"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-21 15:02:04 +00:00
parent 8faf1b8b32
commit efe424c745
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
57 changed files with 451 additions and 170 deletions

View File

@ -326,6 +326,21 @@
"refsource": "MLIST",
"name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
"url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-dev] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-issues] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-issues] 20210721 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E"
}
]
}

View File

@ -60,7 +60,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -250,7 +250,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -44,11 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-f80e5c0d65",
@ -60,7 +55,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
}
]
},

View File

@ -393,7 +393,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -103,7 +103,9 @@
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -168,7 +168,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -175,7 +175,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -100,7 +100,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -93,7 +93,9 @@
"url": "https://security.gentoo.org/glsa/202101-29"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -118,7 +118,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -44,36 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/746733",
"url": "https://hackerone.com/reports/746733"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -109,18 +79,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/746733",
"url": "https://hackerone.com/reports/746733"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
}
]
},

View File

@ -44,46 +44,16 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/735748",
"url": "https://hackerone.com/reports/735748"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-3838c8ea98",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-47efc31973",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -134,18 +104,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/735748",
"url": "https://hackerone.com/reports/735748"
}
]
},

View File

@ -44,36 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/730779",
"url": "https://hackerone.com/reports/730779"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -109,18 +79,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/730779",
"url": "https://hackerone.com/reports/730779"
}
]
},

View File

@ -193,7 +193,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -183,7 +183,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -113,7 +113,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -143,7 +143,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -138,7 +138,9 @@
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
"refsource": "MISC",
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update",
@ -83,7 +73,19 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
"refsource": "MISC",
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
}
]
}

View File

@ -70,7 +70,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -213,7 +213,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -87,7 +87,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -82,7 +82,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -82,7 +82,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -78,7 +78,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -55,7 +55,9 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -60,7 +60,9 @@
"url": "https://github.com/opencv/opencv/issues/15857"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -133,7 +133,9 @@
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -103,7 +103,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -128,7 +128,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. This flaw allows a malicious guest to send a length field that is inconsistent with the actual length of the input, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. This flaw allows a malicious guest to send a length field that is inconsistent with the actual length of the input, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn't release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it doesn't release some resources during driver unload requests from guests. This flaw allows a malicious guest to perform operations by reusing those resources, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel mode driver (nvidia.ko), in which a pointer to a user-space buffer is not validated before it is dereferenced, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel mode driver (nvidia.ko), in which a pointer to a user-space buffer is not validated before it is dereferenced, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can lead to floating point exceptions, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can lead to floating point exceptions, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
"value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8)."
}
]
},

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again",
"url": "http://www.openwall.com/lists/oss-security/2021/07/21/4"
}
]
},

View File

@ -48,24 +48,29 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439",
"name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0",
"name": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/issues/65"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/issues/65",
"name": "https://github.com/pires/go-proxyproto/issues/65"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/pull/74"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/pull/74",
"name": "https://github.com/pires/go-proxyproto/pull/74"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346",
"name": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
}
]
},
@ -73,7 +78,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.\n"
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header."
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "GENTOO",
"name": "GLSA-202107-48",
"url": "https://security.gentoo.org/glsa/202107-48"
},
{
"refsource": "DEBIAN",
"name": "DSA-4942",
"url": "https://www.debian.org/security/2021/dsa-4942"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://vuln.ryotak.me/advisories/55",
"url": "https://vuln.ryotak.me/advisories/55"
},
{
"refsource": "JVN",
"name": "JVN#53278122",
"url": "http://jvn.jp/en/jp/JVN53278122/index.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37143",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37144",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37145",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37146",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37147",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37148",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37149",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37150",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-a95108d156",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3656",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}