diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 0084f4d7690..ae6aceda153 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -148,6 +148,26 @@ "refsource": "MLIST", "name": "[maven-issues] 20210530 [jira] [Closed] (DOXIA-615) Can you provide an updated version in order to fix CVE-2020-13956", "url": "https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[drill-issues] 20210604 [jira] [Commented] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[drill-dev] 20210604 [GitHub] [drill] luocooong opened a new pull request #2250: DRILL-7946: Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[drill-dev] 20210604 [jira] [Created] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[drill-issues] 20210604 [jira] [Created] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956", + "url": "https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E" } ] }, diff --git a/2020/15xxx/CVE-2020-15225.json b/2020/15xxx/CVE-2020-15225.json index bcd9231b119..a19e64b488c 100644 --- a/2020/15xxx/CVE-2020-15225.json +++ b/2020/15xxx/CVE-2020-15225.json @@ -88,6 +88,11 @@ "name": "https://pypi.org/project/django-filter/", "refsource": "MISC", "url": "https://pypi.org/project/django-filter/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0010/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0010/" } ] }, diff --git a/2020/36xxx/CVE-2020-36313.json b/2020/36xxx/CVE-2020-36313.json index d628a6bd75c..1173b5bc533 100644 --- a/2020/36xxx/CVE-2020-36313.json +++ b/2020/36xxx/CVE-2020-36313.json @@ -61,6 +61,11 @@ "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7", "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0005/" } ] } diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index cdb672150eb..07fc6083d43 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -398,6 +398,11 @@ "refsource": "MLIST", "name": "[flink-issues] 20210511 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx", "url": "https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0003/" } ] }, diff --git a/2021/21xxx/CVE-2021-21409.json b/2021/21xxx/CVE-2021-21409.json index 8e3bfccfa17..b497f02ecff 100644 --- a/2021/21xxx/CVE-2021-21409.json +++ b/2021/21xxx/CVE-2021-21409.json @@ -243,6 +243,11 @@ "refsource": "MLIST", "name": "[zookeeper-notifications] 20210521 [GitHub] [zookeeper] maoling commented on pull request #1696: ZOOKEEPER-4295: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21409 in branch-3.5", "url": "https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0003/" } ] }, diff --git a/2021/23xxx/CVE-2021-23369.json b/2021/23xxx/CVE-2021-23369.json index a4e4608cf0c..538955d4187 100644 --- a/2021/23xxx/CVE-2021-23369.json +++ b/2021/23xxx/CVE-2021-23369.json @@ -76,6 +76,11 @@ "refsource": "MISC", "url": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427", "name": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0008/" } ] }, diff --git a/2021/26xxx/CVE-2021-26073.json b/2021/26xxx/CVE-2021-26073.json index cb01eb58371..9c804114050 100644 --- a/2021/26xxx/CVE-2021-26073.json +++ b/2021/26xxx/CVE-2021-26073.json @@ -67,6 +67,11 @@ "url": "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a[\u2026]ypass-of-app-qsh-verification-via-context-jwts/47072", "refsource": "MISC", "name": "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a[\u2026]ypass-of-app-qsh-verification-via-context-jwts/47072" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0004/" } ] } diff --git a/2021/29xxx/CVE-2021-29154.json b/2021/29xxx/CVE-2021-29154.json index 166df431083..d4439a4b7e9 100644 --- a/2021/29xxx/CVE-2021-29154.json +++ b/2021/29xxx/CVE-2021-29154.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html", "url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0006/" } ] } diff --git a/2021/29xxx/CVE-2021-29262.json b/2021/29xxx/CVE-2021-29262.json index 8c64736fe3d..65b9ec65f99 100644 --- a/2021/29xxx/CVE-2021-29262.json +++ b/2021/29xxx/CVE-2021-29262.json @@ -68,6 +68,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E", "name": "https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0009/" } ] }, diff --git a/2021/29xxx/CVE-2021-29418.json b/2021/29xxx/CVE-2021-29418.json index 415deb939d9..550fccc62dc 100644 --- a/2021/29xxx/CVE-2021-29418.json +++ b/2021/29xxx/CVE-2021-29418.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://vuln.ryotak.me/advisories/6", "url": "https://vuln.ryotak.me/advisories/6" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0001/" } ] } diff --git a/2021/29xxx/CVE-2021-29424.json b/2021/29xxx/CVE-2021-29424.json index 1a0558ace40..ce5fb34b198 100644 --- a/2021/29xxx/CVE-2021-29424.json +++ b/2021/29xxx/CVE-2021-29424.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-c314017fcc", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0007/" } ] } diff --git a/2021/29xxx/CVE-2021-29662.json b/2021/29xxx/CVE-2021-29662.json index 553c1fbec17..1da09a5287c 100644 --- a/2021/29xxx/CVE-2021-29662.json +++ b/2021/29xxx/CVE-2021-29662.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md", "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0002/" } ] } diff --git a/2021/29xxx/CVE-2021-29943.json b/2021/29xxx/CVE-2021-29943.json index 0bb2fc3eb9d..6854afe9403 100644 --- a/2021/29xxx/CVE-2021-29943.json +++ b/2021/29xxx/CVE-2021-29943.json @@ -68,6 +68,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E", "name": "https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210604-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210604-0009/" } ] }, diff --git a/2021/33xxx/CVE-2021-33841.json b/2021/33xxx/CVE-2021-33841.json new file mode 100644 index 00000000000..f81d0f0d262 --- /dev/null +++ b/2021/33xxx/CVE-2021-33841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33842.json b/2021/33xxx/CVE-2021-33842.json new file mode 100644 index 00000000000..b5ed0afbe85 --- /dev/null +++ b/2021/33xxx/CVE-2021-33842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file