mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
84f778156c
commit
7b1f278a57
@ -278,7 +278,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -245,7 +245,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -70,7 +70,9 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5HJK366TLFEOIYWTHQSZO24MSDPBXHJU/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -153,7 +153,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,7 +148,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -355,7 +355,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -145,13 +145,15 @@
|
||||
"name": "FEDORA-2021-02d218c3be",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211118-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211118-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -96,13 +96,15 @@
|
||||
"url": "https://bugs.php.net/bug.php?id=81122",
|
||||
"name": "https://bugs.php.net/bug.php?id=81122"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -55,7 +55,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,7 +65,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -80,7 +80,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210113-01-gauss-en"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,13 +64,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210727-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210727-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -90,7 +90,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -69,13 +69,15 @@
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210723-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210723-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210727-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210727-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -90,7 +90,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -85,7 +85,9 @@
|
||||
"url": "https://support.apple.com/kb/HT212804"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,13 +79,15 @@
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210902-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,13 +64,15 @@
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,7 +65,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210917-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,7 +65,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,23 +64,25 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-1d24845e93",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220121-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220121-0008/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,18 +64,20 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-1d24845e93",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://hackerone.com/reports/1238709"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://hackerone.com/reports/1238099"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,7 +100,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210708-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -251,7 +251,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -97,7 +97,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -75,7 +75,9 @@
|
||||
"name": "https://github.com/jonschlinkert/set-value/pull/33"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -151,7 +151,9 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -140,7 +140,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -161,7 +161,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,7 +73,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -270,7 +270,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210702-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,7 +83,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -201,7 +201,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -177,18 +177,20 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html",
|
||||
"url": "http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[zookeeper-issues] 20211028 [jira] [Updated] (ZOOKEEPER-4337) CVE-2021-34429 in jetty 9.4.38.v20210224 in zookeeper 3.7.0",
|
||||
"url": "https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html",
|
||||
"url": "http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -614,7 +614,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -179,7 +179,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210727-0009/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -294,7 +294,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,7 +128,9 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -113,7 +113,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://golang.org/pkg/net/#ParseCIDR"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis",
|
||||
@ -81,9 +86,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md",
|
||||
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -97,7 +97,9 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -112,7 +112,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210827-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,7 +73,9 @@
|
||||
"name": "https://github.com/netplex/json-smart-v2/pull/68"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -140,7 +140,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -135,7 +135,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://sheetjs.com/pro"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/",
|
||||
@ -66,9 +71,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.npmjs.com/package/xlsx/v/0.17.0",
|
||||
"url": "https://www.npmjs.com/package/xlsx/v/0.17.0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://sheetjs.com/pro"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/",
|
||||
@ -66,9 +71,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.npmjs.com/package/xlsx/v/0.17.0",
|
||||
"url": "https://www.npmjs.com/package/xlsx/v/0.17.0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://sheetjs.com/pro"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/",
|
||||
@ -66,9 +71,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.npmjs.com/package/xlsx/v/0.17.0",
|
||||
"url": "https://www.npmjs.com/package/xlsx/v/0.17.0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -85,7 +85,9 @@
|
||||
"url": "https://github.com/PrismJS/prism/pull/2774"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,7 +100,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -95,7 +95,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,7 +78,9 @@
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -143,7 +143,9 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,21 +88,11 @@
|
||||
"name": "[httpd-cvs] 20210916 [httpd-site] branch main updated: Add descriptions for CVE-2021-33193 CVE-2021-36160",
|
||||
"url": "https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210917-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210917-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-5d2d4b6ac5",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-f94985afca",
|
||||
@ -114,7 +104,19 @@
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210917-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210917-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,7 +93,9 @@
|
||||
"url": "https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,7 +58,9 @@
|
||||
"name": "https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
|
||||
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
|
||||
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
|
||||
@ -87,11 +72,6 @@
|
||||
"name": "DSA-4941",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html",
|
||||
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-07dc0b3eb1",
|
||||
@ -102,26 +82,11 @@
|
||||
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210819-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
|
||||
@ -137,13 +102,50 @@
|
||||
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
|
||||
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
|
||||
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html",
|
||||
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210819-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -131,7 +131,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210813-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -203,11 +203,6 @@
|
||||
"name": "[kafka-jira] 20210818 [GitHub] [kafka] omkreddy merged pull request #11224: KAFKA-13209: Upgrade jetty-server to fix CVE-2021-34429",
|
||||
"url": "https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210819-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0006/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[zookeeper-notifications] 20210825 [GitHub] [zookeeper] ztzg commented on pull request #1734: ZOOKEEPER-4337: Bump jetty to 9.4.43.v20210629 (avoids CVE-2021-34429)",
|
||||
@ -264,7 +259,14 @@
|
||||
"url": "https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210819-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -123,7 +123,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210813-0005/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -109,28 +109,30 @@
|
||||
"name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4982",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4982"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,7 +68,9 @@
|
||||
"url": "https://github.com/nahsra/antisamy/pull/87"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -159,13 +159,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -144,13 +144,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -162,13 +162,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -217,13 +217,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -139,11 +139,6 @@
|
||||
"name": "[httpd-bugs] 20211006 [Bug 65616] CVE-2021-36160 regression",
|
||||
"url": "https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
|
||||
@ -180,7 +175,14 @@
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -62,11 +62,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
|
||||
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-38b51d9fd3",
|
||||
@ -82,6 +77,16 @@
|
||||
"name": "FEDORA-2021-e71b05ba7b",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
|
||||
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update",
|
||||
@ -91,9 +96,6 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -128,7 +128,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,7 +118,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210819-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,7 +81,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,7 +81,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -105,7 +105,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,7 +128,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -150,7 +150,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39139.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39140.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39141.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39144.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39145.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39146.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39147.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39148.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39149.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39150.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39151.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39152.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user