"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-11-07 14:00:32 +00:00
parent 37b842a0a1
commit 6ad376cd3e
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
22 changed files with 875 additions and 379 deletions

View File

@ -44,7 +44,7 @@
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{ {
"version": "4.18.5", "version": "4.17.10",
"status": "unaffected" "status": "unaffected"
}, },
{ {
@ -52,7 +52,7 @@
"status": "unaffected" "status": "unaffected"
}, },
{ {
"version": "4.17.10", "version": "4.18.5",
"status": "unaffected" "status": "unaffected"
} }
] ]
@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -113,19 +148,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -167,6 +189,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2022-2127", "url": "https://access.redhat.com/security/cve/CVE-2022-2127",
"refsource": "MISC", "refsource": "MISC",
@ -183,24 +210,24 @@
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
}, },
{ {
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2022-2127.html" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/", "url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/" "name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5477", "url": "https://www.debian.org/security/2023/dsa-5477",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5477" "name": "https://www.debian.org/security/2023/dsa-5477"
},
{
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2022-2127.html"
} }
] ]
}, },

View File

@ -60,6 +60,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -110,25 +151,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -158,6 +180,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-33951", "url": "https://access.redhat.com/security/cve/CVE-2023-33951",
"refsource": "MISC", "refsource": "MISC",

View File

@ -60,6 +60,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -110,25 +151,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -158,6 +180,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-33952", "url": "https://access.redhat.com/security/cve/CVE-2023-33952",
"refsource": "MISC", "refsource": "MISC",

View File

@ -43,10 +43,6 @@
"version_value": "not down converted", "version_value": "not down converted",
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{
"version": "4.16.11",
"status": "unaffected"
},
{ {
"version": "4.18.5", "version": "4.18.5",
"status": "unaffected" "status": "unaffected"
@ -54,6 +50,10 @@
{ {
"version": "4.17.10", "version": "4.17.10",
"status": "unaffected" "status": "unaffected"
},
{
"version": "4.16.11",
"status": "unaffected"
} }
] ]
} }
@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -113,19 +148,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -167,6 +189,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-34966", "url": "https://access.redhat.com/security/cve/CVE-2023-34966",
"refsource": "MISC", "refsource": "MISC",
@ -183,24 +210,24 @@
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
}, },
{ {
"url": "https://www.samba.org/samba/security/CVE-2023-34966", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34966" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/", "url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/" "name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5477", "url": "https://www.debian.org/security/2023/dsa-5477",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5477" "name": "https://www.debian.org/security/2023/dsa-5477"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34966",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34966"
} }
] ]
}, },

View File

@ -43,6 +43,10 @@
"version_value": "not down converted", "version_value": "not down converted",
"x_cve_json_5_version_data": { "x_cve_json_5_version_data": {
"versions": [ "versions": [
{
"version": "4.16.11",
"status": "unaffected"
},
{ {
"version": "4.18.5", "version": "4.18.5",
"status": "unaffected" "status": "unaffected"
@ -50,10 +54,6 @@
{ {
"version": "4.17.10", "version": "4.17.10",
"status": "unaffected" "status": "unaffected"
},
{
"version": "4.16.11",
"status": "unaffected"
} }
] ]
} }
@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -113,19 +148,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -167,6 +189,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-34967", "url": "https://access.redhat.com/security/cve/CVE-2023-34967",
"refsource": "MISC", "refsource": "MISC",
@ -183,24 +210,24 @@
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
}, },
{ {
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34967.html" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/", "url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/" "name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5477", "url": "https://www.debian.org/security/2023/dsa-5477",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5477" "name": "https://www.debian.org/security/2023/dsa-5477"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34967.html"
} }
] ]
}, },

View File

@ -47,11 +47,11 @@
"status": "unaffected" "status": "unaffected"
}, },
{ {
"version": "4.16.11", "version": "4.17.10",
"status": "unaffected" "status": "unaffected"
}, },
{ {
"version": "4.17.10", "version": "4.16.11",
"status": "unaffected" "status": "unaffected"
} }
] ]
@ -67,6 +67,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-100.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -112,19 +147,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -166,6 +188,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-34968", "url": "https://access.redhat.com/security/cve/CVE-2023-34968",
"refsource": "MISC", "refsource": "MISC",
@ -182,24 +209,24 @@
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
}, },
{ {
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34968.html" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/", "url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/" "name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5477", "url": "https://www.debian.org/security/2023/dsa-5477",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5477" "name": "https://www.debian.org/security/2023/dsa-5477"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-34968.html"
} }
] ]
}, },

View File

@ -55,6 +55,27 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:9.54.0-13.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -99,19 +120,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -141,6 +149,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6544",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6544"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-38559", "url": "https://access.redhat.com/security/cve/CVE-2023-38559",
"refsource": "MISC", "refsource": "MISC",
@ -166,15 +179,15 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html" "name": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/"
} }
] ]
}, },

View File

@ -60,6 +60,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -110,25 +151,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -158,6 +180,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-39191", "url": "https://access.redhat.com/security/cve/CVE-2023-39191",
"refsource": "MISC", "refsource": "MISC",

View File

@ -60,6 +60,33 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.4.0-10.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -116,25 +143,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -170,6 +178,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6575",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-3576", "url": "https://access.redhat.com/security/cve/CVE-2023-3576",
"refsource": "MISC", "refsource": "MISC",

View File

@ -55,6 +55,27 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:9.5.0-7.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -106,19 +127,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -148,6 +156,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6409",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6409"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-3750", "url": "https://access.redhat.com/security/cve/CVE-2023-3750",
"refsource": "MISC", "refsource": "MISC",

View File

@ -55,6 +55,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -105,25 +146,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -153,16 +175,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3772",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-3772"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943"
},
{ {
"url": "http://www.openwall.com/lists/oss-security/2023/08/10/1", "url": "http://www.openwall.com/lists/oss-security/2023/08/10/1",
"refsource": "MISC", "refsource": "MISC",
@ -174,14 +186,29 @@
"name": "http://www.openwall.com/lists/oss-security/2023/08/10/3" "name": "http://www.openwall.com/lists/oss-security/2023/08/10/3"
}, },
{ {
"url": "https://www.debian.org/security/2023/dsa-5492", "url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5492" "name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3772",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-3772"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943"
}, },
{ {
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5492"
} }
] ]
}, },

View File

@ -55,6 +55,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -105,25 +146,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -153,6 +175,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-3773", "url": "https://access.redhat.com/security/cve/CVE-2023-3773",
"refsource": "MISC", "refsource": "MISC",
@ -163,15 +190,15 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5492"
},
{ {
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5492"
} }
] ]
}, },

View File

@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"version": { "version": {
@ -134,19 +169,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -193,6 +215,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6209" "name": "https://access.redhat.com/errata/RHSA-2023:6209"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-3961", "url": "https://access.redhat.com/security/cve/CVE-2023-3961",
"refsource": "MISC", "refsource": "MISC",
@ -208,15 +235,15 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15422" "name": "https://bugzilla.samba.org/show_bug.cgi?id=15422"
}, },
{
"url": "https://www.samba.org/samba/security/CVE-2023-3961.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-3961.html"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-3961.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-3961.html"
} }
] ]
}, },

View File

@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"version": { "version": {
@ -134,19 +169,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -193,6 +215,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6209" "name": "https://access.redhat.com/errata/RHSA-2023:6209"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-42669", "url": "https://access.redhat.com/security/cve/CVE-2023-42669",
"refsource": "MISC", "refsource": "MISC",

View File

@ -98,6 +98,20 @@
], ],
"defaultStatus": "affected" "defaultStatus": "affected"
} }
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "7:5.5-6.el9_3.1",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
} }
] ]
} }
@ -198,6 +212,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6268" "name": "https://access.redhat.com/errata/RHSA-2023:6268"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-46846", "url": "https://access.redhat.com/security/cve/CVE-2023-46846",
"refsource": "MISC", "refsource": "MISC",

View File

@ -98,6 +98,20 @@
], ],
"defaultStatus": "affected" "defaultStatus": "affected"
} }
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "7:5.5-6.el9_3.1",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
} }
] ]
} }
@ -198,6 +212,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6268" "name": "https://access.redhat.com/errata/RHSA-2023:6268"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-46847", "url": "https://access.redhat.com/security/cve/CVE-2023-46847",
"refsource": "MISC", "refsource": "MISC",

View File

@ -77,6 +77,20 @@
], ],
"defaultStatus": "affected" "defaultStatus": "affected"
} }
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "7:5.5-6.el9_3.1",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
} }
] ]
} }
@ -179,6 +193,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6268" "name": "https://access.redhat.com/errata/RHSA-2023:6268"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-46848", "url": "https://access.redhat.com/security/cve/CVE-2023-46848",
"refsource": "MISC", "refsource": "MISC",

View File

@ -68,6 +68,41 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:4.18.6-101.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"version": { "version": {
@ -134,19 +169,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Storage 3", "product_name": "Red Hat Storage 3",
"version": { "version": {
@ -193,6 +215,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6209" "name": "https://access.redhat.com/errata/RHSA-2023:6209"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4091", "url": "https://access.redhat.com/security/cve/CVE-2023-4091",
"refsource": "MISC", "refsource": "MISC",
@ -208,15 +235,15 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15439" "name": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
}, },
{
"url": "https://www.samba.org/samba/security/CVE-2023-4091.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-4091.html"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-4091.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2023-4091.html"
} }
] ]
}, },

View File

@ -280,6 +280,47 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"version": { "version": {
@ -386,25 +427,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -504,6 +526,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:5794" "name": "https://access.redhat.com/errata/RHSA-2023:5794"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4128", "url": "https://access.redhat.com/security/cve/CVE-2023-4128",
"refsource": "MISC", "refsource": "MISC",

View File

@ -66,6 +66,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -117,25 +158,6 @@
] ]
} }
}, },
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Virtualization 4", "product_name": "Red Hat Virtualization 4",
"version": { "version": {
@ -177,6 +199,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4194", "url": "https://access.redhat.com/security/cve/CVE-2023-4194",
"refsource": "MISC", "refsource": "MISC",

View File

@ -60,6 +60,47 @@
"vendor_name": "Red Hat", "vendor_name": "Red Hat",
"product": { "product": {
"product_data": [ "product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:5.14.0-362.8.1.el9_3",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "Red Hat Enterprise Linux 6",
"version": { "version": {
@ -110,25 +151,6 @@
} }
] ]
} }
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
} }
] ]
} }
@ -158,6 +180,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4273", "url": "https://access.redhat.com/security/cve/CVE-2023-4273",
"refsource": "MISC", "refsource": "MISC",
@ -173,6 +200,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/" "name": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/"
}, },
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
"refsource": "MISC", "refsource": "MISC",
@ -183,6 +215,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/" "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/"
}, },
{
"url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20231027-0002/"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5480", "url": "https://www.debian.org/security/2023/dsa-5480",
"refsource": "MISC", "refsource": "MISC",
@ -192,16 +229,6 @@
"url": "https://www.debian.org/security/2023/dsa-5492", "url": "https://www.debian.org/security/2023/dsa-5492",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5492" "name": "https://www.debian.org/security/2023/dsa-5492"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20231027-0002/"
} }
] ]
}, },

View File

@ -41,22 +41,22 @@
{ {
"version_affected": "<", "version_affected": "<",
"version_name": "1.0.2", "version_name": "1.0.2",
"version_value": "1.0.2zj-dev" "version_value": "1.0.2zj"
}, },
{ {
"version_affected": "<", "version_affected": "<",
"version_name": "1.1.1", "version_name": "1.1.1",
"version_value": "1.1.1x-dev" "version_value": "1.1.1x"
}, },
{ {
"version_affected": "<", "version_affected": "<",
"version_name": "3.0.0", "version_name": "3.0.0",
"version_value": "3.0.13-dev" "version_value": "3.0.13"
}, },
{ {
"version_affected": "<", "version_affected": "<",
"version_name": "3.1.0", "version_name": "3.1.0",
"version_value": "3.1.5-dev" "version_value": "3.1.5"
} }
] ]
} }
@ -93,11 +93,6 @@
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6",
"refsource": "MISC", "refsource": "MISC",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6" "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/06/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/11/06/2"
} }
] ]
}, },