diff --git a/2023/41xxx/CVE-2023-41355.json b/2023/41xxx/CVE-2023-41355.json
index 27bce478c81..0cff3b30b6d 100644
--- a/2023/41xxx/CVE-2023-41355.json
+++ b/2023/41xxx/CVE-2023-41355.json
@@ -21,8 +21,8 @@
"description": [
{
"lang": "eng",
- "value": "CWE-20 Improper Input Validation",
- "cweId": "CWE-20"
+ "value": "CWE-940 Improper Verification of Source of a Communication Channel",
+ "cweId": "CWE-940"
}
]
}
@@ -75,10 +75,10 @@
{
"base64": false,
"type": "text/html",
- "value": "\n\n\n\n\n\n\n\n\n\nUpdate version to G040WQR231013.
"
+ "value": "Update version to G040WQR231013.
"
}
],
- "value": "\n\n\n\n\n\n\n\n\nUpdate version to G040WQR231013.\n\n"
+ "value": "Update version to G040WQR231013."
}
],
"impact": {
diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json
index 8512d83ef30..f019cb19c88 100644
--- a/2024/1xxx/CVE-2024-1394.json
+++ b/2024/1xxx/CVE-2024-1394.json
@@ -587,7 +587,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:1.25.3-5.2.rhaos4.12.git44a2cb2.el9",
+ "version": "0:1.25.5-13.1.rhaos4.12.git76343da.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -629,7 +629,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8",
+ "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -643,7 +643,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "3:4.4.1-2.1.rhaos4.12.el8",
+ "version": "3:4.2.0-7.2.rhaos4.12.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -671,7 +671,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "2:1.9.4-3.2.rhaos4.12.el8",
+ "version": "2:1.9.4-3.2.rhaos4.12.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -692,7 +692,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "1:1.29.1-2.2.rhaos4.13.el9",
+ "version": "1:1.29.1-2.2.rhaos4.13.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -734,7 +734,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:1.26.0-4.2.el9",
+ "version": "0:1.26.0-4.1.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -776,7 +776,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "3:4.4.1-6.2.rhaos4.13.el9",
+ "version": "3:4.4.1-5.2.rhaos4.13.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -804,7 +804,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "2:1.11.2-2.2.rhaos4.13.el8",
+ "version": "2:1.11.2-2.2.rhaos4.13.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -853,7 +853,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:1.27.4-6.1.rhaos4.14.gitd09e4c0.el8",
+ "version": "0:1.27.4-6.1.rhaos4.14.gitd09e4c0.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -909,7 +909,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el8",
+ "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -923,7 +923,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "3:4.4.1-11.3.rhaos4.14.el9",
+ "version": "3:4.4.1-11.3.rhaos4.14.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1021,7 +1021,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:1.27.0-3.2.el9",
+ "version": "0:1.27.0-3.2.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1049,7 +1049,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el9",
+ "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1077,7 +1077,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el8",
+ "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1119,7 +1119,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9",
+ "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1147,7 +1147,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "4:1.1.12-1.2.rhaos4.14.el8",
+ "version": "4:1.1.12-1.2.rhaos4.14.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1161,7 +1161,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "2:1.11.2-10.4.rhaos4.14.el9",
+ "version": "2:1.11.2-10.4.rhaos4.14.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1252,7 +1252,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9",
+ "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1294,7 +1294,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9",
+ "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1322,7 +1322,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "3:4.4.1-21.1.rhaos4.15.el9",
+ "version": "3:4.4.1-21.1.rhaos4.15.el8",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1336,7 +1336,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "4:1.1.12-1.1.rhaos4.15.el8",
+ "version": "4:1.1.12-1.1.rhaos4.15.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
@@ -1350,7 +1350,7 @@
"x_cve_json_5_version_data": {
"versions": [
{
- "version": "2:1.11.2-21.2.rhaos4.15.el8",
+ "version": "2:1.11.2-21.2.rhaos4.15.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"