From 09352f2ad3c43934a6ea49840e48eb21b2a43526 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 3 Nov 2023 04:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/28xxx/CVE-2020-28407.json | 66 ++++++++++++++++++++++++++++++---- 2023/31xxx/CVE-2023-31102.json | 66 ++++++++++++++++++++++++++++++---- 2023/34xxx/CVE-2023-34259.json | 61 +++++++++++++++++++++++++++---- 2023/34xxx/CVE-2023-34260.json | 61 +++++++++++++++++++++++++++---- 2023/34xxx/CVE-2023-34261.json | 61 +++++++++++++++++++++++++++---- 2023/36xxx/CVE-2023-36620.json | 66 ++++++++++++++++++++++++++++++---- 2023/36xxx/CVE-2023-36621.json | 66 ++++++++++++++++++++++++++++++---- 2023/40xxx/CVE-2023-40536.json | 18 ++++++++++ 2023/42xxx/CVE-2023-42432.json | 18 ++++++++++ 2023/45xxx/CVE-2023-45217.json | 18 ++++++++++ 2023/45xxx/CVE-2023-45315.json | 18 ++++++++++ 2023/45xxx/CVE-2023-45320.json | 18 ++++++++++ 2023/46xxx/CVE-2023-46103.json | 18 ++++++++++ 2023/46xxx/CVE-2023-46702.json | 18 ++++++++++ 2023/46xxx/CVE-2023-46710.json | 18 ++++++++++ 2023/47xxx/CVE-2023-47206.json | 18 ++++++++++ 2023/47xxx/CVE-2023-47210.json | 18 ++++++++++ 2023/4xxx/CVE-2023-4194.json | 34 +++++++++--------- 18 files changed, 602 insertions(+), 59 deletions(-) create mode 100644 2023/40xxx/CVE-2023-40536.json create mode 100644 2023/42xxx/CVE-2023-42432.json create mode 100644 2023/45xxx/CVE-2023-45217.json create mode 100644 2023/45xxx/CVE-2023-45315.json create mode 100644 2023/45xxx/CVE-2023-45320.json create mode 100644 2023/46xxx/CVE-2023-46103.json create mode 100644 2023/46xxx/CVE-2023-46702.json create mode 100644 2023/46xxx/CVE-2023-46710.json create mode 100644 2023/47xxx/CVE-2023-47206.json create mode 100644 2023/47xxx/CVE-2023-47210.json diff --git a/2020/28xxx/CVE-2020-28407.json b/2020/28xxx/CVE-2020-28407.json index 8f08c897d74..cb38a37e143 100644 --- a/2020/28xxx/CVE-2020-28407.json +++ b/2020/28xxx/CVE-2020-28407.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28407", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28407", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2", + "url": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.suse.com/show_bug.cgi?id=1198395", + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1198395" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1", + "url": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1" } ] } diff --git a/2023/31xxx/CVE-2023-31102.json b/2023/31xxx/CVE-2023-31102.json index 5433c0a5679..a3b24505c48 100644 --- a/2023/31xxx/CVE-2023-31102.json +++ b/2023/31xxx/CVE-2023-31102.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-31102", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-31102", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.7-zip.org/download.html", + "refsource": "MISC", + "name": "https://www.7-zip.org/download.html" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/" + }, + { + "refsource": "MISC", + "name": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/", + "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/" } ] } diff --git a/2023/34xxx/CVE-2023-34259.json b/2023/34xxx/CVE-2023-34259.json index 87313860d5f..ffc4f343fa5 100644 --- a/2023/34xxx/CVE-2023-34259.json +++ b/2023/34xxx/CVE-2023-34259.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-34259", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-34259", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "refsource": "MISC", + "name": "https://sec-consult.com/vulnerability-lab/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2023/Jul/15", + "url": "https://seclists.org/fulldisclosure/2023/Jul/15" } ] } diff --git a/2023/34xxx/CVE-2023-34260.json b/2023/34xxx/CVE-2023-34260.json index ce959c21bb0..d0ad11764e1 100644 --- a/2023/34xxx/CVE-2023-34260.json +++ b/2023/34xxx/CVE-2023-34260.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-34260", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-34260", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "refsource": "MISC", + "name": "https://sec-consult.com/vulnerability-lab/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2023/Jul/15", + "url": "https://seclists.org/fulldisclosure/2023/Jul/15" } ] } diff --git a/2023/34xxx/CVE-2023-34261.json b/2023/34xxx/CVE-2023-34261.json index fb6bd24308a..2b9a4d195b8 100644 --- a/2023/34xxx/CVE-2023-34261.json +++ b/2023/34xxx/CVE-2023-34261.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-34261", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-34261", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow identification of valid user accounts via username enumeration because they lead to a \"nicht einloggen\" error rather than a falsch error." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "refsource": "MISC", + "name": "https://sec-consult.com/vulnerability-lab/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2023/Jul/15", + "url": "https://seclists.org/fulldisclosure/2023/Jul/15" } ] } diff --git a/2023/36xxx/CVE-2023-36620.json b/2023/36xxx/CVE-2023-36620.json index 2f412ef8a7d..b751cf8f561 100644 --- a/2023/36xxx/CVE-2023-36620.json +++ b/2023/36xxx/CVE-2023-36620.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36620", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36620", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup=\"false\" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/", + "refsource": "MISC", + "name": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/" + }, + { + "url": "https://useboomerang.com/", + "refsource": "MISC", + "name": "https://useboomerang.com/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2023/Jul/12", + "url": "https://seclists.org/fulldisclosure/2023/Jul/12" } ] } diff --git a/2023/36xxx/CVE-2023-36621.json b/2023/36xxx/CVE-2023-36621.json index d52ac844a14..a488bd2320f 100644 --- a/2023/36xxx/CVE-2023-36621.json +++ b/2023/36xxx/CVE-2023-36621.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-36621", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-36621", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/", + "refsource": "MISC", + "name": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/" + }, + { + "url": "https://useboomerang.com/", + "refsource": "MISC", + "name": "https://useboomerang.com/" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2023/Jul/12", + "url": "https://seclists.org/fulldisclosure/2023/Jul/12" } ] } diff --git a/2023/40xxx/CVE-2023-40536.json b/2023/40xxx/CVE-2023-40536.json new file mode 100644 index 00000000000..da4be6b7aea --- /dev/null +++ b/2023/40xxx/CVE-2023-40536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/42xxx/CVE-2023-42432.json b/2023/42xxx/CVE-2023-42432.json new file mode 100644 index 00000000000..4e38dff3912 --- /dev/null +++ b/2023/42xxx/CVE-2023-42432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-42432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/45xxx/CVE-2023-45217.json b/2023/45xxx/CVE-2023-45217.json new file mode 100644 index 00000000000..45aed04b630 --- /dev/null +++ b/2023/45xxx/CVE-2023-45217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-45217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/45xxx/CVE-2023-45315.json b/2023/45xxx/CVE-2023-45315.json new file mode 100644 index 00000000000..39b28fdb7ba --- /dev/null +++ b/2023/45xxx/CVE-2023-45315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-45315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/45xxx/CVE-2023-45320.json b/2023/45xxx/CVE-2023-45320.json new file mode 100644 index 00000000000..eb259e663e8 --- /dev/null +++ b/2023/45xxx/CVE-2023-45320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-45320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/46xxx/CVE-2023-46103.json b/2023/46xxx/CVE-2023-46103.json new file mode 100644 index 00000000000..eab3fe25861 --- /dev/null +++ b/2023/46xxx/CVE-2023-46103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-46103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/46xxx/CVE-2023-46702.json b/2023/46xxx/CVE-2023-46702.json new file mode 100644 index 00000000000..52497b39006 --- /dev/null +++ b/2023/46xxx/CVE-2023-46702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-46702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/46xxx/CVE-2023-46710.json b/2023/46xxx/CVE-2023-46710.json new file mode 100644 index 00000000000..1f846906e8c --- /dev/null +++ b/2023/46xxx/CVE-2023-46710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-46710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/47xxx/CVE-2023-47206.json b/2023/47xxx/CVE-2023-47206.json new file mode 100644 index 00000000000..c74e4341781 --- /dev/null +++ b/2023/47xxx/CVE-2023-47206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-47206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/47xxx/CVE-2023-47210.json b/2023/47xxx/CVE-2023-47210.json new file mode 100644 index 00000000000..8cd834a1f28 --- /dev/null +++ b/2023/47xxx/CVE-2023-47210.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-47210", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4194.json b/2023/4xxx/CVE-2023-4194.json index fcf30e1d44a..40879531db9 100644 --- a/2023/4xxx/CVE-2023-4194.json +++ b/2023/4xxx/CVE-2023-4194.json @@ -187,6 +187,21 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2229498" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/" + }, { "url": "https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/", "refsource": "MISC", @@ -203,14 +218,9 @@ "name": "https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/", + "url": "https://security.netapp.com/advisory/ntap-20231027-0002/", "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/" + "name": "https://security.netapp.com/advisory/ntap-20231027-0002/" }, { "url": "https://www.debian.org/security/2023/dsa-5480", @@ -221,16 +231,6 @@ "url": "https://www.debian.org/security/2023/dsa-5492", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5492" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231027-0002/", - "refsource": "MISC", - "name": "https://security.netapp.com/advisory/ntap-20231027-0002/" } ] },