mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8faf1b8b32
commit
efe424c745
@ -326,6 +326,21 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
|
"name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
|
||||||
"url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
|
"url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[flink-dev] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||||
|
"url": "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[flink-issues] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||||
|
"url": "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[flink-issues] 20210721 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||||
|
"url": "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -60,7 +60,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -95,7 +95,9 @@
|
|||||||
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
|
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -250,7 +250,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -95,7 +95,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -44,11 +44,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
|
|
||||||
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"name": "FEDORA-2020-f80e5c0d65",
|
"name": "FEDORA-2020-f80e5c0d65",
|
||||||
@ -60,7 +55,14 @@
|
|||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
|
||||||
|
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -393,7 +393,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -103,7 +103,9 @@
|
|||||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -168,7 +168,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -175,7 +175,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -100,7 +100,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -93,7 +93,9 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/202101-29"
|
"url": "https://security.gentoo.org/glsa/202101-29"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -118,7 +118,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -44,36 +44,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackerone.com/reports/746733",
|
|
||||||
"url": "https://hackerone.com/reports/746733"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
|
||||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"name": "RHSA-2020:0573",
|
"name": "RHSA-2020:0573",
|
||||||
@ -109,18 +79,50 @@
|
|||||||
"name": "GLSA-202003-48",
|
"name": "GLSA-202003-48",
|
||||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"name": "DSA-4669",
|
"name": "DSA-4669",
|
||||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://hackerone.com/reports/746733",
|
||||||
|
"url": "https://hackerone.com/reports/746733"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||||
|
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -44,46 +44,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackerone.com/reports/735748",
|
|
||||||
"url": "https://hackerone.com/reports/735748"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"name": "FEDORA-2020-3838c8ea98",
|
"name": "FEDORA-2020-3838c8ea98",
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
|
||||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"name": "FEDORA-2020-47efc31973",
|
"name": "FEDORA-2020-47efc31973",
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"name": "RHSA-2020:0573",
|
"name": "RHSA-2020:0573",
|
||||||
@ -134,18 +104,50 @@
|
|||||||
"name": "GLSA-202003-48",
|
"name": "GLSA-202003-48",
|
||||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"name": "DSA-4669",
|
"name": "DSA-4669",
|
||||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||||
|
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://hackerone.com/reports/735748",
|
||||||
|
"url": "https://hackerone.com/reports/735748"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -44,36 +44,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://hackerone.com/reports/730779",
|
|
||||||
"url": "https://hackerone.com/reports/730779"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
|
||||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
|
||||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "CONFIRM",
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"name": "RHSA-2020:0573",
|
"name": "RHSA-2020:0573",
|
||||||
@ -109,18 +79,50 @@
|
|||||||
"name": "GLSA-202003-48",
|
"name": "GLSA-202003-48",
|
||||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"name": "DSA-4669",
|
"name": "DSA-4669",
|
||||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||||
|
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||||
|
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://hackerone.com/reports/730779",
|
||||||
|
"url": "https://hackerone.com/reports/730779"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -193,7 +193,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -183,7 +183,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -113,7 +113,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -143,7 +143,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -138,7 +138,9 @@
|
|||||||
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
|
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update",
|
"name": "[debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update",
|
||||||
@ -83,7 +73,19 @@
|
|||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -70,7 +70,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -213,7 +213,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -87,7 +87,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -82,7 +82,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -82,7 +82,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,7 +78,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -55,7 +55,9 @@
|
|||||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -60,7 +60,9 @@
|
|||||||
"url": "https://github.com/opencv/opencv/issues/15857"
|
"url": "https://github.com/opencv/opencv/issues/15857"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -133,7 +133,9 @@
|
|||||||
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
|
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -103,7 +103,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -128,7 +128,9 @@
|
|||||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -66,6 +66,11 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"name": "DSA-4941",
|
||||||
|
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. This flaw allows a malicious guest to send a length field that is inconsistent with the actual length of the input, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. This flaw allows a malicious guest to send a length field that is inconsistent with the actual length of the input, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn't release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn't release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel mode driver (nvidia.ko), in which a pointer to a user-space buffer is not validated before it is dereferenced, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel mode driver (nvidia.ko), in which a pointer to a user-space buffer is not validated before it is dereferenced, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can lead to floating point exceptions, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can lead to floating point exceptions, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -68,6 +68,11 @@
|
|||||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2021/07/21/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -48,24 +48,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
|
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439",
|
||||||
|
"name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
|
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0",
|
||||||
|
"name": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/pires/go-proxyproto/issues/65"
|
"url": "https://github.com/pires/go-proxyproto/issues/65",
|
||||||
|
"name": "https://github.com/pires/go-proxyproto/issues/65"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/pires/go-proxyproto/pull/74"
|
"url": "https://github.com/pires/go-proxyproto/pull/74",
|
||||||
|
"name": "https://github.com/pires/go-proxyproto/pull/74"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
|
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346",
|
||||||
|
"name": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -73,7 +78,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.\n"
|
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -81,6 +81,11 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"name": "DSA-4941",
|
||||||
|
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -71,6 +71,11 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"name": "GLSA-202107-48",
|
"name": "GLSA-202107-48",
|
||||||
"url": "https://security.gentoo.org/glsa/202107-48"
|
"url": "https://security.gentoo.org/glsa/202107-48"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"name": "DSA-4942",
|
||||||
|
"url": "https://www.debian.org/security/2021/dsa-4942"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -76,6 +76,11 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"name": "DSA-4941",
|
||||||
|
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://vuln.ryotak.me/advisories/55",
|
"name": "https://vuln.ryotak.me/advisories/55",
|
||||||
"url": "https://vuln.ryotak.me/advisories/55"
|
"url": "https://vuln.ryotak.me/advisories/55"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "JVN",
|
||||||
|
"name": "JVN#53278122",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN53278122/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
18
2021/37xxx/CVE-2021-37143.json
Normal file
18
2021/37xxx/CVE-2021-37143.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37143",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37144.json
Normal file
18
2021/37xxx/CVE-2021-37144.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37144",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37145.json
Normal file
18
2021/37xxx/CVE-2021-37145.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37145",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37146.json
Normal file
18
2021/37xxx/CVE-2021-37146.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37146",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37147.json
Normal file
18
2021/37xxx/CVE-2021-37147.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37147",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37148.json
Normal file
18
2021/37xxx/CVE-2021-37148.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37148",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37149.json
Normal file
18
2021/37xxx/CVE-2021-37149.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37149",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2021/37xxx/CVE-2021-37150.json
Normal file
18
2021/37xxx/CVE-2021-37150.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-37150",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -53,6 +53,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
|
"name": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
|
||||||
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
|
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"name": "FEDORA-2021-a95108d156",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
18
2021/3xxx/CVE-2021-3656.json
Normal file
18
2021/3xxx/CVE-2021-3656.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-3656",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user