From 4501814684c9025d83642ae81128230b51a92e37 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 25 Jul 2022 19:01:27 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/22xxx/CVE-2021-22931.json | 4 +++- 2021/22xxx/CVE-2021-22939.json | 4 +++- 2021/22xxx/CVE-2021-22940.json | 4 +++- 2021/22xxx/CVE-2021-22946.json | 4 +++- 2021/22xxx/CVE-2021-22947.json | 4 +++- 2021/23xxx/CVE-2021-23337.json | 4 +++- 2021/23xxx/CVE-2021-23450.json | 4 +++- 2021/23xxx/CVE-2021-23926.json | 4 +++- 2021/26xxx/CVE-2021-26291.json | 4 +++- 2021/29xxx/CVE-2021-29154.json | 44 ++++++++++++++++++---------------- 2021/29xxx/CVE-2021-29425.json | 4 +++- 2021/29xxx/CVE-2021-29505.json | 4 +++- 2021/29xxx/CVE-2021-29921.json | 4 +++- 2021/30xxx/CVE-2021-30129.json | 4 +++- 2021/31xxx/CVE-2021-31684.json | 4 +++- 2021/31xxx/CVE-2021-31805.json | 8 ++++--- 2021/31xxx/CVE-2021-31811.json | 4 +++- 2021/31xxx/CVE-2021-31812.json | 4 +++- 2021/33xxx/CVE-2021-33560.json | 4 +++- 2021/33xxx/CVE-2021-33813.json | 4 +++- 2021/34xxx/CVE-2021-34141.json | 4 +++- 2021/34xxx/CVE-2021-34429.json | 4 +++- 2021/35xxx/CVE-2021-35043.json | 4 +++- 2021/35xxx/CVE-2021-35515.json | 4 +++- 2021/35xxx/CVE-2021-35516.json | 4 +++- 2021/35xxx/CVE-2021-35517.json | 4 +++- 2021/35xxx/CVE-2021-35940.json | 4 +++- 2021/36xxx/CVE-2021-36090.json | 4 +++- 2021/36xxx/CVE-2021-36373.json | 4 +++- 2021/36xxx/CVE-2021-36374.json | 4 +++- 2021/37xxx/CVE-2021-37136.json | 4 +++- 2021/37xxx/CVE-2021-37137.json | 4 +++- 2021/37xxx/CVE-2021-37159.json | 14 ++++++----- 2021/37xxx/CVE-2021-37714.json | 4 +++- 2021/37xxx/CVE-2021-37750.json | 24 ++++++++++--------- 2021/38xxx/CVE-2021-38153.json | 4 +++- 2021/38xxx/CVE-2021-38296.json | 4 +++- 2021/38xxx/CVE-2021-38604.json | 18 +++++++------- 2021/39xxx/CVE-2021-39139.json | 4 +++- 2021/39xxx/CVE-2021-39140.json | 4 +++- 2021/39xxx/CVE-2021-39141.json | 4 +++- 2021/39xxx/CVE-2021-39144.json | 4 +++- 2021/39xxx/CVE-2021-39145.json | 4 +++- 2021/39xxx/CVE-2021-39146.json | 4 +++- 2021/39xxx/CVE-2021-39147.json | 4 +++- 2021/39xxx/CVE-2021-39148.json | 4 +++- 2021/39xxx/CVE-2021-39149.json | 4 +++- 2021/39xxx/CVE-2021-39150.json | 4 +++- 2021/39xxx/CVE-2021-39151.json | 4 +++- 2021/39xxx/CVE-2021-39152.json | 4 +++- 2021/39xxx/CVE-2021-39153.json | 4 +++- 2021/39xxx/CVE-2021-39154.json | 4 +++- 2021/3xxx/CVE-2021-3177.json | 4 +++- 2021/3xxx/CVE-2021-3449.json | 4 +++- 2021/3xxx/CVE-2021-3450.json | 4 +++- 2021/3xxx/CVE-2021-3517.json | 4 +++- 2021/3xxx/CVE-2021-3518.json | 4 +++- 2021/3xxx/CVE-2021-3537.json | 4 +++- 2021/3xxx/CVE-2021-3572.json | 4 +++- 2021/3xxx/CVE-2021-3612.json | 14 ++++++----- 2021/3xxx/CVE-2021-3672.json | 4 +++- 2021/3xxx/CVE-2021-3737.json | 8 ++++--- 2021/3xxx/CVE-2021-3743.json | 8 ++++--- 2021/3xxx/CVE-2021-3744.json | 4 +++- 2021/3xxx/CVE-2021-3749.json | 4 +++- 2021/3xxx/CVE-2021-3752.json | 8 ++++--- 2021/3xxx/CVE-2021-3772.json | 4 +++- 2021/3xxx/CVE-2021-3773.json | 4 +++- 2021/40xxx/CVE-2021-40690.json | 4 +++- 2021/41xxx/CVE-2021-41164.json | 4 +++- 2021/41xxx/CVE-2021-41165.json | 4 +++- 2021/41xxx/CVE-2021-41182.json | 8 ++++--- 2021/41xxx/CVE-2021-41183.json | 8 ++++--- 2021/41xxx/CVE-2021-41184.json | 8 ++++--- 2021/41xxx/CVE-2021-41303.json | 8 ++++--- 2021/41xxx/CVE-2021-41617.json | 4 +++- 2021/41xxx/CVE-2021-41771.json | 24 ++++++++++--------- 2021/41xxx/CVE-2021-41772.json | 24 ++++++++++--------- 2021/42xxx/CVE-2021-42340.json | 4 +++- 2021/42xxx/CVE-2021-42575.json | 4 +++- 2021/42xxx/CVE-2021-42739.json | 4 +++- 2021/43xxx/CVE-2021-43389.json | 14 ++++++----- 2021/43xxx/CVE-2021-43797.json | 4 +++- 2021/43xxx/CVE-2021-43818.json | 4 +++- 2021/43xxx/CVE-2021-43859.json | 4 +++- 85 files changed, 343 insertions(+), 173 deletions(-) diff --git a/2021/22xxx/CVE-2021-22931.json b/2021/22xxx/CVE-2021-22931.json index 6b350581c70..5d9d90743e6 100644 --- a/2021/22xxx/CVE-2021-22931.json +++ b/2021/22xxx/CVE-2021-22931.json @@ -80,7 +80,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22939.json b/2021/22xxx/CVE-2021-22939.json index 5e71a1d67e7..3238cfce5df 100644 --- a/2021/22xxx/CVE-2021-22939.json +++ b/2021/22xxx/CVE-2021-22939.json @@ -75,7 +75,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22940.json b/2021/22xxx/CVE-2021-22940.json index a3761594a84..e198e07c090 100644 --- a/2021/22xxx/CVE-2021-22940.json +++ b/2021/22xxx/CVE-2021-22940.json @@ -75,7 +75,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22946.json b/2021/22xxx/CVE-2021-22946.json index e68a1124a1b..6765b7c7cd2 100644 --- a/2021/22xxx/CVE-2021-22946.json +++ b/2021/22xxx/CVE-2021-22946.json @@ -105,7 +105,9 @@ "url": "https://support.apple.com/kb/HT213183" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22947.json b/2021/22xxx/CVE-2021-22947.json index 9efd52dc223..cf4ca7666e0 100644 --- a/2021/22xxx/CVE-2021-22947.json +++ b/2021/22xxx/CVE-2021-22947.json @@ -100,7 +100,9 @@ "url": "https://support.apple.com/kb/HT213183" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23337.json b/2021/23xxx/CVE-2021-23337.json index 40c5faaa03d..11722e5b1ea 100644 --- a/2021/23xxx/CVE-2021-23337.json +++ b/2021/23xxx/CVE-2021-23337.json @@ -102,7 +102,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23450.json b/2021/23xxx/CVE-2021-23450.json index 1382725701a..e956ad77031 100644 --- a/2021/23xxx/CVE-2021-23450.json +++ b/2021/23xxx/CVE-2021-23450.json @@ -83,7 +83,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23926.json b/2021/23xxx/CVE-2021-23926.json index 43bb97c98b2..8b415c05bd7 100644 --- a/2021/23xxx/CVE-2021-23926.json +++ b/2021/23xxx/CVE-2021-23926.json @@ -95,7 +95,9 @@ "url": "https://security.netapp.com/advisory/ntap-20210513-0004/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26291.json b/2021/26xxx/CVE-2021-26291.json index 7bea0ec6b69..b74cc23d4e1 100644 --- a/2021/26xxx/CVE-2021-26291.json +++ b/2021/26xxx/CVE-2021-26291.json @@ -280,7 +280,9 @@ "url": "https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/29xxx/CVE-2021-29154.json b/2021/29xxx/CVE-2021-29154.json index 908882664e0..e70bc433af5 100644 --- a/2021/29xxx/CVE-2021-29154.json +++ b/2021/29xxx/CVE-2021-29154.json @@ -52,31 +52,11 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "https://www.openwall.com/lists/oss-security/2021/04/08/1", - "url": "https://www.openwall.com/lists/oss-security/2021/04/08/1" - }, - { - "refsource": "MISC", - "name": "https://news.ycombinator.com/item?id=26757760", - "url": "https://news.ycombinator.com/item?id=26757760" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-e71c033f88", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/" }, - { - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", - "url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210604-0006/", - "url": "https://security.netapp.com/advisory/ntap-20210604-0006/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", @@ -88,7 +68,29 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/04/08/1", + "url": "https://www.openwall.com/lists/oss-security/2021/04/08/1" + }, + { + "refsource": "MISC", + "name": "https://news.ycombinator.com/item?id=26757760", + "url": "https://news.ycombinator.com/item?id=26757760" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", + "url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0006/" } ] } diff --git a/2021/29xxx/CVE-2021-29425.json b/2021/29xxx/CVE-2021-29425.json index fbbf94ec5a6..3c5aa41bbeb 100644 --- a/2021/29xxx/CVE-2021-29425.json +++ b/2021/29xxx/CVE-2021-29425.json @@ -309,7 +309,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220210-0004/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/29xxx/CVE-2021-29505.json b/2021/29xxx/CVE-2021-29505.json index 726990bfc06..eb45f5e590d 100644 --- a/2021/29xxx/CVE-2021-29505.json +++ b/2021/29xxx/CVE-2021-29505.json @@ -138,7 +138,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/29xxx/CVE-2021-29921.json b/2021/29xxx/CVE-2021-29921.json index a4da607a0d5..3ad571da308 100644 --- a/2021/29xxx/CVE-2021-29921.json +++ b/2021/29xxx/CVE-2021-29921.json @@ -123,7 +123,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/30xxx/CVE-2021-30129.json b/2021/30xxx/CVE-2021-30129.json index 75d942b7c87..491801ebe45 100644 --- a/2021/30xxx/CVE-2021-30129.json +++ b/2021/30xxx/CVE-2021-30129.json @@ -92,7 +92,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31684.json b/2021/31xxx/CVE-2021-31684.json index eb8f67c0754..76ba2c61b22 100644 --- a/2021/31xxx/CVE-2021-31684.json +++ b/2021/31xxx/CVE-2021-31684.json @@ -78,7 +78,9 @@ "name": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/31xxx/CVE-2021-31805.json b/2021/31xxx/CVE-2021-31805.json index c075873a293..df8ef2e5e4e 100644 --- a/2021/31xxx/CVE-2021-31805.json +++ b/2021/31xxx/CVE-2021-31805.json @@ -75,13 +75,15 @@ "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220420-0001/", "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31811.json b/2021/31xxx/CVE-2021-31811.json index 77912052125..eb9723260c2 100644 --- a/2021/31xxx/CVE-2021-31811.json +++ b/2021/31xxx/CVE-2021-31811.json @@ -150,7 +150,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31812.json b/2021/31xxx/CVE-2021-31812.json index 1c90ec66815..9cbef5ab28c 100644 --- a/2021/31xxx/CVE-2021-31812.json +++ b/2021/31xxx/CVE-2021-31812.json @@ -145,7 +145,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/33xxx/CVE-2021-33560.json b/2021/33xxx/CVE-2021-33560.json index 10717c31b38..a07cd2d170a 100644 --- a/2021/33xxx/CVE-2021-33560.json +++ b/2021/33xxx/CVE-2021-33560.json @@ -103,7 +103,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/33xxx/CVE-2021-33813.json b/2021/33xxx/CVE-2021-33813.json index 0c7e5786eb2..b0210183258 100644 --- a/2021/33xxx/CVE-2021-33813.json +++ b/2021/33xxx/CVE-2021-33813.json @@ -133,7 +133,9 @@ "url": "https://alephsecurity.com/vulns/aleph-2021003" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/34xxx/CVE-2021-34141.json b/2021/34xxx/CVE-2021-34141.json index 96862ef843d..22280933339 100644 --- a/2021/34xxx/CVE-2021-34141.json +++ b/2021/34xxx/CVE-2021-34141.json @@ -58,7 +58,9 @@ "name": "https://github.com/numpy/numpy/issues/18993" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/34xxx/CVE-2021-34429.json b/2021/34xxx/CVE-2021-34429.json index dcb0ea34cf2..9acede70506 100644 --- a/2021/34xxx/CVE-2021-34429.json +++ b/2021/34xxx/CVE-2021-34429.json @@ -274,7 +274,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/35xxx/CVE-2021-35043.json b/2021/35xxx/CVE-2021-35043.json index dcf47fc7a7a..9b366b4847c 100644 --- a/2021/35xxx/CVE-2021-35043.json +++ b/2021/35xxx/CVE-2021-35043.json @@ -78,7 +78,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/35xxx/CVE-2021-35515.json b/2021/35xxx/CVE-2021-35515.json index 86e3cdeb545..556b13ad6a1 100644 --- a/2021/35xxx/CVE-2021-35515.json +++ b/2021/35xxx/CVE-2021-35515.json @@ -175,7 +175,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35516.json b/2021/35xxx/CVE-2021-35516.json index 065ba565ba1..8c2fe3de1cb 100644 --- a/2021/35xxx/CVE-2021-35516.json +++ b/2021/35xxx/CVE-2021-35516.json @@ -160,7 +160,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35517.json b/2021/35xxx/CVE-2021-35517.json index e3130429f6b..366586639fe 100644 --- a/2021/35xxx/CVE-2021-35517.json +++ b/2021/35xxx/CVE-2021-35517.json @@ -178,7 +178,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35940.json b/2021/35xxx/CVE-2021-35940.json index 3a069f1dcfc..0f89635b1f0 100644 --- a/2021/35xxx/CVE-2021-35940.json +++ b/2021/35xxx/CVE-2021-35940.json @@ -148,7 +148,9 @@ "url": "https://lists.apache.org/thread.html/r1c788464a25fbc046a72aff451bc8186386315d92a2dd0349903fa4f@%3Cdev.tomcat.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36090.json b/2021/36xxx/CVE-2021-36090.json index be56f6d385b..de98856822a 100644 --- a/2021/36xxx/CVE-2021-36090.json +++ b/2021/36xxx/CVE-2021-36090.json @@ -233,7 +233,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36373.json b/2021/36xxx/CVE-2021-36373.json index 80f43d3a216..0c1ba33282e 100644 --- a/2021/36xxx/CVE-2021-36373.json +++ b/2021/36xxx/CVE-2021-36373.json @@ -138,7 +138,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36374.json b/2021/36xxx/CVE-2021-36374.json index 068db0c687e..41b3f10805e 100644 --- a/2021/36xxx/CVE-2021-36374.json +++ b/2021/36xxx/CVE-2021-36374.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/37xxx/CVE-2021-37136.json b/2021/37xxx/CVE-2021-37136.json index eb3b0a1b628..58d7d147499 100644 --- a/2021/37xxx/CVE-2021-37136.json +++ b/2021/37xxx/CVE-2021-37136.json @@ -96,7 +96,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220210-0012/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/37xxx/CVE-2021-37137.json b/2021/37xxx/CVE-2021-37137.json index 39a42fb6e35..c44f58a31f5 100644 --- a/2021/37xxx/CVE-2021-37137.json +++ b/2021/37xxx/CVE-2021-37137.json @@ -96,7 +96,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220210-0012/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/37xxx/CVE-2021-37159.json b/2021/37xxx/CVE-2021-37159.json index 8d0d3b2cb2b..89411cb129b 100644 --- a/2021/37xxx/CVE-2021-37159.json +++ b/2021/37xxx/CVE-2021-37159.json @@ -57,11 +57,6 @@ "refsource": "MISC", "name": "https://www.spinics.net/lists/linux-usb/msg202228.html" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210819-0003/", - "url": "https://security.netapp.com/advisory/ntap-20210819-0003/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update", @@ -73,7 +68,14 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210819-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210819-0003/" } ] } diff --git a/2021/37xxx/CVE-2021-37714.json b/2021/37xxx/CVE-2021-37714.json index fcb614f17e4..dccb94c3d06 100644 --- a/2021/37xxx/CVE-2021-37714.json +++ b/2021/37xxx/CVE-2021-37714.json @@ -143,7 +143,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220210-0022/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/37xxx/CVE-2021-37750.json b/2021/37xxx/CVE-2021-37750.json index e9f6d61872b..284f86c948c 100644 --- a/2021/37xxx/CVE-2021-37750.json +++ b/2021/37xxx/CVE-2021-37750.json @@ -62,28 +62,30 @@ "refsource": "MISC", "name": "https://github.com/krb5/krb5/releases" }, - { - "refsource": "CONFIRM", - "name": "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49", - "url": "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-f2c8514f02", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210923-0002/", - "url": "https://security.netapp.com/advisory/ntap-20210923-0002/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49", + "url": "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210923-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210923-0002/" } ] } diff --git a/2021/38xxx/CVE-2021-38153.json b/2021/38xxx/CVE-2021-38153.json index 5841c319380..d8f738b0713 100644 --- a/2021/38xxx/CVE-2021-38153.json +++ b/2021/38xxx/CVE-2021-38153.json @@ -160,7 +160,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/38xxx/CVE-2021-38296.json b/2021/38xxx/CVE-2021-38296.json index bb5bd6f18af..a209edef7b4 100644 --- a/2021/38xxx/CVE-2021-38296.json +++ b/2021/38xxx/CVE-2021-38296.json @@ -75,7 +75,9 @@ "name": "https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/38xxx/CVE-2021-38604.json b/2021/38xxx/CVE-2021-38604.json index 668ca532b3e..b8e4d56de60 100644 --- a/2021/38xxx/CVE-2021-38604.json +++ b/2021/38xxx/CVE-2021-38604.json @@ -67,6 +67,16 @@ "refsource": "MISC", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=28213" }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-16dc1f33af", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "MISC", "name": "https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc", @@ -76,14 +86,6 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210909-0005/", "url": "https://security.netapp.com/advisory/ntap-20210909-0005/" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2021-16dc1f33af", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/39xxx/CVE-2021-39139.json b/2021/39xxx/CVE-2021-39139.json index 5de309141df..e078c0fd28a 100644 --- a/2021/39xxx/CVE-2021-39139.json +++ b/2021/39xxx/CVE-2021-39139.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39140.json b/2021/39xxx/CVE-2021-39140.json index 76d46cdc9a2..ff8b2c1f373 100644 --- a/2021/39xxx/CVE-2021-39140.json +++ b/2021/39xxx/CVE-2021-39140.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39141.json b/2021/39xxx/CVE-2021-39141.json index d99ff999aa4..e3dbe81fd59 100644 --- a/2021/39xxx/CVE-2021-39141.json +++ b/2021/39xxx/CVE-2021-39141.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39144.json b/2021/39xxx/CVE-2021-39144.json index af22d3e9156..b8803479b27 100644 --- a/2021/39xxx/CVE-2021-39144.json +++ b/2021/39xxx/CVE-2021-39144.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39145.json b/2021/39xxx/CVE-2021-39145.json index 3ee7ac8391b..922ec914b5c 100644 --- a/2021/39xxx/CVE-2021-39145.json +++ b/2021/39xxx/CVE-2021-39145.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39146.json b/2021/39xxx/CVE-2021-39146.json index 560209d24e3..c051bd28678 100644 --- a/2021/39xxx/CVE-2021-39146.json +++ b/2021/39xxx/CVE-2021-39146.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39147.json b/2021/39xxx/CVE-2021-39147.json index 1af63e98d46..860e37e5183 100644 --- a/2021/39xxx/CVE-2021-39147.json +++ b/2021/39xxx/CVE-2021-39147.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39148.json b/2021/39xxx/CVE-2021-39148.json index 08b0e59a477..ad534ce6fcf 100644 --- a/2021/39xxx/CVE-2021-39148.json +++ b/2021/39xxx/CVE-2021-39148.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39149.json b/2021/39xxx/CVE-2021-39149.json index 626142e5e5c..a0de0342bcd 100644 --- a/2021/39xxx/CVE-2021-39149.json +++ b/2021/39xxx/CVE-2021-39149.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39150.json b/2021/39xxx/CVE-2021-39150.json index 240e1640984..3fd8be0190d 100644 --- a/2021/39xxx/CVE-2021-39150.json +++ b/2021/39xxx/CVE-2021-39150.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39151.json b/2021/39xxx/CVE-2021-39151.json index 7c4a9861b11..624347636c2 100644 --- a/2021/39xxx/CVE-2021-39151.json +++ b/2021/39xxx/CVE-2021-39151.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39152.json b/2021/39xxx/CVE-2021-39152.json index 53624cb7cf3..c2235a39736 100644 --- a/2021/39xxx/CVE-2021-39152.json +++ b/2021/39xxx/CVE-2021-39152.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39153.json b/2021/39xxx/CVE-2021-39153.json index b678a10d215..7b9026438ce 100644 --- a/2021/39xxx/CVE-2021-39153.json +++ b/2021/39xxx/CVE-2021-39153.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/39xxx/CVE-2021-39154.json b/2021/39xxx/CVE-2021-39154.json index 94a7d2c1391..7ee5aaf1d55 100644 --- a/2021/39xxx/CVE-2021-39154.json +++ b/2021/39xxx/CVE-2021-39154.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3177.json b/2021/3xxx/CVE-2021-3177.json index 99964ef1b77..54a14a7b34c 100644 --- a/2021/3xxx/CVE-2021-3177.json +++ b/2021/3xxx/CVE-2021-3177.json @@ -183,7 +183,9 @@ "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json index cb4b374ae39..96beab2fd94 100644 --- a/2021/3xxx/CVE-2021-3449.json +++ b/2021/3xxx/CVE-2021-3449.json @@ -203,7 +203,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json index 9dca7bb6370..83fa0273378 100644 --- a/2021/3xxx/CVE-2021-3450.json +++ b/2021/3xxx/CVE-2021-3450.json @@ -188,7 +188,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/3xxx/CVE-2021-3517.json b/2021/3xxx/CVE-2021-3517.json index 407e1a0a39d..54e00b44d3f 100644 --- a/2021/3xxx/CVE-2021-3517.json +++ b/2021/3xxx/CVE-2021-3517.json @@ -105,7 +105,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3518.json b/2021/3xxx/CVE-2021-3518.json index fceac429aa4..073295ded7d 100644 --- a/2021/3xxx/CVE-2021-3518.json +++ b/2021/3xxx/CVE-2021-3518.json @@ -135,7 +135,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3537.json b/2021/3xxx/CVE-2021-3537.json index 9652b94b8ec..664298eb3a2 100644 --- a/2021/3xxx/CVE-2021-3537.json +++ b/2021/3xxx/CVE-2021-3537.json @@ -85,7 +85,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3572.json b/2021/3xxx/CVE-2021-3572.json index 995f3ba86fd..79607a34a85 100644 --- a/2021/3xxx/CVE-2021-3572.json +++ b/2021/3xxx/CVE-2021-3572.json @@ -55,7 +55,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3612.json b/2021/3xxx/CVE-2021-3612.json index 1f8db7e3df9..81faab21b69 100644 --- a/2021/3xxx/CVE-2021-3612.json +++ b/2021/3xxx/CVE-2021-3612.json @@ -59,11 +59,6 @@ "name": "FEDORA-2021-a95108d156", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210805-0005/", - "url": "https://security.netapp.com/advisory/ntap-20210805-0005/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update", @@ -75,7 +70,14 @@ "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0005/" } ] }, diff --git a/2021/3xxx/CVE-2021-3672.json b/2021/3xxx/CVE-2021-3672.json index a0b0d749de6..1bf4335e8c0 100644 --- a/2021/3xxx/CVE-2021-3672.json +++ b/2021/3xxx/CVE-2021-3672.json @@ -60,7 +60,9 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3737.json b/2021/3xxx/CVE-2021-3737.json index 94b0325c8e7..cfc3ae42446 100644 --- a/2021/3xxx/CVE-2021-3737.json +++ b/2021/3xxx/CVE-2021-3737.json @@ -69,6 +69,11 @@ "name": "https://ubuntu.com/security/CVE-2021-3737", "url": "https://ubuntu.com/security/CVE-2021-3737" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "MISC", "name": "https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html", @@ -78,9 +83,6 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0009/", "url": "https://security.netapp.com/advisory/ntap-20220407-0009/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3743.json b/2021/3xxx/CVE-2021-3743.json index 532ab6681b2..d641ebb7ff6 100644 --- a/2021/3xxx/CVE-2021-3743.json +++ b/2021/3xxx/CVE-2021-3743.json @@ -74,13 +74,15 @@ "name": "https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117", "url": "https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0007/", "url": "https://security.netapp.com/advisory/ntap-20220407-0007/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3744.json b/2021/3xxx/CVE-2021-3744.json index 4d4dff85297..65f5e88db76 100644 --- a/2021/3xxx/CVE-2021-3744.json +++ b/2021/3xxx/CVE-2021-3744.json @@ -95,7 +95,9 @@ "url": "https://www.debian.org/security/2022/dsa-5096" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3749.json b/2021/3xxx/CVE-2021-3749.json index a5ef98ba855..13379cc4a9b 100644 --- a/2021/3xxx/CVE-2021-3749.json +++ b/2021/3xxx/CVE-2021-3749.json @@ -131,7 +131,9 @@ "url": "https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3752.json b/2021/3xxx/CVE-2021-3752.json index cf4a0df3bcf..ccdbcd8981a 100644 --- a/2021/3xxx/CVE-2021-3752.json +++ b/2021/3xxx/CVE-2021-3752.json @@ -74,13 +74,15 @@ "name": "DSA-5096", "url": "https://www.debian.org/security/2022/dsa-5096" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220318-0009/", "url": "https://security.netapp.com/advisory/ntap-20220318-0009/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3772.json b/2021/3xxx/CVE-2021-3772.json index ae1c10e5bc9..3025338593b 100644 --- a/2021/3xxx/CVE-2021-3772.json +++ b/2021/3xxx/CVE-2021-3772.json @@ -75,7 +75,9 @@ "url": "https://www.debian.org/security/2022/dsa-5096" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3773.json b/2021/3xxx/CVE-2021-3773.json index f6fa9c3ad82..9cc39ee6222 100644 --- a/2021/3xxx/CVE-2021-3773.json +++ b/2021/3xxx/CVE-2021-3773.json @@ -50,7 +50,9 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/40xxx/CVE-2021-40690.json b/2021/40xxx/CVE-2021-40690.json index 58885e3fa74..531cc88b139 100644 --- a/2021/40xxx/CVE-2021-40690.json +++ b/2021/40xxx/CVE-2021-40690.json @@ -128,7 +128,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41164.json b/2021/41xxx/CVE-2021-41164.json index 66e4cc0c991..3714006a461 100644 --- a/2021/41xxx/CVE-2021-41164.json +++ b/2021/41xxx/CVE-2021-41164.json @@ -95,7 +95,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41165.json b/2021/41xxx/CVE-2021-41165.json index 0a6f817a8ee..4554e44806e 100644 --- a/2021/41xxx/CVE-2021-41165.json +++ b/2021/41xxx/CVE-2021-41165.json @@ -95,7 +95,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41182.json b/2021/41xxx/CVE-2021-41182.json index 6fe698fc9d1..bc2af71ef71 100644 --- a/2021/41xxx/CVE-2021-41182.json +++ b/2021/41xxx/CVE-2021-41182.json @@ -124,13 +124,15 @@ "name": "https://www.drupal.org/sa-contrib-2022-004", "url": "https://www.drupal.org/sa-contrib-2022-004" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2022-09", "url": "https://www.tenable.com/security/tns-2022-09" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41183.json b/2021/41xxx/CVE-2021-41183.json index 9e605164c71..7791f6e1c36 100644 --- a/2021/41xxx/CVE-2021-41183.json +++ b/2021/41xxx/CVE-2021-41183.json @@ -134,13 +134,15 @@ "name": "https://www.drupal.org/sa-core-2022-001", "url": "https://www.drupal.org/sa-core-2022-001" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2022-09", "url": "https://www.tenable.com/security/tns-2022-09" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41184.json b/2021/41xxx/CVE-2021-41184.json index d301e643f40..7d733988d24 100644 --- a/2021/41xxx/CVE-2021-41184.json +++ b/2021/41xxx/CVE-2021-41184.json @@ -114,13 +114,15 @@ "name": "https://www.drupal.org/sa-core-2022-001", "url": "https://www.drupal.org/sa-core-2022-001" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2022-09", "url": "https://www.tenable.com/security/tns-2022-09" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41303.json b/2021/41xxx/CVE-2021-41303.json index 679b77f5855..cd3cc0af62c 100644 --- a/2021/41xxx/CVE-2021-41303.json +++ b/2021/41xxx/CVE-2021-41303.json @@ -77,13 +77,15 @@ "name": "[shiro-user] 20210929 Re: CVE-2021-41303: Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass", "url": "https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E" }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220609-0001/", "url": "https://security.netapp.com/advisory/ntap-20220609-0001/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41617.json b/2021/41xxx/CVE-2021-41617.json index 8dbf6817b68..f68eee168d7 100644 --- a/2021/41xxx/CVE-2021-41617.json +++ b/2021/41xxx/CVE-2021-41617.json @@ -98,7 +98,9 @@ "url": "https://security.netapp.com/advisory/ntap-20211014-0004/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/41xxx/CVE-2021-41771.json b/2021/41xxx/CVE-2021-41771.json index 65a60d42d47..0ed49a66c2b 100644 --- a/2021/41xxx/CVE-2021-41771.json +++ b/2021/41xxx/CVE-2021-41771.json @@ -52,16 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", - "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20211210-0003/", - "url": "https://security.netapp.com/advisory/ntap-20211210-0003/" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-2ef35beebf", @@ -83,7 +73,19 @@ "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", + "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211210-0003/", + "url": "https://security.netapp.com/advisory/ntap-20211210-0003/" } ] } diff --git a/2021/41xxx/CVE-2021-41772.json b/2021/41xxx/CVE-2021-41772.json index 8fef68ac583..0097dec6926 100644 --- a/2021/41xxx/CVE-2021-41772.json +++ b/2021/41xxx/CVE-2021-41772.json @@ -52,16 +52,6 @@ }, "references": { "reference_data": [ - { - "refsource": "MISC", - "name": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", - "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20211210-0003/", - "url": "https://security.netapp.com/advisory/ntap-20211210-0003/" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-2ef35beebf", @@ -73,7 +63,19 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ON7BQRRJZBOR5TJHURBAB3WLF4YXFC6Z/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "MISC", + "name": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", + "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20211210-0003/", + "url": "https://security.netapp.com/advisory/ntap-20211210-0003/" } ] } diff --git a/2021/42xxx/CVE-2021-42340.json b/2021/42xxx/CVE-2021-42340.json index 4892b58d548..f620efae9f5 100644 --- a/2021/42xxx/CVE-2021-42340.json +++ b/2021/42xxx/CVE-2021-42340.json @@ -112,7 +112,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/42xxx/CVE-2021-42575.json b/2021/42xxx/CVE-2021-42575.json index 64496cc2e8f..ba8fe83d5cc 100644 --- a/2021/42xxx/CVE-2021-42575.json +++ b/2021/42xxx/CVE-2021-42575.json @@ -63,7 +63,9 @@ "url": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } diff --git a/2021/42xxx/CVE-2021-42739.json b/2021/42xxx/CVE-2021-42739.json index 910d85fe6c6..ba8ccbca9c5 100644 --- a/2021/42xxx/CVE-2021-42739.json +++ b/2021/42xxx/CVE-2021-42739.json @@ -55,7 +55,9 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43389.json b/2021/43xxx/CVE-2021-43389.json index 6b734d6f77a..edcd272f1cb 100644 --- a/2021/43xxx/CVE-2021-43389.json +++ b/2021/43xxx/CVE-2021-43389.json @@ -72,11 +72,6 @@ "refsource": "MISC", "name": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/" }, - { - "refsource": "CONFIRM", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" - }, { "refsource": "MLIST", "name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c", @@ -98,7 +93,14 @@ "url": "https://www.debian.org/security/2022/dsa-5096" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" } ] } diff --git a/2021/43xxx/CVE-2021-43797.json b/2021/43xxx/CVE-2021-43797.json index 42375f69140..9565d83a33b 100644 --- a/2021/43xxx/CVE-2021-43797.json +++ b/2021/43xxx/CVE-2021-43797.json @@ -90,7 +90,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220107-0003/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43818.json b/2021/43xxx/CVE-2021-43818.json index 3f60987e536..573b84eb900 100644 --- a/2021/43xxx/CVE-2021-43818.json +++ b/2021/43xxx/CVE-2021-43818.json @@ -138,7 +138,9 @@ "url": "https://security.netapp.com/advisory/ntap-20220107-0005/" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43859.json b/2021/43xxx/CVE-2021-43859.json index 4a3d32936b6..f1a57294e32 100644 --- a/2021/43xxx/CVE-2021-43859.json +++ b/2021/43xxx/CVE-2021-43859.json @@ -110,7 +110,9 @@ "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { - "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + "url": "https://www.oracle.com/security-alerts/cpujul2022.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] },