mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
37b842a0a1
commit
6ad376cd3e
@ -44,7 +44,7 @@
|
|||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
{
|
||||||
"version": "4.18.5",
|
"version": "4.17.10",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -52,7 +52,7 @@
|
|||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version": "4.17.10",
|
"version": "4.18.5",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -113,19 +148,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -167,6 +189,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2022-2127",
|
"url": "https://access.redhat.com/security/cve/CVE-2022-2127",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -183,24 +210,24 @@
|
|||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2022-2127.html"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5477"
|
"name": "https://www.debian.org/security/2023/dsa-5477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2022-2127.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -60,6 +60,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -110,25 +151,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -158,6 +180,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-33951",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-33951",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -60,6 +60,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -110,25 +151,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -158,6 +180,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-33952",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-33952",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -43,10 +43,6 @@
|
|||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
{
|
|
||||||
"version": "4.16.11",
|
|
||||||
"status": "unaffected"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"version": "4.18.5",
|
"version": "4.18.5",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -54,6 +50,10 @@
|
|||||||
{
|
{
|
||||||
"version": "4.17.10",
|
"version": "4.17.10",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version": "4.16.11",
|
||||||
|
"status": "unaffected"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -113,19 +148,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -167,6 +189,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34966",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-34966",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -183,24 +210,24 @@
|
|||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2023-34966",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2023-34966"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5477"
|
"name": "https://www.debian.org/security/2023/dsa-5477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2023-34966",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2023-34966"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -43,6 +43,10 @@
|
|||||||
"version_value": "not down converted",
|
"version_value": "not down converted",
|
||||||
"x_cve_json_5_version_data": {
|
"x_cve_json_5_version_data": {
|
||||||
"versions": [
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "4.16.11",
|
||||||
|
"status": "unaffected"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"version": "4.18.5",
|
"version": "4.18.5",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
@ -50,10 +54,6 @@
|
|||||||
{
|
{
|
||||||
"version": "4.17.10",
|
"version": "4.17.10",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "4.16.11",
|
|
||||||
"status": "unaffected"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -113,19 +148,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -167,6 +189,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34967",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-34967",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -183,24 +210,24 @@
|
|||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2023-34967.html"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5477"
|
"name": "https://www.debian.org/security/2023/dsa-5477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2023-34967.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -47,11 +47,11 @@
|
|||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version": "4.16.11",
|
"version": "4.17.10",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version": "4.17.10",
|
"version": "4.16.11",
|
||||||
"status": "unaffected"
|
"status": "unaffected"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -67,6 +67,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-100.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -112,19 +147,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -166,6 +188,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6667",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6667"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34968",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-34968",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -182,24 +209,24 @@
|
|||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2023-34968.html"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
"name": "https://security.netapp.com/advisory/ntap-20230731-0010/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5477"
|
"name": "https://www.debian.org/security/2023/dsa-5477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2023-34968.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -55,6 +55,27 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:9.54.0-13.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -99,19 +120,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -141,6 +149,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6544",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6544"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38559",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-38559",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -166,15 +179,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -60,6 +60,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -110,25 +151,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -158,6 +180,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39191",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-39191",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -60,6 +60,33 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.4.0-10.el9",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -116,25 +143,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -170,6 +178,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6575",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6575"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3576",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-3576",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -55,6 +55,27 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:9.5.0-7.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -106,19 +127,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -148,6 +156,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6409",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6409"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3750",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-3750",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -55,6 +55,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -105,25 +146,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -153,16 +175,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3772",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://access.redhat.com/security/cve/CVE-2023-3772"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/10/1",
|
"url": "http://www.openwall.com/lists/oss-security/2023/08/10/1",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -174,14 +186,29 @@
|
|||||||
"name": "http://www.openwall.com/lists/oss-security/2023/08/10/3"
|
"name": "http://www.openwall.com/lists/oss-security/2023/08/10/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5492",
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5492"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2023-3772",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/security/cve/CVE-2023-3772"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.debian.org/security/2023/dsa-5492",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.debian.org/security/2023/dsa-5492"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -55,6 +55,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -105,25 +146,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -153,6 +175,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3773",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-3773",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -163,15 +190,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944"
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5492",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5492"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.debian.org/security/2023/dsa-5492",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.debian.org/security/2023/dsa-5492"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
||||||
"version": {
|
"version": {
|
||||||
@ -134,19 +169,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -193,6 +215,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3961",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-3961",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -208,15 +235,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15422"
|
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15422"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2023-3961.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2023-3961.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2023-3961.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2023-3961.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
||||||
"version": {
|
"version": {
|
||||||
@ -134,19 +169,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -193,6 +215,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-42669",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-42669",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -98,6 +98,20 @@
|
|||||||
],
|
],
|
||||||
"defaultStatus": "affected"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "7:5.5-6.el9_3.1",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -198,6 +212,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-46846",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-46846",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -98,6 +98,20 @@
|
|||||||
],
|
],
|
||||||
"defaultStatus": "affected"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "7:5.5-6.el9_3.1",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -198,6 +212,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-46847",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-46847",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -77,6 +77,20 @@
|
|||||||
],
|
],
|
||||||
"defaultStatus": "affected"
|
"defaultStatus": "affected"
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "7:5.5-6.el9_3.1",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -179,6 +193,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6268"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6748",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6748"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-46848",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-46848",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -68,6 +68,41 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:4.18.6-101.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
||||||
"version": {
|
"version": {
|
||||||
@ -134,19 +169,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Storage 3",
|
"product_name": "Red Hat Storage 3",
|
||||||
"version": {
|
"version": {
|
||||||
@ -193,6 +215,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
"name": "https://access.redhat.com/errata/RHSA-2023:6209"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6744",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6744"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4091",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4091",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -208,15 +235,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
|
"name": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://www.samba.org/samba/security/CVE-2023-4091.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://www.samba.org/samba/security/CVE-2023-4091.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.samba.org/samba/security/CVE-2023-4091.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.samba.org/samba/security/CVE-2023-4091.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -280,6 +280,47 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
|
||||||
"version": {
|
"version": {
|
||||||
@ -386,25 +427,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -504,6 +526,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2023:5794"
|
"name": "https://access.redhat.com/errata/RHSA-2023:5794"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4128",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4128",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -66,6 +66,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -117,25 +158,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Virtualization 4",
|
"product_name": "Red Hat Virtualization 4",
|
||||||
"version": {
|
"version": {
|
||||||
@ -177,6 +199,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4194",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4194",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -60,6 +60,47 @@
|
|||||||
"vendor_name": "Red Hat",
|
"vendor_name": "Red Hat",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat Enterprise Linux 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:5.14.0-362.8.1.el9_3",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat Enterprise Linux 6",
|
"product_name": "Red Hat Enterprise Linux 6",
|
||||||
"version": {
|
"version": {
|
||||||
@ -110,25 +151,6 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"product_name": "Red Hat Enterprise Linux 9",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -158,6 +180,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2023:6583"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4273",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4273",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -173,6 +200,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/"
|
"name": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -183,6 +215,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/"
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://security.netapp.com/advisory/ntap-20231027-0002/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2023/dsa-5480",
|
"url": "https://www.debian.org/security/2023/dsa-5480",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -192,16 +229,6 @@
|
|||||||
"url": "https://www.debian.org/security/2023/dsa-5492",
|
"url": "https://www.debian.org/security/2023/dsa-5492",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.debian.org/security/2023/dsa-5492"
|
"name": "https://www.debian.org/security/2023/dsa-5492"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20231027-0002/"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -41,22 +41,22 @@
|
|||||||
{
|
{
|
||||||
"version_affected": "<",
|
"version_affected": "<",
|
||||||
"version_name": "1.0.2",
|
"version_name": "1.0.2",
|
||||||
"version_value": "1.0.2zj-dev"
|
"version_value": "1.0.2zj"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_affected": "<",
|
"version_affected": "<",
|
||||||
"version_name": "1.1.1",
|
"version_name": "1.1.1",
|
||||||
"version_value": "1.1.1x-dev"
|
"version_value": "1.1.1x"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_affected": "<",
|
"version_affected": "<",
|
||||||
"version_name": "3.0.0",
|
"version_name": "3.0.0",
|
||||||
"version_value": "3.0.13-dev"
|
"version_value": "3.0.13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"version_affected": "<",
|
"version_affected": "<",
|
||||||
"version_name": "3.1.0",
|
"version_name": "3.1.0",
|
||||||
"version_value": "3.1.5-dev"
|
"version_value": "3.1.5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -93,11 +93,6 @@
|
|||||||
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6",
|
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6"
|
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2023/11/06/2",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://www.openwall.com/lists/oss-security/2023/11/06/2"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user