From e2cd0aa25206e55b547be93d4032b542293d138f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 14 Jun 2021 18:01:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/15xxx/CVE-2018-15139.json | 5 +++ 2020/11xxx/CVE-2020-11060.json | 5 +++ 2020/8xxx/CVE-2020-8908.json | 6 +-- 2021/22xxx/CVE-2021-22174.json | 4 +- 2021/22xxx/CVE-2021-22191.json | 4 +- 2021/22xxx/CVE-2021-22883.json | 8 ++-- 2021/22xxx/CVE-2021-22884.json | 8 ++-- 2021/23xxx/CVE-2021-23336.json | 14 ++++--- 2021/23xxx/CVE-2021-23839.json | 8 ++-- 2021/23xxx/CVE-2021-23840.json | 28 +++++++------ 2021/23xxx/CVE-2021-23841.json | 74 +++++++++++++++++----------------- 2021/26xxx/CVE-2021-26117.json | 14 ++++--- 2021/34xxx/CVE-2021-34369.json | 5 +++ 2021/34xxx/CVE-2021-34370.json | 5 +++ 2021/3xxx/CVE-2021-3449.json | 52 ++++++++++++------------ 2021/3xxx/CVE-2021-3450.json | 68 ++++++++++++++++--------------- 16 files changed, 175 insertions(+), 133 deletions(-) diff --git a/2018/15xxx/CVE-2018-15139.json b/2018/15xxx/CVE-2018-15139.json index f6826b2c418..533844598a8 100644 --- a/2018/15xxx/CVE-2018-15139.json +++ b/2018/15xxx/CVE-2018-15139.json @@ -61,6 +61,11 @@ "name": "https://github.com/openemr/openemr/pull/1757/commits/c2808a0493243f618bbbb3459af23c7da3dc5485", "refsource": "CONFIRM", "url": "https://github.com/openemr/openemr/pull/1757/commits/c2808a0493243f618bbbb3459af23c7da3dc5485" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html", + "url": "http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html" } ] } diff --git a/2020/11xxx/CVE-2020-11060.json b/2020/11xxx/CVE-2020-11060.json index c511df38f79..dcf0f657679 100644 --- a/2020/11xxx/CVE-2020-11060.json +++ b/2020/11xxx/CVE-2020-11060.json @@ -78,6 +78,11 @@ "name": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8908.json b/2020/8xxx/CVE-2020-8908.json index 2125665057f..e4f4ea0bb17 100644 --- a/2020/8xxx/CVE-2020-8908.json +++ b/2020/8xxx/CVE-2020-8908.json @@ -148,9 +148,9 @@ "url": "https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", - "refsource": "MISC", - "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "refsource": "MLIST", + "name": "[drill-dev] 20210614 [GitHub] [drill] ssainz opened a new issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1", + "url": "https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E" } ] }, diff --git a/2021/22xxx/CVE-2021-22174.json b/2021/22xxx/CVE-2021-22174.json index 21bd5e12b35..256517bba25 100644 --- a/2021/22xxx/CVE-2021-22174.json +++ b/2021/22xxx/CVE-2021-22174.json @@ -70,7 +70,9 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22191.json b/2021/22xxx/CVE-2021-22191.json index 9ae2bc83511..ef639f28f26 100644 --- a/2021/22xxx/CVE-2021-22191.json +++ b/2021/22xxx/CVE-2021-22191.json @@ -63,7 +63,9 @@ "refsource": "CONFIRM" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22883.json b/2021/22xxx/CVE-2021-22883.json index 7cd6f0f5ecf..5f2aacdf8b3 100644 --- a/2021/22xxx/CVE-2021-22883.json +++ b/2021/22xxx/CVE-2021-22883.json @@ -69,13 +69,15 @@ "name": "FEDORA-2021-6aaba80ba2", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json index 7fc9186061c..97d1dcbf28d 100644 --- a/2021/22xxx/CVE-2021-22884.json +++ b/2021/22xxx/CVE-2021-22884.json @@ -74,13 +74,15 @@ "name": "FEDORA-2021-6aaba80ba2", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index c8d117dc060..34de71cb03e 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -185,11 +185,6 @@ "name": "FEDORA-2021-e525e48886", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210326-0004/", - "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update", @@ -236,7 +231,14 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210326-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210326-0004/" } ] }, diff --git a/2021/23xxx/CVE-2021-23839.json b/2021/23xxx/CVE-2021-23839.json index 1bf587d2584..f40d89788dc 100644 --- a/2021/23xxx/CVE-2021-23839.json +++ b/2021/23xxx/CVE-2021-23839.json @@ -77,13 +77,15 @@ "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" - }, - { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2021/23xxx/CVE-2021-23840.json b/2021/23xxx/CVE-2021-23840.json index 2dcaa7cbf72..9e2f4ade174 100644 --- a/2021/23xxx/CVE-2021-23840.json +++ b/2021/23xxx/CVE-2021-23840.json @@ -90,21 +90,21 @@ "name": "DSA-4855", "url": "https://www.debian.org/security/2021/dsa-4855" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", - "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" - }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-03", - "url": "https://www.tenable.com/security/tns-2021-03" - }, { "refsource": "GENTOO", "name": "GLSA-202103-03", "url": "https://security.gentoo.org/glsa/202103-03" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-10", + "url": "https://www.tenable.com/security/tns-2021-10" + }, { "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-09", @@ -112,11 +112,13 @@ }, { "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-10", - "url": "https://www.tenable.com/security/tns-2021-10" + "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-03", + "url": "https://www.tenable.com/security/tns-2021-03" } ] } diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json index 55287fca547..38bd4615d24 100644 --- a/2021/23xxx/CVE-2021-23841.json +++ b/2021/23xxx/CVE-2021-23841.json @@ -90,46 +90,11 @@ "name": "DSA-4855", "url": "https://www.debian.org/security/2021/dsa-4855" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", - "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" - }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-03", - "url": "https://www.tenable.com/security/tns-2021-03" - }, { "refsource": "GENTOO", "name": "GLSA-202103-03", "url": "https://security.gentoo.org/glsa/202103-03" }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-09", - "url": "https://www.tenable.com/security/tns-2021-09" - }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210513-0002/", - "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" - }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212529", - "url": "https://support.apple.com/kb/HT212529" - }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212528", - "url": "https://support.apple.com/kb/HT212528" - }, - { - "refsource": "CONFIRM", - "name": "https://support.apple.com/kb/HT212534", - "url": "https://support.apple.com/kb/HT212534" - }, { "refsource": "FULLDISC", "name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4", @@ -146,7 +111,44 @@ "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-09", + "url": "https://www.tenable.com/security/tns-2021-09" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210513-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", + "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-03", + "url": "https://www.tenable.com/security/tns-2021-03" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212528", + "url": "https://support.apple.com/kb/HT212528" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212534", + "url": "https://support.apple.com/kb/HT212534" } ] } diff --git a/2021/26xxx/CVE-2021-26117.json b/2021/26xxx/CVE-2021-26117.json index c0b3b7b2ee9..141c5771591 100644 --- a/2021/26xxx/CVE-2021-26117.json +++ b/2021/26xxx/CVE-2021-26117.json @@ -95,11 +95,6 @@ "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210304-0008/", - "url": "https://security.netapp.com/advisory/ntap-20210304-0008/" - }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update", @@ -161,7 +156,14 @@ "url": "https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210304-0008/", + "url": "https://security.netapp.com/advisory/ntap-20210304-0008/" } ] }, diff --git a/2021/34xxx/CVE-2021-34369.json b/2021/34xxx/CVE-2021-34369.json index 53f8000228b..203edf8d30d 100644 --- a/2021/34xxx/CVE-2021-34369.json +++ b/2021/34xxx/CVE-2021-34369.json @@ -56,6 +56,11 @@ "url": "https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7", "refsource": "MISC", "name": "https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html", + "url": "http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html" } ] } diff --git a/2021/34xxx/CVE-2021-34370.json b/2021/34xxx/CVE-2021-34370.json index 11a99c09d2b..b0667abeba3 100644 --- a/2021/34xxx/CVE-2021-34370.json +++ b/2021/34xxx/CVE-2021-34370.json @@ -56,6 +56,11 @@ "url": "https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8", "refsource": "MISC", "name": "https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html", + "url": "http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html" } ] } diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json index ddb2870ed1a..3d4bd75eb51 100644 --- a/2021/3xxx/CVE-2021-3449.json +++ b/2021/3xxx/CVE-2021-3449.json @@ -87,16 +87,6 @@ "name": "DSA-4875", "url": "https://www.debian.org/security/2021/dsa-4875" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210326-0006/", - "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" - }, - { - "refsource": "MISC", - "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", - "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" - }, { "refsource": "MLIST", "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing", @@ -122,25 +112,20 @@ "name": "GLSA-202103-03", "url": "https://security.gentoo.org/glsa/202103-03" }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-06", - "url": "https://www.tenable.com/security/tns-2021-06" - }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-05", - "url": "https://www.tenable.com/security/tns-2021-05" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-cbf14ab8f9", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, { "refsource": "CONFIRM", - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" + "name": "https://www.tenable.com/security/tns-2021-10", + "url": "https://www.tenable.com/security/tns-2021-10" }, { "refsource": "CONFIRM", @@ -154,11 +139,28 @@ }, { "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-10", - "url": "https://www.tenable.com/security/tns-2021-10" + "name": "https://security.netapp.com/advisory/ntap-20210326-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-06", + "url": "https://www.tenable.com/security/tns-2021-06" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-05", + "url": "https://www.tenable.com/security/tns-2021-05" + }, + { + "refsource": "CONFIRM", + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" } ] } diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json index be7d6efc8ae..d0fbe16c586 100644 --- a/2021/3xxx/CVE-2021-3450.json +++ b/2021/3xxx/CVE-2021-3450.json @@ -72,31 +72,21 @@ "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, - { - "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b", - "refsource": "CONFIRM", - "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" - }, { "name": "https://www.openssl.org/news/secadv/20210325.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, + { + "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b", + "refsource": "CONFIRM", + "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" + }, { "refsource": "CISCO", "name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, - { - "refsource": "CONFIRM", - "name": "https://security.netapp.com/advisory/ntap-20210326-0006/", - "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" - }, - { - "refsource": "MISC", - "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", - "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" - }, { "refsource": "MLIST", "name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing", @@ -122,30 +112,15 @@ "name": "GLSA-202103-03", "url": "https://security.gentoo.org/glsa/202103-03" }, - { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-05", - "url": "https://www.tenable.com/security/tns-2021-05" - }, { "refsource": "FEDORA", "name": "FEDORA-2021-cbf14ab8f9", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { - "refsource": "CONFIRM", - "name": "https://www.tenable.com/security/tns-2021-08", - "url": "https://www.tenable.com/security/tns-2021-08" - }, - { - "refsource": "CONFIRM", - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" - }, - { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", - "name": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html", - "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" + "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "refsource": "CONFIRM", @@ -153,7 +128,34 @@ "url": "https://www.tenable.com/security/tns-2021-09" }, { - "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210326-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" + }, + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-05", + "url": "https://www.tenable.com/security/tns-2021-05" + }, + { + "refsource": "CONFIRM", + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tenable.com/security/tns-2021-08", + "url": "https://www.tenable.com/security/tns-2021-08" + }, + { + "refsource": "MISC", + "name": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html", + "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" } ] }