mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
Oracle 2022 January CPU 3rd party CVE updates
Committer: Bill Situ <Bill.Situ@.oracle.com> On branch cna/Oracle/CPU2022Jan3rd Changes to be committed: modified: 2013/6xxx/CVE-2013-6440.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2018/11xxx/CVE-2018-11771.json modified: 2018/1xxx/CVE-2018-1311.json modified: 2018/1xxx/CVE-2018-1324.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10219.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/13xxx/CVE-2019-13734.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/11xxx/CVE-2020-11987.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13817.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13936.json modified: 2020/13xxx/CVE-2020-13949.json modified: 2020/13xxx/CVE-2020-13956.json modified: 2020/14xxx/CVE-2020-14340.json modified: 2020/15xxx/CVE-2020-15824.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17527.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1963.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/25xxx/CVE-2020-25649.json modified: 2020/26xxx/CVE-2020-26217.json modified: 2020/27xxx/CVE-2020-27216.json modified: 2020/27xxx/CVE-2020-27618.json modified: 2020/28xxx/CVE-2020-28052.json modified: 2020/28xxx/CVE-2020-28469.json modified: 2020/28xxx/CVE-2020-28500.json modified: 2020/29xxx/CVE-2020-29582.json modified: 2020/35xxx/CVE-2020-35490.json modified: 2020/35xxx/CVE-2020-35491.json modified: 2020/35xxx/CVE-2020-35728.json modified: 2020/36xxx/CVE-2020-36179.json modified: 2020/36xxx/CVE-2020-36180.json modified: 2020/36xxx/CVE-2020-36181.json modified: 2020/36xxx/CVE-2020-36182.json modified: 2020/36xxx/CVE-2020-36183.json modified: 2020/36xxx/CVE-2020-36184.json modified: 2020/36xxx/CVE-2020-36185.json modified: 2020/36xxx/CVE-2020-36186.json modified: 2020/36xxx/CVE-2020-36187.json modified: 2020/36xxx/CVE-2020-36188.json modified: 2020/36xxx/CVE-2020-36189.json modified: 2020/5xxx/CVE-2020-5258.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/6xxx/CVE-2020-6950.json modified: 2020/7xxx/CVE-2020-7712.json modified: 2020/8xxx/CVE-2020-8177.json modified: 2020/8xxx/CVE-2020-8203.json modified: 2020/8xxx/CVE-2020-8284.json modified: 2020/8xxx/CVE-2020-8285.json modified: 2020/8xxx/CVE-2020-8554.json modified: 2020/8xxx/CVE-2020-8908.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2021/20xxx/CVE-2021-20718.json modified: 2021/21xxx/CVE-2021-21341.json modified: 2021/21xxx/CVE-2021-21342.json modified: 2021/21xxx/CVE-2021-21343.json modified: 2021/21xxx/CVE-2021-21344.json modified: 2021/21xxx/CVE-2021-21345.json modified: 2021/21xxx/CVE-2021-21346.json modified: 2021/21xxx/CVE-2021-21347.json modified: 2021/21xxx/CVE-2021-21348.json modified: 2021/21xxx/CVE-2021-21349.json modified: 2021/21xxx/CVE-2021-21350.json modified: 2021/21xxx/CVE-2021-21351.json modified: 2021/21xxx/CVE-2021-21409.json modified: 2021/21xxx/CVE-2021-21703.json modified: 2021/21xxx/CVE-2021-21705.json modified: 2021/21xxx/CVE-2021-21783.json modified: 2021/22xxx/CVE-2021-22118.json modified: 2021/22xxx/CVE-2021-22119.json modified: 2021/22xxx/CVE-2021-22298.json modified: 2021/22xxx/CVE-2021-22897.json modified: 2021/22xxx/CVE-2021-22898.json modified: 2021/22xxx/CVE-2021-22901.json modified: 2021/22xxx/CVE-2021-22924.json modified: 2021/22xxx/CVE-2021-22925.json modified: 2021/22xxx/CVE-2021-22926.json modified: 2021/22xxx/CVE-2021-22931.json modified: 2021/22xxx/CVE-2021-22939.json modified: 2021/22xxx/CVE-2021-22940.json modified: 2021/22xxx/CVE-2021-22946.json modified: 2021/22xxx/CVE-2021-22947.json modified: 2021/22xxx/CVE-2021-22959.json modified: 2021/22xxx/CVE-2021-22960.json modified: 2021/23xxx/CVE-2021-23017.json modified: 2021/23xxx/CVE-2021-23336.json modified: 2021/23xxx/CVE-2021-23337.json modified: 2021/23xxx/CVE-2021-23440.json modified: 2021/23xxx/CVE-2021-23840.json modified: 2021/25xxx/CVE-2021-25122.json modified: 2021/25xxx/CVE-2021-25329.json modified: 2021/26xxx/CVE-2021-26272.json modified: 2021/26xxx/CVE-2021-26691.json modified: 2021/27xxx/CVE-2021-27568.json modified: 2021/28xxx/CVE-2021-28163.json modified: 2021/28xxx/CVE-2021-28164.json modified: 2021/28xxx/CVE-2021-28165.json modified: 2021/28xxx/CVE-2021-28169.json modified: 2021/29xxx/CVE-2021-29425.json modified: 2021/29xxx/CVE-2021-29505.json modified: 2021/29xxx/CVE-2021-29921.json modified: 2021/29xxx/CVE-2021-29923.json modified: 2021/30xxx/CVE-2021-30639.json modified: 2021/30xxx/CVE-2021-30640.json modified: 2021/31xxx/CVE-2021-31684.json modified: 2021/31xxx/CVE-2021-31811.json modified: 2021/31xxx/CVE-2021-31812.json modified: 2021/32xxx/CVE-2021-32012.json modified: 2021/32xxx/CVE-2021-32013.json modified: 2021/32xxx/CVE-2021-32014.json modified: 2021/32xxx/CVE-2021-32723.json modified: 2021/32xxx/CVE-2021-32808.json modified: 2021/32xxx/CVE-2021-32809.json modified: 2021/32xxx/CVE-2021-32827.json modified: 2021/33xxx/CVE-2021-33037.json modified: 2021/33xxx/CVE-2021-33193.json modified: 2021/33xxx/CVE-2021-33560.json modified: 2021/33xxx/CVE-2021-33880.json modified: 2021/33xxx/CVE-2021-33909.json modified: 2021/34xxx/CVE-2021-34428.json modified: 2021/34xxx/CVE-2021-34429.json modified: 2021/34xxx/CVE-2021-34558.json modified: 2021/34xxx/CVE-2021-34798.json modified: 2021/35xxx/CVE-2021-35043.json modified: 2021/35xxx/CVE-2021-35515.json modified: 2021/35xxx/CVE-2021-35516.json modified: 2021/35xxx/CVE-2021-35517.json modified: 2021/36xxx/CVE-2021-36090.json modified: 2021/36xxx/CVE-2021-36160.json modified: 2021/36xxx/CVE-2021-36221.json modified: 2021/36xxx/CVE-2021-36373.json modified: 2021/36xxx/CVE-2021-36374.json modified: 2021/36xxx/CVE-2021-36690.json modified: 2021/37xxx/CVE-2021-37136.json modified: 2021/37xxx/CVE-2021-37137.json modified: 2021/37xxx/CVE-2021-37695.json modified: 2021/37xxx/CVE-2021-37714.json modified: 2021/38xxx/CVE-2021-38153.json modified: 2021/39xxx/CVE-2021-39139.json modified: 2021/39xxx/CVE-2021-39140.json modified: 2021/39xxx/CVE-2021-39141.json modified: 2021/39xxx/CVE-2021-39144.json modified: 2021/39xxx/CVE-2021-39145.json modified: 2021/39xxx/CVE-2021-39146.json modified: 2021/39xxx/CVE-2021-39147.json modified: 2021/39xxx/CVE-2021-39148.json modified: 2021/39xxx/CVE-2021-39149.json modified: 2021/39xxx/CVE-2021-39150.json modified: 2021/39xxx/CVE-2021-39151.json modified: 2021/39xxx/CVE-2021-39152.json modified: 2021/39xxx/CVE-2021-39153.json modified: 2021/39xxx/CVE-2021-39154.json modified: 2021/39xxx/CVE-2021-39275.json modified: 2021/3xxx/CVE-2021-3177.json modified: 2021/3xxx/CVE-2021-3326.json modified: 2021/3xxx/CVE-2021-3426.json modified: 2021/3xxx/CVE-2021-3448.json modified: 2021/3xxx/CVE-2021-3516.json modified: 2021/3xxx/CVE-2021-3517.json modified: 2021/3xxx/CVE-2021-3541.json modified: 2021/3xxx/CVE-2021-3634.json modified: 2021/3xxx/CVE-2021-3711.json modified: 2021/3xxx/CVE-2021-3712.json modified: 2021/40xxx/CVE-2021-40438.json modified: 2021/41xxx/CVE-2021-41164.json modified: 2021/41xxx/CVE-2021-41165.json modified: 2021/41xxx/CVE-2021-41355.json modified: 2021/41xxx/CVE-2021-41524.json modified: 2021/41xxx/CVE-2021-41773.json modified: 2021/42xxx/CVE-2021-42013.json modified: 2021/42xxx/CVE-2021-42340.json modified: 2021/42xxx/CVE-2021-42575.json modified: 2021/44xxx/CVE-2021-44224.json modified: 2021/44xxx/CVE-2021-44228.json modified: 2021/44xxx/CVE-2021-44790.json modified: 2021/44xxx/CVE-2021-44832.json modified: 2021/45xxx/CVE-2021-45046.json modified: 2021/45xxx/CVE-2021-45105.json modified: 2021/4xxx/CVE-2021-4104.json
This commit is contained in:
parent
f031dc68bf
commit
a87c8c972e
@ -86,6 +86,9 @@
|
||||
"name": "RHSA-2014:0171",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -166,6 +166,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -456,6 +456,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -132,6 +132,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[tinkerpop-commits] 20190930 [GitHub] [tinkerpop] spmallette merged pull request #1199: Upgrade commons-compress to version 1.19 due to CVE-2018-11771",
|
||||
"url": "https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -88,6 +88,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311",
|
||||
"url": "https://lists.apache.org/thread.html/r90ec105571622a7dc3a43b846c12732d2e563561dfb2f72941625f35@%3Cc-users.xerces.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -82,6 +82,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[beam-issues] 20200421 [jira] [Closed] (BEAM-3873) Current version of commons-compress is DOS vulnerable CVE-2018-1324",
|
||||
"url": "https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -303,6 +303,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -103,6 +103,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219",
|
||||
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -401,6 +401,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -134,6 +134,9 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4298-2",
|
||||
"url": "https://usn.ubuntu.com/4298-2/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -131,6 +131,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -121,6 +121,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[airflow-commits] 20210921 [GitHub] [airflow] beltran-rubo closed issue #18383: CVE-2019-17495 for swagger-ui",
|
||||
"url": "https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -78,6 +78,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -111,6 +111,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -116,6 +116,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -263,6 +263,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
|
||||
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -373,6 +373,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
|
||||
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -144,6 +144,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,6 +83,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -121,6 +121,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-12",
|
||||
"url": "https://security.gentoo.org/glsa/202007-12"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -103,6 +103,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,6 +118,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -174,6 +174,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-users] 20210831 RE: Security issues",
|
||||
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -578,6 +578,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[thrift-user] 20211004 Re: Analysis and guidelines concerning CVE-2020-13949",
|
||||
"url": "https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -343,6 +343,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[ranger-dev] 20211028 [jira] [Commented] (RANGER-3100) Upgrade httpclient version from 4.5.6 to 4.5.13+ due to CVE-2020-13956",
|
||||
"url": "https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/",
|
||||
"url": "https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -97,6 +97,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -183,6 +183,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -298,6 +298,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,6 +88,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[ignite-user] 20200615 Re: [CVE-2020-1963] Apache Ignite access to file system disclosure vulnerability",
|
||||
"url": "https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -383,6 +383,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -133,6 +133,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -760,6 +760,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-07",
|
||||
"url": "https://security.gentoo.org/glsa/202107-07"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -166,6 +166,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2",
|
||||
"name": "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,6 +100,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/",
|
||||
"url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -125,6 +125,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -183,6 +183,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943",
|
||||
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4881",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4881"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -108,6 +108,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,6 +128,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -115,6 +115,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -276,6 +276,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[pig-dev] 20211021 [GitHub] [pig] lujiefsi opened a new pull request #36: PIG-5417:Replace guava's Files.createTempDir()",
|
||||
"url": "https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -243,6 +243,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-46b017b771",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5HJK366TLFEOIYWTHQSZO24MSDPBXHJU/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -151,6 +151,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5004",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -353,6 +353,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[pulsar-commits] 20211020 [GitHub] [pulsar] Shoothzj opened a new pull request #12437: [Security] Bump grpc to 1.41.0",
|
||||
"url": "https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -149,6 +149,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211118-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211118-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,6 +100,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[nifi-issues] 20210726 [jira] [Created] (NIFI-8948) Upgrade Spring Framework to 5.3.9 and Spring Security to 5.5.1",
|
||||
"url": "https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210113-01-gauss-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210113-01-gauss-en"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210727-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210727-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,6 +88,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210727-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210727-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,6 +88,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210902-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212804",
|
||||
"url": "https://support.apple.com/kb/HT212804"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210917-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210917-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-1d24845e93",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user