From 5e1767c1046b642dc13845d664d38e9d05ee94cf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 25 Feb 2022 10:01:18 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/8xxx/CVE-2020-8562.json | 42 ++++++++++++++++++++++++++++++---- 2021/20xxx/CVE-2021-20373.json | 5 ++++ 2021/3xxx/CVE-2021-3930.json | 5 ++++ 2021/44xxx/CVE-2021-44521.json | 5 ++++ 2021/4xxx/CVE-2021-4154.json | 7 +++++- 2022/0xxx/CVE-2022-0185.json | 5 ++++ 2022/0xxx/CVE-2022-0391.json | 5 ++++ 2022/0xxx/CVE-2022-0762.json | 18 +++++++++++++++ 2022/0xxx/CVE-2022-0763.json | 18 +++++++++++++++ 2022/23xxx/CVE-2022-23772.json | 5 ++++ 2022/23xxx/CVE-2022-23773.json | 5 ++++ 2022/23xxx/CVE-2022-23806.json | 5 ++++ 2022/24xxx/CVE-2022-24958.json | 5 ++++ 13 files changed, 125 insertions(+), 5 deletions(-) create mode 100644 2022/0xxx/CVE-2022-0762.json create mode 100644 2022/0xxx/CVE-2022-0763.json diff --git a/2020/8xxx/CVE-2020-8562.json b/2020/8xxx/CVE-2020-8562.json index 7fc84b411dc..3379ceb3087 100644 --- a/2020/8xxx/CVE-2020-8562.json +++ b/2020/8xxx/CVE-2020-8562.json @@ -13,18 +13,47 @@ "product": { "product_data": [ { - "product_name": "n/a", + "product_name": "Kubernetes", "version": { "version_data": [ { - "version_value": "n/a" + "version_affected": "<=", + "version_value": "v1.18.18" + }, + { + "version_affected": "?>", + "version_value": "v1.18.18" + }, + { + "version_affected": "<=", + "version_value": "v1.19.10" + }, + { + "version_affected": "?>", + "version_value": "v1.19.10" + }, + { + "version_affected": "<=", + "version_value": "v1.20.6" + }, + { + "version_affected": "?>", + "version_value": "v1.20.6" + }, + { + "version_affected": "<=", + "version_value": "v1.21.0" + }, + { + "version_affected": "?>", + "version_value": "v1.21.0" } ] } } ] }, - "vendor_name": "n/a" + "vendor_name": "Kubernetes" } ] } @@ -71,7 +100,7 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition" } ] } @@ -88,6 +117,11 @@ "refsource": "MISC", "url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY", "name": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0002/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0002/" } ] }, diff --git a/2021/20xxx/CVE-2021-20373.json b/2021/20xxx/CVE-2021-20373.json index 1ec289ad9f7..40580094119 100644 --- a/2021/20xxx/CVE-2021-20373.json +++ b/2021/20xxx/CVE-2021-20373.json @@ -88,6 +88,11 @@ "refsource": "XF", "name": "ibm-db2-cve202120373-info-disc (195521)", "title": "X-Force Vulnerability Report" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0005/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0005/" } ] }, diff --git a/2021/3xxx/CVE-2021-3930.json b/2021/3xxx/CVE-2021-3930.json index 07513c0cb83..2f3c27b5d11 100644 --- a/2021/3xxx/CVE-2021-3930.json +++ b/2021/3xxx/CVE-2021-3930.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2020588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020588" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0007/" } ] }, diff --git a/2021/44xxx/CVE-2021-44521.json b/2021/44xxx/CVE-2021-44521.json index 2834600878f..52323e098c0 100644 --- a/2021/44xxx/CVE-2021-44521.json +++ b/2021/44xxx/CVE-2021-44521.json @@ -102,6 +102,11 @@ "refsource": "MISC", "name": "https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/", "url": "https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0001/" } ] }, diff --git a/2021/4xxx/CVE-2021-4154.json b/2021/4xxx/CVE-2021-4154.json index fc9462ee7cc..3e3120d7fec 100644 --- a/2021/4xxx/CVE-2021-4154.json +++ b/2021/4xxx/CVE-2021-4154.json @@ -58,6 +58,11 @@ "name": "https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002", "refsource": "MISC", "url": "https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0004/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0004/" } ] }, @@ -69,4 +74,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0185.json b/2022/0xxx/CVE-2022-0185.json index 6c1293fc9b6..03612aaed2f 100644 --- a/2022/0xxx/CVE-2022-0185.json +++ b/2022/0xxx/CVE-2022-0185.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.willsroot.io/2022/01/cve-2022-0185.html", "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0003/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0003/" } ] }, diff --git a/2022/0xxx/CVE-2022-0391.json b/2022/0xxx/CVE-2022-0391.json index 31c54b186b3..383d70419f6 100644 --- a/2022/0xxx/CVE-2022-0391.json +++ b/2022/0xxx/CVE-2022-0391.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-18ad73aba6", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0009/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0009/" } ] }, diff --git a/2022/0xxx/CVE-2022-0762.json b/2022/0xxx/CVE-2022-0762.json new file mode 100644 index 00000000000..343f537dd2c --- /dev/null +++ b/2022/0xxx/CVE-2022-0762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0763.json b/2022/0xxx/CVE-2022-0763.json new file mode 100644 index 00000000000..e65512cee32 --- /dev/null +++ b/2022/0xxx/CVE-2022-0763.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0763", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23772.json b/2022/23xxx/CVE-2022-23772.json index f0251fd966a..eface3bb6bb 100644 --- a/2022/23xxx/CVE-2022-23772.json +++ b/2022/23xxx/CVE-2022-23772.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0006/" } ] } diff --git a/2022/23xxx/CVE-2022-23773.json b/2022/23xxx/CVE-2022-23773.json index 2058123d055..6549cc2d461 100644 --- a/2022/23xxx/CVE-2022-23773.json +++ b/2022/23xxx/CVE-2022-23773.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0006/" } ] } diff --git a/2022/23xxx/CVE-2022-23806.json b/2022/23xxx/CVE-2022-23806.json index 9f75e213d2a..540bf6f550b 100644 --- a/2022/23xxx/CVE-2022-23806.json +++ b/2022/23xxx/CVE-2022-23806.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0006/" } ] } diff --git a/2022/24xxx/CVE-2022-24958.json b/2022/24xxx/CVE-2022-24958.json index bfd7b7d6ea3..0e97e6a26d9 100644 --- a/2022/24xxx/CVE-2022-24958.json +++ b/2022/24xxx/CVE-2022-24958.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-2aa7c08b53", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220225-0008/", + "url": "https://security.netapp.com/advisory/ntap-20220225-0008/" } ] }