Oracle Critical Patch Updates 3rd party CVEs part 1

Committer: Bill Situ <bill.situ@oracle.com>

 On branch cna/Oracle/CPU2022Apr3rdPart1
 Changes to be committed:
	modified:   2012/5xxx/CVE-2012-5351.json
	modified:   2013/4xxx/CVE-2013-4002.json
	modified:   2014/0xxx/CVE-2014-0097.json
	modified:   2016/10xxx/CVE-2016-10228.json
	modified:   2017/1000xxx/CVE-2017-1000353.json
	modified:   2017/14xxx/CVE-2017-14159.json
	modified:   2017/17xxx/CVE-2017-17740.json
	modified:   2017/9xxx/CVE-2017-9287.json
	modified:   2018/1000xxx/CVE-2018-1000067.json
	modified:   2018/1000xxx/CVE-2018-1000068.json
	modified:   2018/1000xxx/CVE-2018-1000192.json
	modified:   2018/1000xxx/CVE-2018-1000193.json
	modified:   2018/1000xxx/CVE-2018-1000194.json
	modified:   2018/1000xxx/CVE-2018-1000195.json
	modified:   2018/11xxx/CVE-2018-11212.json
	modified:   2018/1999xxx/CVE-2018-1999001.json
	modified:   2018/1999xxx/CVE-2018-1999002.json
	modified:   2018/1999xxx/CVE-2018-1999003.json
	modified:   2018/1999xxx/CVE-2018-1999004.json
	modified:   2018/1999xxx/CVE-2018-1999005.json
	modified:   2018/1999xxx/CVE-2018-1999007.json
	modified:   2018/1xxx/CVE-2018-1285.json
	modified:   2018/6xxx/CVE-2018-6356.json
	modified:   2018/8xxx/CVE-2018-8032.json
	modified:   2019/0xxx/CVE-2019-0227.json
	modified:   2019/1003xxx/CVE-2019-1003049.json
	modified:   2019/1003xxx/CVE-2019-1003050.json
	modified:   2019/10xxx/CVE-2019-10086.json
	modified:   2019/10xxx/CVE-2019-10247.json
	modified:   2019/10xxx/CVE-2019-10383.json
	modified:   2019/10xxx/CVE-2019-10384.json
	modified:   2019/12xxx/CVE-2019-12086.json
	modified:   2019/12xxx/CVE-2019-12399.json
	modified:   2019/12xxx/CVE-2019-12402.json
	modified:   2019/13xxx/CVE-2019-13038.json
	modified:   2019/13xxx/CVE-2019-13057.json
	modified:   2019/13xxx/CVE-2019-13565.json
	modified:   2019/14xxx/CVE-2019-14822.json
	modified:   2019/14xxx/CVE-2019-14862.json
	modified:   2019/16xxx/CVE-2019-16785.json
	modified:   2019/16xxx/CVE-2019-16786.json
	modified:   2019/16xxx/CVE-2019-16789.json
	modified:   2019/16xxx/CVE-2019-16792.json
	modified:   2019/17xxx/CVE-2019-17195.json
	modified:   2019/17xxx/CVE-2019-17571.json
	modified:   2019/18xxx/CVE-2019-18276.json
	modified:   2019/20xxx/CVE-2019-20388.json
	modified:   2019/20xxx/CVE-2019-20916.json
	modified:   2019/25xxx/CVE-2019-25013.json
	modified:   2019/3xxx/CVE-2019-3738.json
	modified:   2019/3xxx/CVE-2019-3739.json
	modified:   2019/3xxx/CVE-2019-3740.json
	modified:   2019/3xxx/CVE-2019-3799.json
	modified:   2019/9xxx/CVE-2019-9169.json
	modified:   2020/10xxx/CVE-2020-10531.json
	modified:   2020/10xxx/CVE-2020-10543.json
	modified:   2020/10xxx/CVE-2020-10693.json
	modified:   2020/10xxx/CVE-2020-10878.json
	modified:   2020/11xxx/CVE-2020-11022.json
	modified:   2020/11xxx/CVE-2020-11023.json
	modified:   2020/11xxx/CVE-2020-11080.json
	modified:   2020/11xxx/CVE-2020-11612.json
	modified:   2020/11xxx/CVE-2020-11971.json
	modified:   2020/11xxx/CVE-2020-11979.json
	modified:   2020/12xxx/CVE-2020-12243.json
	modified:   2020/12xxx/CVE-2020-12723.json
	modified:   2020/13xxx/CVE-2020-13434.json
	modified:   2020/13xxx/CVE-2020-13543.json
	modified:   2020/13xxx/CVE-2020-13935.json
	modified:   2020/13xxx/CVE-2020-13936.json
	modified:   2020/13xxx/CVE-2020-13954.json
	modified:   2020/13xxx/CVE-2020-13956.json
	modified:   2020/14xxx/CVE-2020-14155.json
	modified:   2020/14xxx/CVE-2020-14340.json
	modified:   2020/14xxx/CVE-2020-14343.json
	modified:   2020/15xxx/CVE-2020-15250.json
	modified:   2020/15xxx/CVE-2020-15358.json
	modified:   2020/15xxx/CVE-2020-15719.json
	modified:   2020/16xxx/CVE-2020-16135.json
	modified:   2020/17xxx/CVE-2020-17521.json
	modified:   2020/17xxx/CVE-2020-17527.json
	modified:   2020/17xxx/CVE-2020-17530.json
	modified:   2020/1xxx/CVE-2020-1968.json
	modified:   2020/1xxx/CVE-2020-1971.json
	modified:   2020/24xxx/CVE-2020-24616.json
	modified:   2020/24xxx/CVE-2020-24750.json
	modified:   2020/24xxx/CVE-2020-24977.json
	modified:   2020/25xxx/CVE-2020-25638.json
	modified:   2020/25xxx/CVE-2020-25648.json
	modified:   2020/25xxx/CVE-2020-25649.json
	modified:   2020/25xxx/CVE-2020-25659.json
	modified:   2020/26xxx/CVE-2020-26217.json
	modified:   2020/27xxx/CVE-2020-27218.json
	modified:   2020/27xxx/CVE-2020-27618.json
	modified:   2020/28xxx/CVE-2020-28052.json
	modified:   2020/28xxx/CVE-2020-28196.json
	modified:   2020/28xxx/CVE-2020-28895.json
	modified:   2020/29xxx/CVE-2020-29363.json
	modified:   2020/29xxx/CVE-2020-29582.json
	modified:   2020/35xxx/CVE-2020-35198.json
	modified:   2020/35xxx/CVE-2020-35490.json
	modified:   2020/35xxx/CVE-2020-35491.json
	modified:   2020/35xxx/CVE-2020-35728.json
	modified:   2020/36xxx/CVE-2020-36179.json
	modified:   2020/36xxx/CVE-2020-36180.json
	modified:   2020/36xxx/CVE-2020-36181.json
	modified:   2020/36xxx/CVE-2020-36182.json
	modified:   2020/36xxx/CVE-2020-36183.json
	modified:   2020/36xxx/CVE-2020-36184.json
	modified:   2020/36xxx/CVE-2020-36185.json
	modified:   2020/36xxx/CVE-2020-36186.json
	modified:   2020/36xxx/CVE-2020-36187.json
	modified:   2020/36xxx/CVE-2020-36188.json
	modified:   2020/36xxx/CVE-2020-36189.json
	modified:   2020/36xxx/CVE-2020-36242.json
	modified:   2020/36xxx/CVE-2020-36518.json
	modified:   2020/5xxx/CVE-2020-5245.json
	modified:   2020/5xxx/CVE-2020-5413.json
	modified:   2020/5xxx/CVE-2020-5421.json
	modified:   2020/6xxx/CVE-2020-6950.json
	modified:   2020/7xxx/CVE-2020-7226.json
	modified:   2020/7xxx/CVE-2020-7595.json
	modified:   2020/7xxx/CVE-2020-7760.json
	modified:   2020/8xxx/CVE-2020-8172.json
	modified:   2020/8xxx/CVE-2020-8174.json
	modified:   2020/8xxx/CVE-2020-8203.json
	modified:   2020/8xxx/CVE-2020-8231.json
	modified:   2020/8xxx/CVE-2020-8277.json
	modified:   2020/8xxx/CVE-2020-8284.json
	modified:   2020/8xxx/CVE-2020-8285.json
	modified:   2020/8xxx/CVE-2020-8286.json
	modified:   2020/8xxx/CVE-2020-8554.json
	modified:   2020/8xxx/CVE-2020-8908.json
	modified:   2020/9xxx/CVE-2020-9488.json
	modified:   2021/20xxx/CVE-2021-20289.json
	modified:   2021/21xxx/CVE-2021-21275.json
	modified:   2021/21xxx/CVE-2021-21290.json
	modified:   2021/21xxx/CVE-2021-21295.json
	modified:   2021/21xxx/CVE-2021-21409.json
	modified:   2021/21xxx/CVE-2021-21703.json
	modified:   2021/22xxx/CVE-2021-22060.json
	modified:   2021/22xxx/CVE-2021-22096.json
	modified:   2021/22xxx/CVE-2021-22118.json
	modified:   2021/22xxx/CVE-2021-22132.json
	modified:   2021/22xxx/CVE-2021-22134.json
	modified:   2021/22xxx/CVE-2021-22144.json
	modified:   2021/22xxx/CVE-2021-22145.json
	modified:   2021/22xxx/CVE-2021-22569.json
	modified:   2021/22xxx/CVE-2021-22570.json
	modified:   2021/22xxx/CVE-2021-22696.json
This commit is contained in:
BSITU 2022-04-19 16:10:05 -07:00
parent 4dadf09b79
commit fdeba26796
150 changed files with 450 additions and 0 deletions

View File

@ -61,6 +61,9 @@
"name": "apache-axis2-saml-sec-bypass(79487)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79487"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -291,6 +291,9 @@
"refsource": "MLIST",
"name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
"url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://pivotal.io/security/cve-2014-0097",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2014-0097"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -86,6 +86,9 @@
"refsource": "MLIST",
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -73,6 +73,9 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -56,6 +56,9 @@
"name": "http://www.openldap.org/its/index.cgi?findid=8703",
"refsource": "MISC",
"url": "http://www.openldap.org/its/index.cgi?findid=8703"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -71,6 +71,9 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -86,6 +86,9 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -58,6 +58,9 @@
"name": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-506",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-506"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -63,6 +63,9 @@
"name": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-717",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-717"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-771",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-771"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-786",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-786"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-794",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-794"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -151,6 +151,9 @@
"refsource": "MISC",
"name": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git",
"url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -64,6 +64,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-891",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-891"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -59,6 +59,9 @@
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -118,6 +118,9 @@
"refsource": "MLIST",
"name": "[logging-dev] 20210817 Solution for vulnerability",
"url": "https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -66,6 +66,9 @@
"name": "https://jenkins.io/security/advisory/2018-02-14/",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-02-14/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -112,6 +112,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211117 [SECURITY] [DLA 2821-1] axis security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -93,6 +93,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -66,6 +66,9 @@
"url": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -66,6 +66,9 @@
"url": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -308,6 +308,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -153,6 +153,9 @@
"refsource": "DEBIAN",
"name": "DSA-4949",
"url": "https://www.debian.org/security/2021/dsa-4949"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -71,6 +71,9 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3144",
"url": "https://access.redhat.com/errata/RHSA-2019:3144"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -71,6 +71,9 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3144",
"url": "https://access.redhat.com/errata/RHSA-2019:3144"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -251,6 +251,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -176,6 +176,9 @@
"refsource": "MLIST",
"name": "[kafka-commits] 20210921 [kafka-site] branch asf-site updated: Add CVE-2021-38153 (#375)",
"url": "https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -183,6 +183,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -71,6 +71,9 @@
"refsource": "UBUNTU",
"name": "USN-4291-1",
"url": "https://usn.ubuntu.com/4291-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -116,6 +116,9 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -126,6 +126,9 @@
"refsource": "MLIST",
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -58,6 +58,9 @@
"refsource": "MISC",
"name": "https://usn.ubuntu.com/4134-3/",
"url": "https://usn.ubuntu.com/4134-3/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -63,6 +63,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -100,6 +100,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0720",
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -100,6 +100,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0720",
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -100,6 +100,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0720",
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -85,6 +85,9 @@
"name": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65",
"refsource": "MISC",
"url": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -126,6 +126,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -598,6 +598,9 @@
"refsource": "MLIST",
"name": "[bookkeeper-issues] 20211018 [GitHub] [bookkeeper] RaulGracia commented on pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571",
"url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -81,6 +81,9 @@
"refsource": "GENTOO",
"name": "GLSA-202105-34",
"url": "https://security.gentoo.org/glsa/202105-34"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -101,6 +101,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -81,6 +81,9 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1613",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -126,6 +126,9 @@
"refsource": "GENTOO",
"name": "GLSA-202107-07",
"url": "https://security.gentoo.org/glsa/202107-07"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -95,6 +95,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -90,6 +90,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -90,6 +90,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -73,6 +73,9 @@
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2019-3799",
"name": "https://pivotal.io/security/cve-2019-3799"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -101,6 +101,9 @@
"refsource": "UBUNTU",
"name": "USN-4416-1",
"url": "https://usn.ubuntu.com/4416-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -136,6 +136,9 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -116,6 +116,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -63,6 +63,9 @@
"refsource": "MLIST",
"name": "[portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219",
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -121,6 +121,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -268,6 +268,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -378,6 +378,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -128,6 +128,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -271,6 +271,9 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -113,6 +113,9 @@
"refsource": "MLIST",
"name": "[activemq-users] 20210831 RE: Security issues",
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -149,6 +149,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -106,6 +106,9 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211289",
"url": "https://support.apple.com/kb/HT211289"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -126,6 +126,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -156,6 +156,9 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211935",
"url": "https://support.apple.com/kb/HT211935"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -53,6 +53,9 @@
"refsource": "GENTOO",
"name": "GLSA-202012-10",
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -123,6 +123,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -179,6 +179,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -137,6 +137,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -353,6 +353,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220210-0002/",
"url": "https://security.netapp.com/advisory/ntap-20220210-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -91,6 +91,9 @@
"refsource": "MLIST",
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -53,6 +53,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -48,6 +48,9 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -258,6 +258,9 @@
"refsource": "MLIST",
"name": "[knox-dev] 20211008 [GitHub] [knox] smolnar82 merged pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250",
"url": "https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -156,6 +156,9 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -81,6 +81,9 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -91,6 +91,9 @@
"refsource": "GENTOO",
"name": "GLSA-202011-05",
"url": "https://security.gentoo.org/glsa/202011-05"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -102,6 +102,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -188,6 +188,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -93,6 +93,9 @@
"refsource": "MLIST",
"name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.",
"url": "http://www.openwall.com/lists/oss-security/2022/04/12/6"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -106,6 +106,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -189,6 +189,9 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -96,6 +96,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -96,6 +96,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -151,6 +151,9 @@
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -73,6 +73,9 @@
"refsource": "MLIST",
"name": "[turbine-commits] 20211018 [turbine-fulcrum-security] 02/02: disable module hibernate (JIRA issue TRB-103), update docs, remove suppression",
"url": "https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -83,6 +83,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -388,6 +388,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -48,6 +48,9 @@
"refsource": "MISC",
"name": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b",
"url": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -138,6 +138,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -632,6 +632,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -76,6 +76,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210401-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210401-0006/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -171,6 +171,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -116,6 +116,9 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -87,6 +87,9 @@
"refsource": "MISC",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-28895",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-28895"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
},

View File

@ -66,6 +66,9 @@
"refsource": "DEBIAN",
"name": "DSA-4822",
"url": "https://www.debian.org/security/2021/dsa-4822"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -76,6 +76,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

View File

@ -61,6 +61,9 @@
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-35198",
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-35198"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}

Some files were not shown because too many files have changed in this diff Show More