diff --git a/2023/41xxx/CVE-2023-41355.json b/2023/41xxx/CVE-2023-41355.json index 27bce478c81..0cff3b30b6d 100644 --- a/2023/41xxx/CVE-2023-41355.json +++ b/2023/41xxx/CVE-2023-41355.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-20 Improper Input Validation", - "cweId": "CWE-20" + "value": "CWE-940 Improper Verification of Source of a Communication Channel", + "cweId": "CWE-940" } ] } @@ -75,10 +75,10 @@ { "base64": false, "type": "text/html", - "value": "\n\n\n\n\n\n\n\n\n\nUpdate version to G040WQR231013.

" + "value": "Update version to G040WQR231013.

" } ], - "value": "\n\n\n\n\n\n\n\n\nUpdate version to G040WQR231013.\n\n" + "value": "Update version to G040WQR231013." } ], "impact": { diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json index 8512d83ef30..f019cb19c88 100644 --- a/2024/1xxx/CVE-2024-1394.json +++ b/2024/1xxx/CVE-2024-1394.json @@ -587,7 +587,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.25.3-5.2.rhaos4.12.git44a2cb2.el9", + "version": "0:1.25.5-13.1.rhaos4.12.git76343da.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -629,7 +629,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8", + "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -643,7 +643,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-2.1.rhaos4.12.el8", + "version": "3:4.2.0-7.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -671,7 +671,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.9.4-3.2.rhaos4.12.el8", + "version": "2:1.9.4-3.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -692,7 +692,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-2.2.rhaos4.13.el9", + "version": "1:1.29.1-2.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -734,7 +734,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.26.0-4.2.el9", + "version": "0:1.26.0-4.1.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -776,7 +776,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-6.2.rhaos4.13.el9", + "version": "3:4.4.1-5.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -804,7 +804,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-2.2.rhaos4.13.el8", + "version": "2:1.11.2-2.2.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -853,7 +853,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.4-6.1.rhaos4.14.gitd09e4c0.el8", + "version": "0:1.27.4-6.1.rhaos4.14.gitd09e4c0.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -909,7 +909,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el8", + "version": "0:4.14.0-202403251040.p0.g607e2dd.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -923,7 +923,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-11.3.rhaos4.14.el9", + "version": "3:4.4.1-11.3.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1021,7 +1021,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.2.el9", + "version": "0:1.27.0-3.2.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1049,7 +1049,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el9", + "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1077,7 +1077,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g81558cc.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1119,7 +1119,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", + "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1147,7 +1147,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.2.rhaos4.14.el8", + "version": "4:1.1.12-1.2.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1161,7 +1161,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-10.4.rhaos4.14.el9", + "version": "2:1.11.2-10.4.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1252,7 +1252,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9", + "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1294,7 +1294,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9", + "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1322,7 +1322,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-21.1.rhaos4.15.el9", + "version": "3:4.4.1-21.1.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1336,7 +1336,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "4:1.1.12-1.1.rhaos4.15.el8", + "version": "4:1.1.12-1.1.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1350,7 +1350,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-21.2.rhaos4.15.el8", + "version": "2:1.11.2-21.2.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected"