Skip to content

Commit

Permalink
3 changes (0 new | 3 updated):
Browse files Browse the repository at this point in the history
      - 0 new CVEs:
      - 3 updated CVEs: CVE-2013-20001, CVE-2023-49298, CVE-2023-6710
  • Loading branch information
cvelistV5 Github Action committed Mar 18, 2024
1 parent a81e67e commit 31aedcf
Show file tree
Hide file tree
Showing 5 changed files with 154 additions and 135 deletions.
138 changes: 36 additions & 102 deletions cves/2013/20xxx/CVE-2013-20001.json
Original file line number Diff line number Diff line change
@@ -1,132 +1,66 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"state": "PUBLISHED",
"cveId": "CVE-2013-20001",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2024-03-18T22:06:03.072794",
"dateReserved": "2021-02-12T00:00:00",
"datePublished": "2021-02-12T00:00:00"
},
"containers": {
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2024-03-18T22:06:03.072794"
},
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied."
}
],
"problemTypes": [
"affected": [
{
"descriptions": [
"vendor": "n/a",
"product": "n/a",
"versions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
"version": "n/a",
"status": "affected"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-12T19:51:36",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/openzfs/zfs/issues/1894#issuecomment-30693652"
},
{
"url": "https://github.com/openzfs/zfs/releases"
},
{
"name": "[debian-lts-announce] 20240318 [SECURITY] [DLA 3766-1] zfs-linux security update",
"tags": [
"x_refsource_MISC"
"mailing-list"
],
"url": "https://github.com/openzfs/zfs/releases"
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-20001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/openzfs/zfs/issues/1894#issuecomment-30693652",
"refsource": "MISC",
"url": "https://github.com/openzfs/zfs/issues/1894#issuecomment-30693652"
},
"problemTypes": [
{
"descriptions": [
{
"name": "https://github.com/openzfs/zfs/releases",
"refsource": "MISC",
"url": "https://github.com/openzfs/zfs/releases"
"type": "text",
"lang": "en",
"description": "n/a"
}
]
}
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-20001",
"datePublished": "2021-02-12T19:51:36",
"dateReserved": "2021-02-12T00:00:00",
"dateUpdated": "2021-02-12T19:51:36",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
}
11 changes: 9 additions & 2 deletions cves/2023/49xxx/CVE-2023-49298.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"cveId": "CVE-2023-49298",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2023-12-26T14:18:08.307339",
"dateUpdated": "2024-03-18T22:06:01.490064",
"dateReserved": "2023-11-24T00:00:00",
"datePublished": "2023-11-24T00:00:00"
},
Expand All @@ -15,7 +15,7 @@
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2023-12-26T14:18:08.307339"
"dateUpdated": "2024-03-18T22:06:01.490064"
},
"descriptions": [
{
Expand Down Expand Up @@ -65,6 +65,13 @@
},
{
"url": "https://news.ycombinator.com/item?id=38770168"
},
{
"name": "[debian-lts-announce] 20240318 [SECURITY] [DLA 3766-1] zfs-linux security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html"
}
],
"problemTypes": [
Expand Down
72 changes: 63 additions & 9 deletions cves/2023/6xxx/CVE-2023-6710.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "redhat",
"dateReserved": "2023-12-12T06:15:58.379Z",
"datePublished": "2023-12-12T22:01:34.359Z",
"dateUpdated": "2024-01-25T11:37:55.808Z"
"dateUpdated": "2024-03-18T22:10:06.425Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -55,24 +55,62 @@
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 9",
"product": "JBoss Core Services for RHEL 8",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "mod_proxy_cluster",
"packageName": "jbcs-httpd24-mod_proxy_cluster",
"defaultStatus": "affected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
"versions": [
{
"version": "0:1.3.20-3.el8jbcs",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"cpe": [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat JBoss Core Services",
"collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
"product": "JBoss Core Services on RHEL 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "jbcs-httpd24-mod_proxy_cluster",
"defaultStatus": "affected",
"cpes": [
"versions": [
{
"version": "0:1.3.20-3.el7jbcs",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"cpe": [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat JBoss Core Services 1",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"defaultStatus": "unaffected",
"packageName": "jbcs-httpd24-mod_proxy_cluster",
"cpe": [
"cpe:/a:redhat:jboss_core_services:1"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 9",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "mod_proxy_cluster",
"defaultStatus": "affected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat JBoss Core Services",
Expand All @@ -85,6 +123,22 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:1316",
"name": "RHSA-2024:1316",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1317",
"name": "RHSA-2024:1317",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6710",
"tags": [
Expand Down Expand Up @@ -136,7 +190,7 @@
"providerMetadata": {
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat",
"dateUpdated": "2024-01-25T11:37:55.808Z"
"dateUpdated": "2024-03-18T22:10:06.425Z"
}
}
}
Expand Down
28 changes: 20 additions & 8 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,14 +1,26 @@
{
"fetchTime": "2024-03-18T21:58:12.511Z",
"numberOfChanges": 1,
"new": [
"fetchTime": "2024-03-18T22:13:12.689Z",
"numberOfChanges": 3,
"new": [],
"updated": [
{
"cveId": "CVE-2024-28865",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28865",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28865.json",
"dateUpdated": "2024-03-18T21:53:59.877Z"
"cveId": "CVE-2013-20001",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2013-20001",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2013/20xxx/CVE-2013-20001.json",
"dateUpdated": "2024-03-18T22:06:03.072794"
},
{
"cveId": "CVE-2023-49298",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-49298",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/49xxx/CVE-2023-49298.json",
"dateUpdated": "2024-03-18T22:06:01.490064"
},
{
"cveId": "CVE-2023-6710",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-6710",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/6xxx/CVE-2023-6710.json",
"dateUpdated": "2024-03-18T22:10:06.425Z"
}
],
"updated": [],
"error": []
}
Loading

0 comments on commit 31aedcf

Please sign in to comment.