diff --git a/2020/28xxx/CVE-2020-28601.json b/2020/28xxx/CVE-2020-28601.json index 82777ef9592..36f82564236 100644 --- a/2020/28xxx/CVE-2020-28601.json +++ b/2020/28xxx/CVE-2020-28601.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28602.json b/2020/28xxx/CVE-2020-28602.json index 39e530f60e7..8a6aabe635f 100644 --- a/2020/28xxx/CVE-2020-28602.json +++ b/2020/28xxx/CVE-2020-28602.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28603.json b/2020/28xxx/CVE-2020-28603.json index 4a7c107f10c..d6d29483cae 100644 --- a/2020/28xxx/CVE-2020-28603.json +++ b/2020/28xxx/CVE-2020-28603.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28604.json b/2020/28xxx/CVE-2020-28604.json index 8486aa331dc..1b8c44b42f6 100644 --- a/2020/28xxx/CVE-2020-28604.json +++ b/2020/28xxx/CVE-2020-28604.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28605.json b/2020/28xxx/CVE-2020-28605.json index 301b44d02a8..1854a14ec01 100644 --- a/2020/28xxx/CVE-2020-28605.json +++ b/2020/28xxx/CVE-2020-28605.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28606.json b/2020/28xxx/CVE-2020-28606.json index 9f6329c76c7..cf052b0328c 100644 --- a/2020/28xxx/CVE-2020-28606.json +++ b/2020/28xxx/CVE-2020-28606.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28607.json b/2020/28xxx/CVE-2020-28607.json index 1543500d942..6d4714d6507 100644 --- a/2020/28xxx/CVE-2020-28607.json +++ b/2020/28xxx/CVE-2020-28607.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28608.json b/2020/28xxx/CVE-2020-28608.json index 6d7001451b9..203e4305df3 100644 --- a/2020/28xxx/CVE-2020-28608.json +++ b/2020/28xxx/CVE-2020-28608.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28610.json b/2020/28xxx/CVE-2020-28610.json index 33b3b43d534..d67f4ba98a8 100644 --- a/2020/28xxx/CVE-2020-28610.json +++ b/2020/28xxx/CVE-2020-28610.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28611.json b/2020/28xxx/CVE-2020-28611.json index f708c9a6fb7..f9a3c96c0be 100644 --- a/2020/28xxx/CVE-2020-28611.json +++ b/2020/28xxx/CVE-2020-28611.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28612.json b/2020/28xxx/CVE-2020-28612.json index 657706ffc5e..99958e6f39a 100644 --- a/2020/28xxx/CVE-2020-28612.json +++ b/2020/28xxx/CVE-2020-28612.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28613.json b/2020/28xxx/CVE-2020-28613.json index 14bb38b4c91..8cb196bff6c 100644 --- a/2020/28xxx/CVE-2020-28613.json +++ b/2020/28xxx/CVE-2020-28613.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28614.json b/2020/28xxx/CVE-2020-28614.json index a62407cfe11..601af634f89 100644 --- a/2020/28xxx/CVE-2020-28614.json +++ b/2020/28xxx/CVE-2020-28614.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28615.json b/2020/28xxx/CVE-2020-28615.json index 43f0dc9ef2a..2c5b4343c0b 100644 --- a/2020/28xxx/CVE-2020-28615.json +++ b/2020/28xxx/CVE-2020-28615.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28616.json b/2020/28xxx/CVE-2020-28616.json index 0b3992266b8..4cf71506c53 100644 --- a/2020/28xxx/CVE-2020-28616.json +++ b/2020/28xxx/CVE-2020-28616.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28617.json b/2020/28xxx/CVE-2020-28617.json index 4d9f7fa2ad2..3ef976a6adf 100644 --- a/2020/28xxx/CVE-2020-28617.json +++ b/2020/28xxx/CVE-2020-28617.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28618.json b/2020/28xxx/CVE-2020-28618.json index f48c43e47a1..968718bc1fb 100644 --- a/2020/28xxx/CVE-2020-28618.json +++ b/2020/28xxx/CVE-2020-28618.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28619.json b/2020/28xxx/CVE-2020-28619.json index 0ef7bb19bef..954a04cad5f 100644 --- a/2020/28xxx/CVE-2020-28619.json +++ b/2020/28xxx/CVE-2020-28619.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28620.json b/2020/28xxx/CVE-2020-28620.json index 0eb191aee30..ccc2e14d6b3 100644 --- a/2020/28xxx/CVE-2020-28620.json +++ b/2020/28xxx/CVE-2020-28620.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28621.json b/2020/28xxx/CVE-2020-28621.json index 65b59cab179..f05b455e330 100644 --- a/2020/28xxx/CVE-2020-28621.json +++ b/2020/28xxx/CVE-2020-28621.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28622.json b/2020/28xxx/CVE-2020-28622.json index 6ce9ac5fae6..a16137f8139 100644 --- a/2020/28xxx/CVE-2020-28622.json +++ b/2020/28xxx/CVE-2020-28622.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28623.json b/2020/28xxx/CVE-2020-28623.json index a3c9d3bdc62..da1f6d3dbda 100644 --- a/2020/28xxx/CVE-2020-28623.json +++ b/2020/28xxx/CVE-2020-28623.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28624.json b/2020/28xxx/CVE-2020-28624.json index c5ca94a9293..ce9fbd1ec20 100644 --- a/2020/28xxx/CVE-2020-28624.json +++ b/2020/28xxx/CVE-2020-28624.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28625.json b/2020/28xxx/CVE-2020-28625.json index 4876981bcf8..f04d9362a71 100644 --- a/2020/28xxx/CVE-2020-28625.json +++ b/2020/28xxx/CVE-2020-28625.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28626.json b/2020/28xxx/CVE-2020-28626.json index 41dadc2ad60..3d8ddd47fe3 100644 --- a/2020/28xxx/CVE-2020-28626.json +++ b/2020/28xxx/CVE-2020-28626.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28627.json b/2020/28xxx/CVE-2020-28627.json index 2f1c225db5b..a5413b4e74c 100644 --- a/2020/28xxx/CVE-2020-28627.json +++ b/2020/28xxx/CVE-2020-28627.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28628.json b/2020/28xxx/CVE-2020-28628.json index 77408817cf3..fb385fc99c8 100644 --- a/2020/28xxx/CVE-2020-28628.json +++ b/2020/28xxx/CVE-2020-28628.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28629.json b/2020/28xxx/CVE-2020-28629.json index 477ab803b18..d1dc7ee8dd7 100644 --- a/2020/28xxx/CVE-2020-28629.json +++ b/2020/28xxx/CVE-2020-28629.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28630.json b/2020/28xxx/CVE-2020-28630.json index c4ca6e644d3..9f931265da6 100644 --- a/2020/28xxx/CVE-2020-28630.json +++ b/2020/28xxx/CVE-2020-28630.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28631.json b/2020/28xxx/CVE-2020-28631.json index e31771c8251..f80814cb4b5 100644 --- a/2020/28xxx/CVE-2020-28631.json +++ b/2020/28xxx/CVE-2020-28631.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28632.json b/2020/28xxx/CVE-2020-28632.json index 0db9e1503c6..3e4ba1e09e1 100644 --- a/2020/28xxx/CVE-2020-28632.json +++ b/2020/28xxx/CVE-2020-28632.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28633.json b/2020/28xxx/CVE-2020-28633.json index 5f95daf61ec..f0732a3c721 100644 --- a/2020/28xxx/CVE-2020-28633.json +++ b/2020/28xxx/CVE-2020-28633.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28634.json b/2020/28xxx/CVE-2020-28634.json index 2069cbd80f5..1999370600e 100644 --- a/2020/28xxx/CVE-2020-28634.json +++ b/2020/28xxx/CVE-2020-28634.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28635.json b/2020/28xxx/CVE-2020-28635.json index 2a6a64f891a..7be6247f480 100644 --- a/2020/28xxx/CVE-2020-28635.json +++ b/2020/28xxx/CVE-2020-28635.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/28xxx/CVE-2020-28636.json b/2020/28xxx/CVE-2020-28636.json index bd04526b952..d05bf18208d 100644 --- a/2020/28xxx/CVE-2020-28636.json +++ b/2020/28xxx/CVE-2020-28636.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35628.json b/2020/35xxx/CVE-2020-35628.json index 01767479fb6..19fa76ecb3a 100644 --- a/2020/35xxx/CVE-2020-35628.json +++ b/2020/35xxx/CVE-2020-35628.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35629.json b/2020/35xxx/CVE-2020-35629.json index 5014f765e5e..42c580f7810 100644 --- a/2020/35xxx/CVE-2020-35629.json +++ b/2020/35xxx/CVE-2020-35629.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35630.json b/2020/35xxx/CVE-2020-35630.json index 21cdf392a17..045fcf86878 100644 --- a/2020/35xxx/CVE-2020-35630.json +++ b/2020/35xxx/CVE-2020-35630.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35631.json b/2020/35xxx/CVE-2020-35631.json index fcd09ce3441..e00551fcf49 100644 --- a/2020/35xxx/CVE-2020-35631.json +++ b/2020/35xxx/CVE-2020-35631.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35632.json b/2020/35xxx/CVE-2020-35632.json index 4c215aa4fd9..79e23167029 100644 --- a/2020/35xxx/CVE-2020-35632.json +++ b/2020/35xxx/CVE-2020-35632.json @@ -27,6 +27,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35633.json b/2020/35xxx/CVE-2020-35633.json index 5bcfcabd34a..7764ae0e0c7 100644 --- a/2020/35xxx/CVE-2020-35633.json +++ b/2020/35xxx/CVE-2020-35633.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35634.json b/2020/35xxx/CVE-2020-35634.json index 9f617143610..9042ad57edd 100644 --- a/2020/35xxx/CVE-2020-35634.json +++ b/2020/35xxx/CVE-2020-35634.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35635.json b/2020/35xxx/CVE-2020-35635.json index 2bd9b8a2301..afad7e06d45 100644 --- a/2020/35xxx/CVE-2020-35635.json +++ b/2020/35xxx/CVE-2020-35635.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2020/35xxx/CVE-2020-35636.json b/2020/35xxx/CVE-2020-35636.json index 4f1227e69ba..8b79391fc65 100644 --- a/2020/35xxx/CVE-2020-35636.json +++ b/2020/35xxx/CVE-2020-35636.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-34", + "url": "https://security.gentoo.org/glsa/202305-34" } ] }, diff --git a/2021/40xxx/CVE-2021-40153.json b/2021/40xxx/CVE-2021-40153.json index 493bcd413b2..ca97aa2c6d4 100644 --- a/2021/40xxx/CVE-2021-40153.json +++ b/2021/40xxx/CVE-2021-40153.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-9fb6da134f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-29", + "url": "https://security.gentoo.org/glsa/202305-29" } ] } diff --git a/2021/41xxx/CVE-2021-41072.json b/2021/41xxx/CVE-2021-41072.json index acbcdc2e84e..a304a022594 100644 --- a/2021/41xxx/CVE-2021-41072.json +++ b/2021/41xxx/CVE-2021-41072.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00017.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-29", + "url": "https://security.gentoo.org/glsa/202305-29" } ] } diff --git a/2021/4xxx/CVE-2021-4008.json b/2021/4xxx/CVE-2021-4008.json index 662a0126576..6b3a2f434e5 100644 --- a/2021/4xxx/CVE-2021-4008.json +++ b/2021/4xxx/CVE-2021-4008.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220114-0004/", "url": "https://security.netapp.com/advisory/ntap-20220114-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2021/4xxx/CVE-2021-4009.json b/2021/4xxx/CVE-2021-4009.json index bd137402a8f..cf13b9796fe 100644 --- a/2021/4xxx/CVE-2021-4009.json +++ b/2021/4xxx/CVE-2021-4009.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220114-0004/", "url": "https://security.netapp.com/advisory/ntap-20220114-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2021/4xxx/CVE-2021-4010.json b/2021/4xxx/CVE-2021-4010.json index ec8334ec03a..088f1f85754 100644 --- a/2021/4xxx/CVE-2021-4010.json +++ b/2021/4xxx/CVE-2021-4010.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220114-0004/", "url": "https://security.netapp.com/advisory/ntap-20220114-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2021/4xxx/CVE-2021-4011.json b/2021/4xxx/CVE-2021-4011.json index 644f1b7c4d1..eccb578fa8c 100644 --- a/2021/4xxx/CVE-2021-4011.json +++ b/2021/4xxx/CVE-2021-4011.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220114-0004/", "url": "https://security.netapp.com/advisory/ntap-20220114-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2022/36xxx/CVE-2022-36354.json b/2022/36xxx/CVE-2022-36354.json index 5bb41f73e4e..e9c67f1d906 100644 --- a/2022/36xxx/CVE-2022-36354.json +++ b/2022/36xxx/CVE-2022-36354.json @@ -67,6 +67,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/38xxx/CVE-2022-38143.json b/2022/38xxx/CVE-2022-38143.json index a5ab7f4a77e..bd8901569cd 100644 --- a/2022/38xxx/CVE-2022-38143.json +++ b/2022/38xxx/CVE-2022-38143.json @@ -40,12 +40,12 @@ "version": { "version_data": [ { - "version_value": "master-branch-9aeece7a", - "version_affected": "=" + "version_affected": "=", + "version_value": "master-branch-9aeece7a" }, { - "version_value": "v2.3.19.0", - "version_affected": "=" + "version_affected": "=", + "version_value": "v2.3.19.0" } ] } @@ -62,6 +62,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/3xxx/CVE-2022-3550.json b/2022/3xxx/CVE-2022-3550.json index 1a00bceca6f..2dcb39f5c49 100644 --- a/2022/3xxx/CVE-2022-3550.json +++ b/2022/3xxx/CVE-2022-3550.json @@ -101,6 +101,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-9100b7aafd", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QTPFVGYTOY4EWTJEBH3YGDTTU57FZAK/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/3xxx/CVE-2022-3551.json b/2022/3xxx/CVE-2022-3551.json index 6b912585697..b48923e9cba 100644 --- a/2022/3xxx/CVE-2022-3551.json +++ b/2022/3xxx/CVE-2022-3551.json @@ -101,6 +101,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-9100b7aafd", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QTPFVGYTOY4EWTJEBH3YGDTTU57FZAK/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/3xxx/CVE-2022-3553.json b/2022/3xxx/CVE-2022-3553.json index 1aa09fec2d4..88aff908f99 100644 --- a/2022/3xxx/CVE-2022-3553.json +++ b/2022/3xxx/CVE-2022-3553.json @@ -71,6 +71,11 @@ "url": "https://vuldb.com/?id.211053", "refsource": "MISC", "name": "https://vuldb.com/?id.211053" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/41xxx/CVE-2022-41639.json b/2022/41xxx/CVE-2022-41639.json index f0be962bf76..7e2d3a1a11a 100644 --- a/2022/41xxx/CVE-2022-41639.json +++ b/2022/41xxx/CVE-2022-41639.json @@ -67,6 +67,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41649.json b/2022/41xxx/CVE-2022-41649.json index d97dec60140..720bbf2d986 100644 --- a/2022/41xxx/CVE-2022-41649.json +++ b/2022/41xxx/CVE-2022-41649.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41684.json b/2022/41xxx/CVE-2022-41684.json index 115652d329c..75a28f86c23 100644 --- a/2022/41xxx/CVE-2022-41684.json +++ b/2022/41xxx/CVE-2022-41684.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41794.json b/2022/41xxx/CVE-2022-41794.json index ecfacfbf8bc..5c8db8714f3 100644 --- a/2022/41xxx/CVE-2022-41794.json +++ b/2022/41xxx/CVE-2022-41794.json @@ -67,6 +67,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41837.json b/2022/41xxx/CVE-2022-41837.json index b676207e6b6..e0e3b224766 100644 --- a/2022/41xxx/CVE-2022-41837.json +++ b/2022/41xxx/CVE-2022-41837.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41838.json b/2022/41xxx/CVE-2022-41838.json index 0b5cb592121..5a413b60427 100644 --- a/2022/41xxx/CVE-2022-41838.json +++ b/2022/41xxx/CVE-2022-41838.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41977.json b/2022/41xxx/CVE-2022-41977.json index 1e2798d7faa..7ab389f813b 100644 --- a/2022/41xxx/CVE-2022-41977.json +++ b/2022/41xxx/CVE-2022-41977.json @@ -67,6 +67,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41981.json b/2022/41xxx/CVE-2022-41981.json index a3433284751..f2317763d38 100644 --- a/2022/41xxx/CVE-2022-41981.json +++ b/2022/41xxx/CVE-2022-41981.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41988.json b/2022/41xxx/CVE-2022-41988.json index 698b5f224f3..65bbb4a1512 100644 --- a/2022/41xxx/CVE-2022-41988.json +++ b/2022/41xxx/CVE-2022-41988.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/41xxx/CVE-2022-41999.json b/2022/41xxx/CVE-2022-41999.json index 87430afafdb..32edb96e021 100644 --- a/2022/41xxx/CVE-2022-41999.json +++ b/2022/41xxx/CVE-2022-41999.json @@ -67,6 +67,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43592.json b/2022/43xxx/CVE-2022-43592.json index 454ff17f504..b78f0167175 100644 --- a/2022/43xxx/CVE-2022-43592.json +++ b/2022/43xxx/CVE-2022-43592.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43593.json b/2022/43xxx/CVE-2022-43593.json index 7f6d555ed86..01d90ba270f 100644 --- a/2022/43xxx/CVE-2022-43593.json +++ b/2022/43xxx/CVE-2022-43593.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43594.json b/2022/43xxx/CVE-2022-43594.json index f47c2f64c25..60b64a30576 100644 --- a/2022/43xxx/CVE-2022-43594.json +++ b/2022/43xxx/CVE-2022-43594.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43595.json b/2022/43xxx/CVE-2022-43595.json index 28c0f853ea1..6d881755d40 100644 --- a/2022/43xxx/CVE-2022-43595.json +++ b/2022/43xxx/CVE-2022-43595.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43596.json b/2022/43xxx/CVE-2022-43596.json index 7b64475a62f..1f13a5fd523 100644 --- a/2022/43xxx/CVE-2022-43596.json +++ b/2022/43xxx/CVE-2022-43596.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43597.json b/2022/43xxx/CVE-2022-43597.json index 6f5eed54c36..a720b77fc33 100644 --- a/2022/43xxx/CVE-2022-43597.json +++ b/2022/43xxx/CVE-2022-43597.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43598.json b/2022/43xxx/CVE-2022-43598.json index 37c7afdcf78..82f0919f965 100644 --- a/2022/43xxx/CVE-2022-43598.json +++ b/2022/43xxx/CVE-2022-43598.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43599.json b/2022/43xxx/CVE-2022-43599.json index 2bebf9ff6ec..72967436c47 100644 --- a/2022/43xxx/CVE-2022-43599.json +++ b/2022/43xxx/CVE-2022-43599.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43600.json b/2022/43xxx/CVE-2022-43600.json index cf97b9742d1..704962192a9 100644 --- a/2022/43xxx/CVE-2022-43600.json +++ b/2022/43xxx/CVE-2022-43600.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43601.json b/2022/43xxx/CVE-2022-43601.json index a7d12360a3c..5e8ba8f124b 100644 --- a/2022/43xxx/CVE-2022-43601.json +++ b/2022/43xxx/CVE-2022-43601.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43602.json b/2022/43xxx/CVE-2022-43602.json index 5a9dec998c4..5f87f93067d 100644 --- a/2022/43xxx/CVE-2022-43602.json +++ b/2022/43xxx/CVE-2022-43602.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/43xxx/CVE-2022-43603.json b/2022/43xxx/CVE-2022-43603.json index 4fb3c02c5e8..2e8279aae34 100644 --- a/2022/43xxx/CVE-2022-43603.json +++ b/2022/43xxx/CVE-2022-43603.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5384", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5384" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/46xxx/CVE-2022-46340.json b/2022/46xxx/CVE-2022-46340.json index 2527c4cff2f..d7fb47e71db 100644 --- a/2022/46xxx/CVE-2022-46340.json +++ b/2022/46xxx/CVE-2022-46340.json @@ -78,15 +78,20 @@ "refsource": "MISC", "name": "https://www.debian.org/security/2022/dsa-5304" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/", + "url": "https://security.gentoo.org/glsa/202305-30", "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWTH3SNJ3GKYDSN7I3QDGWYEPSMWU6EP/" + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/46xxx/CVE-2022-46341.json b/2022/46xxx/CVE-2022-46341.json index 39f82facdc8..be793a508f2 100644 --- a/2022/46xxx/CVE-2022-46341.json +++ b/2022/46xxx/CVE-2022-46341.json @@ -39,8 +39,8 @@ "version": { "version_data": [ { - "version_value": "xorg-x11-server-1.20.4", - "version_affected": "=" + "version_affected": "=", + "version_value": "xorg-x11-server-1.20.4" } ] } @@ -82,6 +82,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" + }, + { + "url": "https://security.gentoo.org/glsa/202305-30", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/46xxx/CVE-2022-46342.json b/2022/46xxx/CVE-2022-46342.json index 98460daada4..33e2f5f45d0 100644 --- a/2022/46xxx/CVE-2022-46342.json +++ b/2022/46xxx/CVE-2022-46342.json @@ -82,6 +82,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" + }, + { + "url": "https://security.gentoo.org/glsa/202305-30", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/46xxx/CVE-2022-46343.json b/2022/46xxx/CVE-2022-46343.json index 9834154c251..7ef146e1a63 100644 --- a/2022/46xxx/CVE-2022-46343.json +++ b/2022/46xxx/CVE-2022-46343.json @@ -82,6 +82,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" + }, + { + "url": "https://security.gentoo.org/glsa/202305-30", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/46xxx/CVE-2022-46344.json b/2022/46xxx/CVE-2022-46344.json index 6347d7d8c85..30018856b54 100644 --- a/2022/46xxx/CVE-2022-46344.json +++ b/2022/46xxx/CVE-2022-46344.json @@ -82,6 +82,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" + }, + { + "url": "https://security.gentoo.org/glsa/202305-30", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2022/48xxx/CVE-2022-48281.json b/2022/48xxx/CVE-2022-48281.json index 2fab351f61d..5b79aff4b47 100644 --- a/2022/48xxx/CVE-2022-48281.json +++ b/2022/48xxx/CVE-2022-48281.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230302-0004/", "url": "https://security.netapp.com/advisory/ntap-20230302-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] } diff --git a/2022/4xxx/CVE-2022-4198.json b/2022/4xxx/CVE-2022-4198.json index 1dd1d6538b4..c1f694d5ae3 100644 --- a/2022/4xxx/CVE-2022-4198.json +++ b/2022/4xxx/CVE-2022-4198.json @@ -39,8 +39,18 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "custom", + "version": "0", + "lessThanOrEqual": "2.2" + } + ], + "defaultStatus": "affected" + } } ] } @@ -57,6 +67,11 @@ "url": "https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2", "refsource": "MISC", "name": "https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2" + }, + { + "url": "https://security.gentoo.org/glsa/202305-33", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-33" } ] }, diff --git a/2022/4xxx/CVE-2022-4283.json b/2022/4xxx/CVE-2022-4283.json index 3fbb04c7df7..2c39b41a3c1 100644 --- a/2022/4xxx/CVE-2022-4283.json +++ b/2022/4xxx/CVE-2022-4283.json @@ -82,6 +82,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/" + }, + { + "url": "https://security.gentoo.org/glsa/202305-30", + "refsource": "MISC", + "name": "https://security.gentoo.org/glsa/202305-30" } ] } diff --git a/2023/0xxx/CVE-2023-0494.json b/2023/0xxx/CVE-2023-0494.json index 2bc4a11f9c2..ff3782c7e53 100644 --- a/2023/0xxx/CVE-2023-0494.json +++ b/2023/0xxx/CVE-2023-0494.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2023/0xxx/CVE-2023-0795.json b/2023/0xxx/CVE-2023-0795.json index b9a3f35af41..8ab7bfeaeea 100644 --- a/2023/0xxx/CVE-2023-0795.json +++ b/2023/0xxx/CVE-2023-0795.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0003/", "url": "https://security.netapp.com/advisory/ntap-20230316-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0796.json b/2023/0xxx/CVE-2023-0796.json index 860ef5ff5d3..5a00f99f61a 100644 --- a/2023/0xxx/CVE-2023-0796.json +++ b/2023/0xxx/CVE-2023-0796.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0003/", "url": "https://security.netapp.com/advisory/ntap-20230316-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0797.json b/2023/0xxx/CVE-2023-0797.json index ed4409d5b02..42fb60bc0e3 100644 --- a/2023/0xxx/CVE-2023-0797.json +++ b/2023/0xxx/CVE-2023-0797.json @@ -68,6 +68,11 @@ "refsource": "DEBIAN", "name": "DSA-5361", "url": "https://www.debian.org/security/2023/dsa-5361" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0799.json b/2023/0xxx/CVE-2023-0799.json index 9b2a90f3fe8..c2993b1c2c5 100644 --- a/2023/0xxx/CVE-2023-0799.json +++ b/2023/0xxx/CVE-2023-0799.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0003/", "url": "https://security.netapp.com/advisory/ntap-20230316-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0800.json b/2023/0xxx/CVE-2023-0800.json index a906d21ca11..e8cfb70dbe5 100644 --- a/2023/0xxx/CVE-2023-0800.json +++ b/2023/0xxx/CVE-2023-0800.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0002/", "url": "https://security.netapp.com/advisory/ntap-20230316-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0801.json b/2023/0xxx/CVE-2023-0801.json index 5f376bc21a8..568b9ad41b8 100644 --- a/2023/0xxx/CVE-2023-0801.json +++ b/2023/0xxx/CVE-2023-0801.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0002/", "url": "https://security.netapp.com/advisory/ntap-20230316-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0802.json b/2023/0xxx/CVE-2023-0802.json index aaeebf7011f..1ffe690738e 100644 --- a/2023/0xxx/CVE-2023-0802.json +++ b/2023/0xxx/CVE-2023-0802.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0002/", "url": "https://security.netapp.com/advisory/ntap-20230316-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0803.json b/2023/0xxx/CVE-2023-0803.json index 91980286f03..0bfae0d93e6 100644 --- a/2023/0xxx/CVE-2023-0803.json +++ b/2023/0xxx/CVE-2023-0803.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0002/", "url": "https://security.netapp.com/advisory/ntap-20230316-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/0xxx/CVE-2023-0804.json b/2023/0xxx/CVE-2023-0804.json index 84202d003e0..b045b845ce3 100644 --- a/2023/0xxx/CVE-2023-0804.json +++ b/2023/0xxx/CVE-2023-0804.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230324-0009/", "url": "https://security.netapp.com/advisory/ntap-20230324-0009/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-31", + "url": "https://security.gentoo.org/glsa/202305-31" } ] }, diff --git a/2023/1xxx/CVE-2023-1393.json b/2023/1xxx/CVE-2023-1393.json index 10f19696d5f..c8d56aa90a0 100644 --- a/2023/1xxx/CVE-2023-1393.json +++ b/2023/1xxx/CVE-2023-1393.json @@ -88,6 +88,11 @@ "refsource": "FEDORA", "name": "FEDORA-2023-6f3f9ee721", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202305-30", + "url": "https://security.gentoo.org/glsa/202305-30" } ] }, diff --git a/2023/31xxx/CVE-2023-31285.json b/2023/31xxx/CVE-2023-31285.json index 7d78f9ca2b5..98bf5d3cc04 100644 --- a/2023/31xxx/CVE-2023-31285.json +++ b/2023/31xxx/CVE-2023-31285.json @@ -56,6 +56,11 @@ "url": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2", "refsource": "MISC", "name": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2" + }, + { + "refsource": "FULLDISC", + "name": "20230529 SEC Consult SA-20230516-0 :: Multiple Vulnerabilities in Serenity and StartSharp Software", + "url": "http://seclists.org/fulldisclosure/2023/May/14" } ] } diff --git a/2023/31xxx/CVE-2023-31286.json b/2023/31xxx/CVE-2023-31286.json index 19b66f807ff..624bca1d53b 100644 --- a/2023/31xxx/CVE-2023-31286.json +++ b/2023/31xxx/CVE-2023-31286.json @@ -56,6 +56,11 @@ "url": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2", "refsource": "MISC", "name": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2" + }, + { + "refsource": "FULLDISC", + "name": "20230529 SEC Consult SA-20230516-0 :: Multiple Vulnerabilities in Serenity and StartSharp Software", + "url": "http://seclists.org/fulldisclosure/2023/May/14" } ] } diff --git a/2023/31xxx/CVE-2023-31287.json b/2023/31xxx/CVE-2023-31287.json index 7f9bdce78e5..82cdd23d1c5 100644 --- a/2023/31xxx/CVE-2023-31287.json +++ b/2023/31xxx/CVE-2023-31287.json @@ -56,6 +56,11 @@ "url": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2", "refsource": "MISC", "name": "https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2" + }, + { + "refsource": "FULLDISC", + "name": "20230529 SEC Consult SA-20230516-0 :: Multiple Vulnerabilities in Serenity and StartSharp Software", + "url": "http://seclists.org/fulldisclosure/2023/May/14" } ] } diff --git a/2023/33xxx/CVE-2023-33183.json b/2023/33xxx/CVE-2023-33183.json index a73b6e09a51..7f8462ff48c 100644 --- a/2023/33xxx/CVE-2023-33183.json +++ b/2023/33xxx/CVE-2023-33183.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-33183", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization", + "cweId": "CWE-285" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "nextcloud", + "product": { + "product_data": [ + { + "product_name": "security-advisories", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 3.5.5" + }, + { + "version_affected": "=", + "version_value": "< 4.2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j", + "refsource": "MISC", + "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j" + }, + { + "url": "https://github.com/nextcloud/calendar/pull/4938", + "refsource": "MISC", + "name": "https://github.com/nextcloud/calendar/pull/4938" + } + ] + }, + "source": { + "advisory": "GHSA-2792-2734-hr7j", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" } ] }