Auto-Update: 2024-01-29T09:00:24.589595+00:00

This commit is contained in:
cad-safe-bot 2024-01-29 09:00:28 +00:00
parent 60c8ce528c
commit 5b93133bf8
6 changed files with 38 additions and 10 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-40032",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-11T19:15:43.603",
"lastModified": "2023-09-15T14:49:31.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-29T07:15:07.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "libvips is a demand-driven, horizontally threaded image processing library. A specially crafted SVG input can cause libvips versions 8.14.3 or earlier to segfault when attempting to parse a malformed UTF-8 character. Users should upgrade to libvips version 8.14.4 (or later) when processing untrusted input.\n"
},
{
"lang": "es",
"value": "libvips es una librer\u00eda de procesamiento de im\u00e1genes con subprocesos horizontales y basada en la demanda. Una entrada SVG manipulada puede provocar que las versiones 8.14.3 o anteriores de libvips generen un error de segmentaci\u00f3n al intentar analizar un car\u00e1cter UTF-8 con formato incorrecto. Los usuarios deben actualizar a libvips versi\u00f3n 8.14.4 (o posterior) cuando procesen entradas que no sean de confianza."
}
],
"metrics": {
@ -108,6 +112,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48795",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T16:15:10.897",
"lastModified": "2024-01-25T04:15:07.820",
"lastModified": "2024-01-29T07:15:07.890",
"vulnStatus": "Modified",
"descriptions": [
{
@ -1600,6 +1600,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5981",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-28T12:15:07.040",
"lastModified": "2024-01-25T18:15:08.577",
"lastModified": "2024-01-29T07:15:08.760",
"vulnStatus": "Modified",
"descriptions": [
{
@ -180,6 +180,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0553",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-16T12:15:45.557",
"lastModified": "2024-01-25T18:15:08.780",
"lastModified": "2024-01-29T07:15:09.050",
"vulnStatus": "Modified",
"descriptions": [
{
@ -166,6 +166,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0567",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-16T14:15:48.527",
"lastModified": "2024-01-25T16:15:08.510",
"lastModified": "2024-01-29T07:15:09.337",
"vulnStatus": "Modified",
"descriptions": [
{
@ -133,6 +133,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"source": "secalert@redhat.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-29T07:00:24.726037+00:00
2024-01-29T09:00:24.589595+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-29T06:15:07.307000+00:00
2024-01-29T07:15:09.337000+00:00
```
### Last Data Feed Release
@ -40,9 +40,13 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-01-29T06:15:07.307`)
* [CVE-2023-40032](CVE-2023/CVE-2023-400xx/CVE-2023-40032.json) (`2024-01-29T07:15:07.510`)
* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-01-29T07:15:07.890`)
* [CVE-2023-5981](CVE-2023/CVE-2023-59xx/CVE-2023-5981.json) (`2024-01-29T07:15:08.760`)
* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-01-29T07:15:09.050`)
* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-01-29T07:15:09.337`)
## Download and Usage