diff --git a/2020/26xxx/CVE-2020-26217.json b/2020/26xxx/CVE-2020-26217.json index 9f31d37cf90..f411f6280e7 100644 --- a/2020/26xxx/CVE-2020-26217.json +++ b/2020/26xxx/CVE-2020-26217.json @@ -108,6 +108,11 @@ "refsource": "MLIST", "name": "[activemq-issues] 20210104 [jira] [Resolved] (AMQ-8107) Does ActiveMQ use the affected functionality within Xstream libraries for CVE-2020-26217", "url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0004/" } ] }, diff --git a/2020/26xxx/CVE-2020-26258.json b/2020/26xxx/CVE-2020-26258.json index 3698105ade3..9ba30dac779 100644 --- a/2020/26xxx/CVE-2020-26258.json +++ b/2020/26xxx/CVE-2020-26258.json @@ -93,6 +93,11 @@ "refsource": "DEBIAN", "name": "DSA-4828", "url": "https://www.debian.org/security/2021/dsa-4828" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" } ] }, diff --git a/2020/26xxx/CVE-2020-26259.json b/2020/26xxx/CVE-2020-26259.json index ffd7aff71b9..1d5ab12379a 100644 --- a/2020/26xxx/CVE-2020-26259.json +++ b/2020/26xxx/CVE-2020-26259.json @@ -93,6 +93,11 @@ "refsource": "DEBIAN", "name": "DSA-4828", "url": "https://www.debian.org/security/2021/dsa-4828" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" } ] }, diff --git a/2020/4xxx/CVE-2020-4976.json b/2020/4xxx/CVE-2020-4976.json index 7ada345dc4d..e5d2ea2ed91 100644 --- a/2020/4xxx/CVE-2020-4976.json +++ b/2020/4xxx/CVE-2020-4976.json @@ -19,6 +19,11 @@ "title": "X-Force Vulnerability Report", "name": "ibm-db2-cve20204976-file-write (192469)", "refsource": "XF" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0003/" } ] }, diff --git a/2020/5xxx/CVE-2020-5024.json b/2020/5xxx/CVE-2020-5024.json index 8d475220903..cc25af83608 100644 --- a/2020/5xxx/CVE-2020-5024.json +++ b/2020/5xxx/CVE-2020-5024.json @@ -25,6 +25,11 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193660", "refsource": "XF", "name": "ibm-db2-cve20205024-dos (193660)" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0003/" } ] }, diff --git a/2020/5xxx/CVE-2020-5025.json b/2020/5xxx/CVE-2020-5025.json index b6cceaf347e..abf5183db58 100644 --- a/2020/5xxx/CVE-2020-5025.json +++ b/2020/5xxx/CVE-2020-5025.json @@ -12,6 +12,11 @@ "name": "ibm-db2-cve20205025-bo (193661)", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193661" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0003/" } ] }, diff --git a/2021/20xxx/CVE-2021-20268.json b/2021/20xxx/CVE-2021-20268.json index 1a7a753302b..479c87ae232 100644 --- a/2021/20xxx/CVE-2021-20268.json +++ b/2021/20xxx/CVE-2021-20268.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444", "url": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0006/" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index f7c26a9658e..e0f245935f2 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -118,6 +118,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0002/" } ] }, diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index 62dfd8fb58f..db887591dff 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -119,6 +119,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0002/" } ] }, diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json index abe5f3fcac5..3076eee108e 100644 --- a/2021/27xxx/CVE-2021-27363.json +++ b/2021/27xxx/CVE-2021-27363.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" } ] } diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json index fe54e7deade..2a47256604b 100644 --- a/2021/27xxx/CVE-2021-27364.json +++ b/2021/27xxx/CVE-2021-27364.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" } ] } diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json index b85fe3d3d8e..006357fdec0 100644 --- a/2021/27xxx/CVE-2021-27365.json +++ b/2021/27xxx/CVE-2021-27365.json @@ -91,6 +91,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" } ] } diff --git a/2021/28xxx/CVE-2021-28038.json b/2021/28xxx/CVE-2021-28038.json index 53823ca4033..a5541e8124f 100644 --- a/2021/28xxx/CVE-2021-28038.json +++ b/2021/28xxx/CVE-2021-28038.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" } ] } diff --git a/2021/28xxx/CVE-2021-28039.json b/2021/28xxx/CVE-2021-28039.json index 329c3c7402c..35bdbda20ab 100644 --- a/2021/28xxx/CVE-2021-28039.json +++ b/2021/28xxx/CVE-2021-28039.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages", "url": "http://www.openwall.com/lists/oss-security/2021/03/05/2" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210409-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" } ] } diff --git a/2021/3xxx/CVE-2021-3488.json b/2021/3xxx/CVE-2021-3488.json new file mode 100644 index 00000000000..5e7708bf4b7 --- /dev/null +++ b/2021/3xxx/CVE-2021-3488.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3488", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file