diff --git a/2017/20xxx/CVE-2017-20005.json b/2017/20xxx/CVE-2017-20005.json index cb5b62ffcd3..ca06ea14730 100644 --- a/2017/20xxx/CVE-2017-20005.json +++ b/2017/20xxx/CVE-2017-20005.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210607 [SECURITY] [DLA 2680-1] nginx security update", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00009.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0006/" } ] } diff --git a/2019/10xxx/CVE-2019-10241.json b/2019/10xxx/CVE-2019-10241.json index eadb96daf7c..5ef866ac359 100644 --- a/2019/10xxx/CVE-2019-10241.json +++ b/2019/10xxx/CVE-2019-10241.json @@ -130,6 +130,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2019/10xxx/CVE-2019-10247.json b/2019/10xxx/CVE-2019-10247.json index 799e8e7bb08..110875e62d8 100644 --- a/2019/10xxx/CVE-2019-10247.json +++ b/2019/10xxx/CVE-2019-10247.json @@ -148,6 +148,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index ef95452dc59..fe3d90c65a2 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -750,6 +750,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 1b10e80c553..fed33a91a02 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -391,6 +391,11 @@ "refsource": "MLIST", "name": "[solr-issues] 20210623 [jira] [Updated] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)", "url": "https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2020/28xxx/CVE-2020-28097.json b/2020/28xxx/CVE-2020-28097.json index d252d5509f2..8a5312c2f39 100644 --- a/2020/28xxx/CVE-2020-28097.json +++ b/2020/28xxx/CVE-2020-28097.json @@ -71,6 +71,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0001/" } ] } diff --git a/2020/28xxx/CVE-2020-28169.json b/2020/28xxx/CVE-2020-28169.json index f063c4dff3b..5aeb3acffea 100644 --- a/2020/28xxx/CVE-2020-28169.json +++ b/2020/28xxx/CVE-2020-28169.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html", "url": "http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2021/22xxx/CVE-2021-22555.json b/2021/22xxx/CVE-2021-22555.json index e7e88567448..e7145144645 100644 --- a/2021/22xxx/CVE-2021-22555.json +++ b/2021/22xxx/CVE-2021-22555.json @@ -99,6 +99,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html", "url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0010/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0010/" } ] }, diff --git a/2021/22xxx/CVE-2021-22880.json b/2021/22xxx/CVE-2021-22880.json index d9d17508289..c0d1c8370ca 100644 --- a/2021/22xxx/CVE-2021-22880.json +++ b/2021/22xxx/CVE-2021-22880.json @@ -68,6 +68,11 @@ "refsource": "DEBIAN", "name": "DSA-4929", "url": "https://www.debian.org/security/2021/dsa-4929" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0009/" } ] }, diff --git a/2021/22xxx/CVE-2021-22885.json b/2021/22xxx/CVE-2021-22885.json index f65c28d454b..ffe6cab8755 100644 --- a/2021/22xxx/CVE-2021-22885.json +++ b/2021/22xxx/CVE-2021-22885.json @@ -53,6 +53,11 @@ "refsource": "DEBIAN", "name": "DSA-4929", "url": "https://www.debian.org/security/2021/dsa-4929" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0009/" } ] }, diff --git a/2021/22xxx/CVE-2021-22904.json b/2021/22xxx/CVE-2021-22904.json index 7242be11c5e..a955440504e 100644 --- a/2021/22xxx/CVE-2021-22904.json +++ b/2021/22xxx/CVE-2021-22904.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869", "url": "https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0009/" } ] }, diff --git a/2021/22xxx/CVE-2021-22918.json b/2021/22xxx/CVE-2021-22918.json index cf5556f9f38..4500736a5db 100644 --- a/2021/22xxx/CVE-2021-22918.json +++ b/2021/22xxx/CVE-2021-22918.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0003/" } ] }, diff --git a/2021/22xxx/CVE-2021-22921.json b/2021/22xxx/CVE-2021-22921.json index 68fe1351e02..d1287c7e5b9 100644 --- a/2021/22xxx/CVE-2021-22921.json +++ b/2021/22xxx/CVE-2021-22921.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1211160", "url": "https://hackerone.com/reports/1211160" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0003/" } ] }, diff --git a/2021/28xxx/CVE-2021-28691.json b/2021/28xxx/CVE-2021-28691.json index 1c5249358c0..4f370a9f60c 100644 --- a/2021/28xxx/CVE-2021-28691.json +++ b/2021/28xxx/CVE-2021-28691.json @@ -106,6 +106,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-30", "url": "https://security.gentoo.org/glsa/202107-30" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0002/" } ] }, diff --git a/2021/34xxx/CVE-2021-34428.json b/2021/34xxx/CVE-2021-34428.json index f9cccf170d7..5ab1e116352 100644 --- a/2021/34xxx/CVE-2021-34428.json +++ b/2021/34xxx/CVE-2021-34428.json @@ -89,6 +89,11 @@ "refsource": "MLIST", "name": "[kafka-jira] 20210623 [GitHub] [kafka] dongjinleekr opened a new pull request #10919: KAFKA-12985: CVE-2021-28169 - Upgrade jetty to 9.4.41", "url": "https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4949", + "url": "https://www.debian.org/security/2021/dsa-4949" } ] } diff --git a/2021/35xxx/CVE-2021-35042.json b/2021/35xxx/CVE-2021-35042.json index 5a797012ebe..7da91c9a7de 100644 --- a/2021/35xxx/CVE-2021-35042.json +++ b/2021/35xxx/CVE-2021-35042.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/", "url": "https://www.djangoproject.com/weblog/2021/jul/01/security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" } ] } diff --git a/2021/3xxx/CVE-2021-3541.json b/2021/3xxx/CVE-2021-3541.json index 8f38facc54e..709b385dd90 100644 --- a/2021/3xxx/CVE-2021-3541.json +++ b/2021/3xxx/CVE-2021-3541.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0007/" } ] }, diff --git a/2021/3xxx/CVE-2021-3592.json b/2021/3xxx/CVE-2021-3592.json index 607354d7444..675f1c81227 100644 --- a/2021/3xxx/CVE-2021-3592.json +++ b/2021/3xxx/CVE-2021-3592.json @@ -63,6 +63,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-44", "url": "https://security.gentoo.org/glsa/202107-44" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0004/" } ] }, diff --git a/2021/3xxx/CVE-2021-3593.json b/2021/3xxx/CVE-2021-3593.json index dca67c61204..b9b97166364 100644 --- a/2021/3xxx/CVE-2021-3593.json +++ b/2021/3xxx/CVE-2021-3593.json @@ -63,6 +63,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-44", "url": "https://security.gentoo.org/glsa/202107-44" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0004/" } ] }, diff --git a/2021/3xxx/CVE-2021-3594.json b/2021/3xxx/CVE-2021-3594.json index 18a40ea1dd5..0f52c1ebaf1 100644 --- a/2021/3xxx/CVE-2021-3594.json +++ b/2021/3xxx/CVE-2021-3594.json @@ -63,6 +63,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-44", "url": "https://security.gentoo.org/glsa/202107-44" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0004/" } ] }, diff --git a/2021/3xxx/CVE-2021-3595.json b/2021/3xxx/CVE-2021-3595.json index 1c1ada44195..86fe81399e9 100644 --- a/2021/3xxx/CVE-2021-3595.json +++ b/2021/3xxx/CVE-2021-3595.json @@ -63,6 +63,11 @@ "refsource": "GENTOO", "name": "GLSA-202107-44", "url": "https://security.gentoo.org/glsa/202107-44" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0004/" } ] }, diff --git a/2021/3xxx/CVE-2021-3612.json b/2021/3xxx/CVE-2021-3612.json index 0c03b38d1f7..a3bc05d37a0 100644 --- a/2021/3xxx/CVE-2021-3612.json +++ b/2021/3xxx/CVE-2021-3612.json @@ -58,6 +58,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-a95108d156", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210805-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210805-0005/" } ] },