2020-7060.json index a3505bd1b12..59ad09e25d4 100644 --- a/2020/7xxx/CVE-2020-7060.json +++ b/2020/7xxx/CVE-2020-7060.json @@ -152,7 +152,9 @@ "url": "https://seclists.org/bugtraq/2021/Jan/3" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7067.json b/2020/7xxx/CVE-2020-7067.json index c32c263a733..3c5f7747b62 100644 --- a/2020/7xxx/CVE-2020-7067.json +++ b/2020/7xxx/CVE-2020-7067.json @@ -116,7 +116,9 @@ "url": "https://security.netapp.com/advisory/ntap-20200504-0001/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7069.json b/2020/7xxx/CVE-2020-7069.json index e69b1f1816c..39a7379e240 100644 --- a/2020/7xxx/CVE-2020-7069.json +++ b/2020/7xxx/CVE-2020-7069.json @@ -111,11 +111,6 @@ "name": "FEDORA-2020-94763cb98b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20201016-0001/", - "url": "https://security.netapp.com/advisory/ntap-20201016-0001/" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2020:1703", @@ -142,7 +137,14 @@ "url": "https://www.debian.org/security/2021/dsa-4856" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20201016-0001/", + "url": "https://security.netapp.com/advisory/ntap-20201016-0001/" } ] }, diff --git a/2020/7xxx/CVE-2020-7760.json b/2020/7xxx/CVE-2020-7760.json index 3307d13e938..f75f9dd2650 100644 --- a/2020/7xxx/CVE-2020-7760.json +++ b/2020/7xxx/CVE-2020-7760.json @@ -111,7 +111,9 @@ "url": "https://www.debian.org/security/2020/dsa-4789" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7774.json b/2020/7xxx/CVE-2020-7774.json index 21f680462b3..9a9a2730cce 100644 --- a/2020/7xxx/CVE-2020-7774.json +++ b/2020/7xxx/CVE-2020-7774.json @@ -68,7 +68,9 @@ "name": "https://github.com/yargs/y18n/issues/96" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7919.json b/2020/7xxx/CVE-2020-7919.json index a21f6d78444..1a170c707ca 100644 --- a/2020/7xxx/CVE-2020-7919.json +++ b/2020/7xxx/CVE-2020-7919.json @@ -52,11 +52,26 @@ }, "references": { "reference_data": [ + { + "refsource": "FEDORA", + "name": "FEDORA-2020-12bc5b5597", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/" + }, { "url": "https://groups.google.com/forum/#!forum/golang-announce", "refsource": "MISC", "name": "https://groups.google.com/forum/#!forum/golang-announce" }, + { + "refsource": "DEBIAN", + "name": "DSA-4848", + "url": "https://www.debian.org/security/2021/dsa-4848" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "MISC", "name": "https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA", @@ -71,19 +86,6 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200327-0001/", "url": "https://security.netapp.com/advisory/ntap-20200327-0001/" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-12bc5b5597", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/" - }, - { - "refsource": "DEBIAN", - "name": "DSA-4848", - "url": "https://www.debian.org/security/2021/dsa-4848" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/8xxx/CVE-2020-8203.json b/2020/8xxx/CVE-2020-8203.json index 595b5973546..5ded180d8c4 100644 --- a/2020/8xxx/CVE-2020-8203.json +++ b/2020/8xxx/CVE-2020-8203.json @@ -49,6 +49,11 @@ "name": "https://hackerone.com/reports/712065", "url": "https://hackerone.com/reports/712065" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200724-0006/", @@ -58,9 +63,6 @@ "refsource": "MISC", "name": "https://github.com/lodash/lodash/issues/4874", "url": "https://github.com/lodash/lodash/issues/4874" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8277.json b/2020/8xxx/CVE-2020-8277.json index 9a4c4720c21..d1728cf8b7b 100644 --- a/2020/8xxx/CVE-2020-8277.json +++ b/2020/8xxx/CVE-2020-8277.json @@ -90,7 +90,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8284.json b/2020/8xxx/CVE-2020-8284.json index d1879c8ef91..bfb5b06191e 100644 --- a/2020/8xxx/CVE-2020-8284.json +++ b/2020/8xxx/CVE-2020-8284.json @@ -74,16 +74,21 @@ "name": "GLSA-202012-14", "url": "https://security.gentoo.org/glsa/202012-14" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", - "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" - }, { "refsource": "DEBIAN", "name": "DSA-4881", "url": "https://www.debian.org/security/2021/dsa-4881" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212325", @@ -98,9 +103,6 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212327", "url": "https://support.apple.com/kb/HT212327" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8285.json b/2020/8xxx/CVE-2020-8285.json index e179f82ca03..cb7a08418d3 100644 --- a/2020/8xxx/CVE-2020-8285.json +++ b/2020/8xxx/CVE-2020-8285.json @@ -79,16 +79,26 @@ "name": "GLSA-202012-14", "url": "https://security.gentoo.org/glsa/202012-14" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", - "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" - }, { "refsource": "DEBIAN", "name": "DSA-4881", "url": "https://www.debian.org/security/2021/dsa-4881" }, + { + "refsource": "FULLDISC", + "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", + "url": "http://seclists.org/fulldisclosure/2021/Apr/51" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" + }, { "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212325", @@ -103,14 +113,6 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212327", "url": "https://support.apple.com/kb/HT212327" - }, - { - "refsource": "FULLDISC", - "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", - "url": "http://seclists.org/fulldisclosure/2021/Apr/51" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8286.json b/2020/8xxx/CVE-2020-8286.json index ef3519719eb..2358ddbbd84 100644 --- a/2020/8xxx/CVE-2020-8286.json +++ b/2020/8xxx/CVE-2020-8286.json @@ -74,31 +74,11 @@ "name": "GLSA-202012-14", "url": "https://security.gentoo.org/glsa/202012-14" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", - "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" - }, { "refsource": "DEBIAN", "name": "DSA-4881", "url": "https://www.debian.org/security/2021/dsa-4881" }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212325", - "url": "https://support.apple.com/kb/HT212325" - }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212326", - "url": "https://support.apple.com/kb/HT212326" - }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212327", - "url": "https://support.apple.com/kb/HT212327" - }, { "refsource": "FULLDISC", "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", @@ -114,13 +94,35 @@ "name": "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave", "url": "http://seclists.org/fulldisclosure/2021/Apr/54" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210122-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210122-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212325", + "url": "https://support.apple.com/kb/HT212325" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212326", + "url": "https://support.apple.com/kb/HT212326" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212327", + "url": "https://support.apple.com/kb/HT212327" + }, { "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8908.json b/2020/8xxx/CVE-2020-8908.json index c8bf12240b3..2125665057f 100644 --- a/2020/8xxx/CVE-2020-8908.json +++ b/2020/8xxx/CVE-2020-8908.json @@ -148,7 +148,9 @@ "url": "https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9281.json b/2020/9xxx/CVE-2020-9281.json index 08a9e678c53..0a703cf3f5e 100644 --- a/2020/9xxx/CVE-2020-9281.json +++ b/2020/9xxx/CVE-2020-9281.json @@ -83,7 +83,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/9xxx/CVE-2020-9327.json b/2020/9xxx/CVE-2020-9327.json index b62ac95a8da..24c740fe7d5 100644 --- a/2020/9xxx/CVE-2020-9327.json +++ b/2020/9xxx/CVE-2020-9327.json @@ -98,7 +98,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/9xxx/CVE-2020-9480.json b/2020/9xxx/CVE-2020-9480.json index 7822da2dc89..9aacb55d47a 100644 --- a/2020/9xxx/CVE-2020-9480.json +++ b/2020/9xxx/CVE-2020-9480.json @@ -70,7 +70,9 @@ "url": "https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index b079c0a9959..119c4673c60 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -210,7 +210,9 @@ "url": "https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9488.json b/2020/9xxx/CVE-2020-9488.json index 67f9ba18e1e..bfcc0ea8a1a 100644 --- a/2020/9xxx/CVE-2020-9488.json +++ b/2020/9xxx/CVE-2020-9488.json @@ -260,7 +260,9 @@ "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9489.json b/2020/9xxx/CVE-2020-9489.json index 0b787ad4b32..c2825bb80f6 100644 --- a/2020/9xxx/CVE-2020-9489.json +++ b/2020/9xxx/CVE-2020-9489.json @@ -60,7 +60,9 @@ "url": "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20227.json b/2021/20xxx/CVE-2021-20227.json index cd686b7504f..97d4164f6da 100644 --- a/2021/20xxx/CVE-2021-20227.json +++ b/2021/20xxx/CVE-2021-20227.json @@ -59,13 +59,15 @@ "name": "GLSA-202103-04", "url": "https://security.gentoo.org/glsa/202103-04" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210423-0010/", "url": "https://security.netapp.com/advisory/ntap-20210423-0010/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index dd6619797bb..ce2d5c90922 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -147,11 +147,6 @@ "name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290", "url": "https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E" }, - { - "refsource": "MISC", - "name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E", - "url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E" - }, { "refsource": "MLIST", "name": "[zookeeper-issues] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability", @@ -238,7 +233,14 @@ "url": "https://www.debian.org/security/2021/dsa-4885" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E" } ] }, diff --git a/2021/21xxx/CVE-2021-21345.json b/2021/21xxx/CVE-2021-21345.json index 558d11923c8..0eef6a5f480 100644 --- a/2021/21xxx/CVE-2021-21345.json +++ b/2021/21xxx/CVE-2021-21345.json @@ -112,13 +112,15 @@ "name": "[activemq-users] 20210427 Release date for ActiveMQ v5.16.2 to fix CVEs", "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210430-0002/", "url": "https://security.netapp.com/advisory/ntap-20210430-0002/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22112.json b/2021/22xxx/CVE-2021-22112.json index 1ae71ed8d71..c486d35d815 100644 --- a/2021/22xxx/CVE-2021-22112.json +++ b/2021/22xxx/CVE-2021-22112.json @@ -49,18 +49,20 @@ "name": "[oss-security] 20210219 Vulnerability in Jenkins", "url": "http://www.openwall.com/lists/oss-security/2021/02/19/7" }, - { - "refsource": "MISC", - "name": "https://tanzu.vmware.com/security/cve-2021-22112", - "url": "https://tanzu.vmware.com/security/cve-2021-22112" - }, { "refsource": "MLIST", "name": "[nifi-issues] 20210510 [GitHub] [nifi] exceptionfactory opened a new pull request #5066: NIFI-8502 Upgrade Spring Framework to 5.3.6", "url": "https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MISC", + "name": "https://tanzu.vmware.com/security/cve-2021-22112", + "url": "https://tanzu.vmware.com/security/cve-2021-22112" } ] }, diff --git a/2021/22xxx/CVE-2021-22173.json b/2021/22xxx/CVE-2021-22173.json index 5b38139a49d..acd1f4e6164 100644 --- a/2021/22xxx/CVE-2021-22173.json +++ b/2021/22xxx/CVE-2021-22173.json @@ -70,7 +70,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] },