From e59d44552521aa30a824d392886e018b7f38b61f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 11 Sep 2023 06:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-09-11T06:00:26.345558+00:00 --- CVE-2023/CVE-2023-208xx/CVE-2023-20867.json | 6 ++- CVE-2023/CVE-2023-209xx/CVE-2023-20900.json | 8 +++- CVE-2023/CVE-2023-424xx/CVE-2023-42467.json | 24 +++++++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4874.json | 6 ++- CVE-2023/CVE-2023-48xx/CVE-2023-4875.json | 6 ++- README.md | 44 ++++++--------------- 6 files changed, 56 insertions(+), 38 deletions(-) create mode 100644 CVE-2023/CVE-2023-424xx/CVE-2023-42467.json diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json index d2b8ae41fea..1db9382e257 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20867", "sourceIdentifier": "security@vmware.com", "published": "2023-06-13T17:15:14.070", - "lastModified": "2023-08-17T19:15:10.463", + "lastModified": "2023-09-11T04:15:09.557", "vulnStatus": "Modified", "cisaExploitAdd": "2023-06-23", "cisaActionDue": "2023-07-14", @@ -108,6 +108,10 @@ "url": "https://security.netapp.com/advisory/ntap-20230725-0001/", "source": "security@vmware.com" }, + { + "url": "https://www.debian.org/security/2023/dsa-5493", + "source": "security@vmware.com" + }, { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0013.html", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json index 0d5de0deae2..b05736d38dc 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20900", "sourceIdentifier": "security@vmware.com", "published": "2023-08-31T10:15:08.247", - "lastModified": "2023-09-06T13:37:21.147", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-11T04:15:10.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -164,6 +164,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5493", + "source": "security@vmware.com" + }, { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0019.html", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json new file mode 100644 index 00000000000..f102ce03832 --- /dev/null +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-42467", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-11T04:15:10.720", + "lastModified": "2023-09-11T04:15:10.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.com/qemu-project/qemu/-/issues/1813", + "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.com/thuth/qemu/-/commit/3f91104484e5bf55b56d7e1b039a4a5a17d0c1a7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4874.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4874.json index e9ec0d6bf11..1f128ef21c6 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4874.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4874.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4874", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-09T15:15:34.623", - "lastModified": "2023-09-10T19:45:57.130", + "lastModified": "2023-09-11T04:15:10.833", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -54,6 +54,10 @@ { "url": "https://gitlab.com/muttmua/mutt/-/commit/a4752eb0ae0a521eec02e59e51ae5daedf74fda0.patch", "source": "cve@gitlab.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5494", + "source": "cve@gitlab.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4875.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4875.json index ad7090764fe..1d01aa8bfbd 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4875.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4875.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4875", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-09T15:15:35.500", - "lastModified": "2023-09-10T19:45:57.130", + "lastModified": "2023-09-11T04:15:11.010", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -54,6 +54,10 @@ { "url": "https://gitlab.com/muttmua/mutt/-/commit/4cc3128abdf52c615911589394a03271fddeefc6.patch", "source": "cve@gitlab.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5494", + "source": "cve@gitlab.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 82fa357b51f..499274c6a14 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-10T20:00:24.868411+00:00 +2023-09-11T06:00:26.345558+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-10T19:45:57.130000+00:00 +2023-09-11T04:15:11.010000+00:00 ``` ### Last Data Feed Release @@ -23,52 +23,30 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-09-10T00:00:13.544140+00:00 +2023-09-11T00:00:13.562919+00:00 ``` ### Total Number of included CVEs ```plain -224567 +224568 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2023-4878](CVE-2023/CVE-2023-48xx/CVE-2023-4878.json) (`2023-09-10T18:15:07.537`) -* [CVE-2023-4879](CVE-2023/CVE-2023-48xx/CVE-2023-4879.json) (`2023-09-10T18:15:08.003`) +* [CVE-2023-42467](CVE-2023/CVE-2023-424xx/CVE-2023-42467.json) (`2023-09-11T04:15:10.720`) ### CVEs modified in the last Commit -Recently modified CVEs: `47` +Recently modified CVEs: `4` -* [CVE-2023-41564](CVE-2023/CVE-2023-415xx/CVE-2023-41564.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4838](CVE-2023/CVE-2023-48xx/CVE-2023-4838.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4845](CVE-2023/CVE-2023-48xx/CVE-2023-4845.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4846](CVE-2023/CVE-2023-48xx/CVE-2023-4846.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4847](CVE-2023/CVE-2023-48xx/CVE-2023-4847.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4848](CVE-2023/CVE-2023-48xx/CVE-2023-4848.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4849](CVE-2023/CVE-2023-48xx/CVE-2023-4849.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4850](CVE-2023/CVE-2023-48xx/CVE-2023-4850.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4851](CVE-2023/CVE-2023-48xx/CVE-2023-4851.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4852](CVE-2023/CVE-2023-48xx/CVE-2023-4852.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4874](CVE-2023/CVE-2023-48xx/CVE-2023-4874.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4875](CVE-2023/CVE-2023-48xx/CVE-2023-4875.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4864](CVE-2023/CVE-2023-48xx/CVE-2023-4864.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-41915](CVE-2023/CVE-2023-419xx/CVE-2023-41915.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4865](CVE-2023/CVE-2023-48xx/CVE-2023-4865.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4866](CVE-2023/CVE-2023-48xx/CVE-2023-4866.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4867](CVE-2023/CVE-2023-48xx/CVE-2023-4867.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4868](CVE-2023/CVE-2023-48xx/CVE-2023-4868.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4869](CVE-2023/CVE-2023-48xx/CVE-2023-4869.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4876](CVE-2023/CVE-2023-48xx/CVE-2023-4876.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4877](CVE-2023/CVE-2023-48xx/CVE-2023-4877.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4870](CVE-2023/CVE-2023-48xx/CVE-2023-4870.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4871](CVE-2023/CVE-2023-48xx/CVE-2023-4871.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4872](CVE-2023/CVE-2023-48xx/CVE-2023-4872.json) (`2023-09-10T19:45:57.130`) -* [CVE-2023-4873](CVE-2023/CVE-2023-48xx/CVE-2023-4873.json) (`2023-09-10T19:45:57.130`) +* [CVE-2023-20867](CVE-2023/CVE-2023-208xx/CVE-2023-20867.json) (`2023-09-11T04:15:09.557`) +* [CVE-2023-20900](CVE-2023/CVE-2023-209xx/CVE-2023-20900.json) (`2023-09-11T04:15:10.330`) +* [CVE-2023-4874](CVE-2023/CVE-2023-48xx/CVE-2023-4874.json) (`2023-09-11T04:15:10.833`) +* [CVE-2023-4875](CVE-2023/CVE-2023-48xx/CVE-2023-4875.json) (`2023-09-11T04:15:11.010`) ## Download and Usage