From df38e07c1cd6a87a9c9e478f3a36f1f8bdbe73d3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 15 Jan 2021 11:01:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/16xxx/CVE-2020-16590.json | 5 +++++ 2020/16xxx/CVE-2020-16591.json | 5 +++++ 2020/16xxx/CVE-2020-16592.json | 5 +++++ 2020/17xxx/CVE-2020-17530.json | 5 +++++ 2020/17xxx/CVE-2020-17531.json | 5 +++++ 2020/25xxx/CVE-2020-25613.json | 5 +++++ 2020/27xxx/CVE-2020-27730.json | 5 +++++ 2020/27xxx/CVE-2020-27821.json | 5 +++++ 2020/29xxx/CVE-2020-29369.json | 5 +++++ 2020/29xxx/CVE-2020-29374.json | 5 +++++ 10 files changed, 50 insertions(+) diff --git a/2020/16xxx/CVE-2020-16590.json b/2020/16xxx/CVE-2020-16590.json index 560525edc6f..e8e36046ca2 100644 --- a/2020/16xxx/CVE-2020-16590.json +++ b/2020/16xxx/CVE-2020-16590.json @@ -61,6 +61,11 @@ "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4", "refsource": "MISC", "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0003/" } ] } diff --git a/2020/16xxx/CVE-2020-16591.json b/2020/16xxx/CVE-2020-16591.json index a7475f05be7..9bdeaaeadcc 100644 --- a/2020/16xxx/CVE-2020-16591.json +++ b/2020/16xxx/CVE-2020-16591.json @@ -61,6 +61,11 @@ "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2", "refsource": "MISC", "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0003/" } ] } diff --git a/2020/16xxx/CVE-2020-16592.json b/2020/16xxx/CVE-2020-16592.json index 957254c21c6..6a0f9f2f8bf 100644 --- a/2020/16xxx/CVE-2020-16592.json +++ b/2020/16xxx/CVE-2020-16592.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-18ec0bf4bb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0003/" } ] } diff --git a/2020/17xxx/CVE-2020-17530.json b/2020/17xxx/CVE-2020-17530.json index c6a62871b9d..5d16dce241c 100644 --- a/2020/17xxx/CVE-2020-17530.json +++ b/2020/17xxx/CVE-2020-17530.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html", "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" } ] }, diff --git a/2020/17xxx/CVE-2020-17531.json b/2020/17xxx/CVE-2020-17531.json index 7ad5bb076ab..e48437efc22 100644 --- a/2020/17xxx/CVE-2020-17531.json +++ b/2020/17xxx/CVE-2020-17531.json @@ -74,6 +74,11 @@ "refsource": "MLIST", "name": "[tapestry-users] 20201208 CVE-2020-17531: Deserialization flaw in EOL Tapestry 4.", "url": "https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76@%3Cusers.tapestry.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0007/" } ] }, diff --git a/2020/25xxx/CVE-2020-25613.json b/2020/25xxx/CVE-2020-25613.json index 297702f78dc..f8c0e14624b 100644 --- a/2020/25xxx/CVE-2020-25613.json +++ b/2020/25xxx/CVE-2020-25613.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2020-fe2a7d7390", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0008/" } ] } diff --git a/2020/27xxx/CVE-2020-27730.json b/2020/27xxx/CVE-2020-27730.json index cd11a206e59..63668e6871d 100644 --- a/2020/27xxx/CVE-2020-27730.json +++ b/2020/27xxx/CVE-2020-27730.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K43530108", "url": "https://support.f5.com/csp/article/K43530108" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0004/" } ] }, diff --git a/2020/27xxx/CVE-2020-27821.json b/2020/27xxx/CVE-2020-27821.json index 0049f3c72bd..cfdde0f971f 100644 --- a/2020/27xxx/CVE-2020-27821.json +++ b/2020/27xxx/CVE-2020-27821.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c", "url": "http://www.openwall.com/lists/oss-security/2020/12/16/6" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0006/" } ] }, diff --git a/2020/29xxx/CVE-2020-29369.json b/2020/29xxx/CVE-2020-29369.json index 8d5e3231246..74407f47834 100644 --- a/2020/29xxx/CVE-2020-29369.json +++ b/2020/29xxx/CVE-2020-29369.json @@ -66,6 +66,11 @@ "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2056", "refsource": "MISC", "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2056" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0001/" } ] } diff --git a/2020/29xxx/CVE-2020-29374.json b/2020/29xxx/CVE-2020-29374.json index dc544842648..f9edf339a70 100644 --- a/2020/29xxx/CVE-2020-29374.json +++ b/2020/29xxx/CVE-2020-29374.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210115-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210115-0002/" } ] }