diff --git a/2020/8xxx/CVE-2020-8585.json b/2020/8xxx/CVE-2020-8585.json index b3df877fa51..e9eb64713a1 100644 --- a/2020/8xxx/CVE-2020-8585.json +++ b/2020/8xxx/CVE-2020-8585.json @@ -44,6 +44,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210128-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210128-0001/" + }, { "refsource": "MISC", "name": "https://security.netapp.com/advisory/NTAP-20210128-0001", diff --git a/2021/26xxx/CVE-2021-26309.json b/2021/26xxx/CVE-2021-26309.json new file mode 100644 index 00000000000..88be469afcf --- /dev/null +++ b/2021/26xxx/CVE-2021-26309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26310.json b/2021/26xxx/CVE-2021-26310.json new file mode 100644 index 00000000000..b90c4b0f61d --- /dev/null +++ b/2021/26xxx/CVE-2021-26310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3345.json b/2021/3xxx/CVE-2021-3345.json index 4454dbfe32f..6efab3d0fc8 100644 --- a/2021/3xxx/CVE-2021-3345.json +++ b/2021/3xxx/CVE-2021-3345.json @@ -71,6 +71,11 @@ "url": "https://gnupg.org", "refsource": "MISC", "name": "https://gnupg.org" + }, + { + "refsource": "MISC", + "name": "https://bugs.gentoo.org/show_bug.cgi?id=767814", + "url": "https://bugs.gentoo.org/show_bug.cgi?id=767814" } ] } diff --git a/2021/3xxx/CVE-2021-3347.json b/2021/3xxx/CVE-2021-3347.json index 4b7087f03bf..032e6784d74 100644 --- a/2021/3xxx/CVE-2021-3347.json +++ b/2021/3xxx/CVE-2021-3347.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, aka CID-34b1a1ce1458." + "value": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458." } ] }, @@ -91,6 +91,16 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/01/29/3", + "url": "https://www.openwall.com/lists/oss-security/2021/01/29/3" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/01/29/1", + "url": "https://www.openwall.com/lists/oss-security/2021/01/29/1" } ] }