From 313d51f712fc8d34fcb0af553fa63fd5def115c4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 24 Jan 2024 06:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/25xxx/CVE-2020-25613.json | 5 +++++ 2021/31xxx/CVE-2021-31810.json | 5 +++++ 2021/32xxx/CVE-2021-32066.json | 5 +++++ 2021/33xxx/CVE-2021-33479.json | 5 +++++ 2021/33xxx/CVE-2021-33480.json | 5 +++++ 2021/33xxx/CVE-2021-33481.json | 5 +++++ 2021/33xxx/CVE-2021-33621.json | 5 +++++ 2021/41xxx/CVE-2021-41816.json | 5 +++++ 2021/41xxx/CVE-2021-41817.json | 5 +++++ 2021/41xxx/CVE-2021-41819.json | 5 +++++ 2022/28xxx/CVE-2022-28738.json | 5 +++++ 2022/28xxx/CVE-2022-28739.json | 5 +++++ 2023/28xxx/CVE-2023-28755.json | 5 +++++ 2023/28xxx/CVE-2023-28756.json | 5 +++++ 2023/42xxx/CVE-2023-42465.json | 5 +++++ 2024/0xxx/CVE-2024-0850.json | 18 ++++++++++++++++++ 16 files changed, 93 insertions(+) create mode 100644 2024/0xxx/CVE-2024-0850.json diff --git a/2020/25xxx/CVE-2020-25613.json b/2020/25xxx/CVE-2020-25613.json index ba27d042e7d..7d05310bcb8 100644 --- a/2020/25xxx/CVE-2020-25613.json +++ b/2020/25xxx/CVE-2020-25613.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/31xxx/CVE-2021-31810.json b/2021/31xxx/CVE-2021-31810.json index ccb738745fd..03bd75db7de 100644 --- a/2021/31xxx/CVE-2021-31810.json +++ b/2021/31xxx/CVE-2021-31810.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/32xxx/CVE-2021-32066.json b/2021/32xxx/CVE-2021-32066.json index 983e97307d4..e5b93e6faf1 100644 --- a/2021/32xxx/CVE-2021-32066.json +++ b/2021/32xxx/CVE-2021-32066.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/33xxx/CVE-2021-33479.json b/2021/33xxx/CVE-2021-33479.json index 914d649a9ca..5c303147514 100644 --- a/2021/33xxx/CVE-2021-33479.json +++ b/2021/33xxx/CVE-2021-33479.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://sourceforge.net/p/jocr/bugs/39/", "url": "https://sourceforge.net/p/jocr/bugs/39/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-28", + "url": "https://security.gentoo.org/glsa/202401-28" } ] }, diff --git a/2021/33xxx/CVE-2021-33480.json b/2021/33xxx/CVE-2021-33480.json index 3612295c94f..bd32616d1d2 100644 --- a/2021/33xxx/CVE-2021-33480.json +++ b/2021/33xxx/CVE-2021-33480.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://sourceforge.net/p/jocr/bugs/41/", "url": "https://sourceforge.net/p/jocr/bugs/41/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-28", + "url": "https://security.gentoo.org/glsa/202401-28" } ] }, diff --git a/2021/33xxx/CVE-2021-33481.json b/2021/33xxx/CVE-2021-33481.json index d66f14f2d56..57830324ce3 100644 --- a/2021/33xxx/CVE-2021-33481.json +++ b/2021/33xxx/CVE-2021-33481.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://sourceforge.net/p/jocr/bugs/42/", "url": "https://sourceforge.net/p/jocr/bugs/42/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-28", + "url": "https://security.gentoo.org/glsa/202401-28" } ] }, diff --git a/2021/33xxx/CVE-2021-33621.json b/2021/33xxx/CVE-2021-33621.json index ebeb481b694..1e94d645f1f 100644 --- a/2021/33xxx/CVE-2021-33621.json +++ b/2021/33xxx/CVE-2021-33621.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230609 [SECURITY] [DLA 3450-1] ruby2.5 security update", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/41xxx/CVE-2021-41816.json b/2021/41xxx/CVE-2021-41816.json index cd6f7b7a394..c2f6c484d41 100644 --- a/2021/41xxx/CVE-2021-41816.json +++ b/2021/41xxx/CVE-2021-41816.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-8cf0124add", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/41xxx/CVE-2021-41817.json b/2021/41xxx/CVE-2021-41817.json index 663afeb765b..906fb2c8591 100644 --- a/2021/41xxx/CVE-2021-41817.json +++ b/2021/41xxx/CVE-2021-41817.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-8cf0124add", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2021/41xxx/CVE-2021-41819.json b/2021/41xxx/CVE-2021-41819.json index 0437187c1be..706e4732674 100644 --- a/2021/41xxx/CVE-2021-41819.json +++ b/2021/41xxx/CVE-2021-41819.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-8cf0124add", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2022/28xxx/CVE-2022-28738.json b/2022/28xxx/CVE-2022-28738.json index 5a7deaa3902..c3827901b42 100644 --- a/2022/28xxx/CVE-2022-28738.json +++ b/2022/28xxx/CVE-2022-28738.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0002/", "url": "https://security.netapp.com/advisory/ntap-20220624-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2022/28xxx/CVE-2022-28739.json b/2022/28xxx/CVE-2022-28739.json index 3484e7f922c..9eaac542b7d 100644 --- a/2022/28xxx/CVE-2022-28739.json +++ b/2022/28xxx/CVE-2022-28739.json @@ -116,6 +116,11 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html", "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html" + }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2023/28xxx/CVE-2023-28755.json b/2023/28xxx/CVE-2023-28755.json index ebac090f68f..dea1d92465c 100644 --- a/2023/28xxx/CVE-2023-28755.json +++ b/2023/28xxx/CVE-2023-28755.json @@ -96,6 +96,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230526-0003/", "url": "https://security.netapp.com/advisory/ntap-20230526-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2023/28xxx/CVE-2023-28756.json b/2023/28xxx/CVE-2023-28756.json index 93f4aad45d9..c58ed00c246 100644 --- a/2023/28xxx/CVE-2023-28756.json +++ b/2023/28xxx/CVE-2023-28756.json @@ -96,6 +96,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230526-0004/", "url": "https://security.netapp.com/advisory/ntap-20230526-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-27", + "url": "https://security.gentoo.org/glsa/202401-27" } ] } diff --git a/2023/42xxx/CVE-2023-42465.json b/2023/42xxx/CVE-2023-42465.json index 3251d98c881..bba25bef34d 100644 --- a/2023/42xxx/CVE-2023-42465.json +++ b/2023/42xxx/CVE-2023-42465.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15", "url": "https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202401-29", + "url": "https://security.gentoo.org/glsa/202401-29" } ] } diff --git a/2024/0xxx/CVE-2024-0850.json b/2024/0xxx/CVE-2024-0850.json new file mode 100644 index 00000000000..8696d287004 --- /dev/null +++ b/2024/0xxx/CVE-2024-0850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-0850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file