From 6be55398209c44fbc8fe2a6c76e6a952238173a2 Mon Sep 17 00:00:00 2001 From: Daniel Beck Date: Thu, 27 Oct 2022 00:21:56 +0200 Subject: [PATCH] Reorder version ranges in some Jenkins CVEs towards JSON v5 --- 2022/20xxx/CVE-2022-20613.json | 8 ++++---- 2022/20xxx/CVE-2022-20614.json | 8 ++++---- 2022/23xxx/CVE-2022-23106.json | 8 ++++---- 2022/25xxx/CVE-2022-25175.json | 8 ++++---- 2022/25xxx/CVE-2022-25179.json | 8 ++++---- 2022/29xxx/CVE-2022-29036.json | 8 ++++---- 2022/29xxx/CVE-2022-29045.json | 8 ++++---- 2022/29xxx/CVE-2022-29049.json | 8 ++++---- 2022/34xxx/CVE-2022-34176.json | 8 ++++---- 2022/34xxx/CVE-2022-34177.json | 8 ++++---- 2022/43xxx/CVE-2022-43401.json | 8 ++++---- 2022/43xxx/CVE-2022-43402.json | 8 ++++---- 2022/43xxx/CVE-2022-43403.json | 8 ++++---- 2022/43xxx/CVE-2022-43404.json | 8 ++++---- 2022/43xxx/CVE-2022-43405.json | 8 ++++---- 2022/43xxx/CVE-2022-43407.json | 8 ++++---- 2022/43xxx/CVE-2022-43408.json | 8 ++++---- 17 files changed, 68 insertions(+), 68 deletions(-) diff --git a/2022/20xxx/CVE-2022-20613.json b/2022/20xxx/CVE-2022-20613.json index 0c3876141610..653e4092b296 100644 --- a/2022/20xxx/CVE-2022-20613.json +++ b/2022/20xxx/CVE-2022-20613.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Mailer Plugin", "version": { "version_data": [ - { - "version_value": "391.ve4a_38c1b_cf4b_", - "version_affected": "<=" - }, { "version_value": "1.34.2", "version_affected": "!" + }, + { + "version_value": "391.ve4a_38c1b_cf4b_", + "version_affected": "<=" } ] } diff --git a/2022/20xxx/CVE-2022-20614.json b/2022/20xxx/CVE-2022-20614.json index 246c36400af8..18cc68bfde17 100644 --- a/2022/20xxx/CVE-2022-20614.json +++ b/2022/20xxx/CVE-2022-20614.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Mailer Plugin", "version": { "version_data": [ - { - "version_value": "391.ve4a_38c1b_cf4b_", - "version_affected": "<=" - }, { "version_value": "1.34.2", "version_affected": "!" + }, + { + "version_value": "391.ve4a_38c1b_cf4b_", + "version_affected": "<=" } ] } diff --git a/2022/23xxx/CVE-2022-23106.json b/2022/23xxx/CVE-2022-23106.json index 6b00a15d49ea..cfba8a0c2312 100644 --- a/2022/23xxx/CVE-2022-23106.json +++ b/2022/23xxx/CVE-2022-23106.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Configuration as Code Plugin", "version": { "version_data": [ - { - "version_value": "1.55", - "version_affected": "<=" - }, { "version_value": "1.47.1", "version_affected": "!" @@ -30,6 +26,10 @@ { "version_value": "1.54.1", "version_affected": "!" + }, + { + "version_value": "1.55", + "version_affected": "<=" } ] } diff --git a/2022/25xxx/CVE-2022-25175.json b/2022/25xxx/CVE-2022-25175.json index f78d26eb0266..54d9ed1b8ac3 100644 --- a/2022/25xxx/CVE-2022-25175.json +++ b/2022/25xxx/CVE-2022-25175.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Pipeline: Multibranch Plugin", "version": { "version_data": [ - { - "version_value": "706.vd43c65dec013", - "version_affected": "<=" - }, { "version_value": "2.26.1", "version_affected": "!" @@ -30,6 +26,10 @@ { "version_value": "696.698.v9b4218eea50f", "version_affected": "!" + }, + { + "version_value": "706.vd43c65dec013", + "version_affected": "<=" } ] } diff --git a/2022/25xxx/CVE-2022-25179.json b/2022/25xxx/CVE-2022-25179.json index 1d0fbada336f..54686529543f 100644 --- a/2022/25xxx/CVE-2022-25179.json +++ b/2022/25xxx/CVE-2022-25179.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Pipeline: Multibranch Plugin", "version": { "version_data": [ - { - "version_value": "706.vd43c65dec013", - "version_affected": "<=" - }, { "version_value": "2.26.1", "version_affected": "!" @@ -30,6 +26,10 @@ { "version_value": "696.698.v9b4218eea50f", "version_affected": "!" + }, + { + "version_value": "706.vd43c65dec013", + "version_affected": "<=" } ] } diff --git a/2022/29xxx/CVE-2022-29036.json b/2022/29xxx/CVE-2022-29036.json index e530e28580af..da20ba623d46 100644 --- a/2022/29xxx/CVE-2022-29036.json +++ b/2022/29xxx/CVE-2022-29036.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Credentials Plugin", "version": { "version_data": [ - { - "version_value": "1111.v35a_307992395", - "version_affected": "<=" - }, { "version_value": "2.6.1.1", "version_affected": "!" @@ -30,6 +26,10 @@ { "version_value": "1087.1089.v2f1b_9a_b_040e4", "version_affected": "!" + }, + { + "version_value": "1111.v35a_307992395", + "version_affected": "<=" } ] } diff --git a/2022/29xxx/CVE-2022-29045.json b/2022/29xxx/CVE-2022-29045.json index cdfb1516c288..05a673dc98b8 100644 --- a/2022/29xxx/CVE-2022-29045.json +++ b/2022/29xxx/CVE-2022-29045.json @@ -15,13 +15,13 @@ "product_name": "Jenkins promoted builds Plugin", "version": { "version_data": [ - { - "version_value": "873.v6149db_d64130", - "version_affected": "<=" - }, { "version_value": "3.10.1", "version_affected": "!" + }, + { + "version_value": "873.v6149db_d64130", + "version_affected": "<=" } ] } diff --git a/2022/29xxx/CVE-2022-29049.json b/2022/29xxx/CVE-2022-29049.json index 36c7385cccca..992b7244108d 100644 --- a/2022/29xxx/CVE-2022-29049.json +++ b/2022/29xxx/CVE-2022-29049.json @@ -15,13 +15,13 @@ "product_name": "Jenkins promoted builds Plugin", "version": { "version_data": [ - { - "version_value": "873.v6149db_d64130", - "version_affected": "<=" - }, { "version_value": "3.10.1", "version_affected": "!" + }, + { + "version_value": "873.v6149db_d64130", + "version_affected": "<=" } ] } diff --git a/2022/34xxx/CVE-2022-34176.json b/2022/34xxx/CVE-2022-34176.json index 08a0a1ee5b41..3a34d0e72f0d 100644 --- a/2022/34xxx/CVE-2022-34176.json +++ b/2022/34xxx/CVE-2022-34176.json @@ -15,13 +15,13 @@ "product_name": "Jenkins JUnit Plugin", "version": { "version_data": [ - { - "version_value": "1119.va_a_5e9068da_d7", - "version_affected": "<=" - }, { "version_value": "1.53.0.1", "version_affected": "!" + }, + { + "version_value": "1119.va_a_5e9068da_d7", + "version_affected": "<=" } ] } diff --git a/2022/34xxx/CVE-2022-34177.json b/2022/34xxx/CVE-2022-34177.json index 7f2d0b50ce17..6e2c025e361f 100644 --- a/2022/34xxx/CVE-2022-34177.json +++ b/2022/34xxx/CVE-2022-34177.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Pipeline: Input Step Plugin", "version": { "version_data": [ - { - "version_value": "448.v37cea_9a_10a_70", - "version_affected": "<=" - }, { "version_value": "447.449.v193fd29f6021", "version_affected": "!" @@ -26,6 +22,10 @@ { "version_value": "2.12.2", "version_affected": "!" + }, + { + "version_value": "448.v37cea_9a_10a_70", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43401.json b/2022/43xxx/CVE-2022-43401.json index 5cbed6a71db8..1afde700014f 100644 --- a/2022/43xxx/CVE-2022-43401.json +++ b/2022/43xxx/CVE-2022-43401.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ - { - "version_value": "1183.v774b_0b_0a_a_451", - "version_affected": "<=" - }, { "version_value": "1175.1177.vda_175b_77d144", "version_affected": "!" + }, + { + "version_value": "1183.v774b_0b_0a_a_451", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43402.json b/2022/43xxx/CVE-2022-43402.json index 4f52a3554712..09b0b840d529 100644 --- a/2022/43xxx/CVE-2022-43402.json +++ b/2022/43xxx/CVE-2022-43402.json @@ -15,10 +15,6 @@ "product_name": "Jenkins Pipeline: Groovy Plugin", "version": { "version_data": [ - { - "version_value": "2802.v5ea_628154b_c2", - "version_affected": "<=" - }, { "version_value": "2759.2761.vd6e8d2a_15980", "version_affected": "!" @@ -26,6 +22,10 @@ { "version_value": "2746.2748.v365128b_c26d7", "version_affected": "!" + }, + { + "version_value": "2802.v5ea_628154b_c2", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43403.json b/2022/43xxx/CVE-2022-43403.json index ff9d79dfd0f7..4567d4acd77e 100644 --- a/2022/43xxx/CVE-2022-43403.json +++ b/2022/43xxx/CVE-2022-43403.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ - { - "version_value": "1183.v774b_0b_0a_a_451", - "version_affected": "<=" - }, { "version_value": "1175.1177.vda_175b_77d144", "version_affected": "!" + }, + { + "version_value": "1183.v774b_0b_0a_a_451", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43404.json b/2022/43xxx/CVE-2022-43404.json index f1714364511b..c4dea446a615 100644 --- a/2022/43xxx/CVE-2022-43404.json +++ b/2022/43xxx/CVE-2022-43404.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ - { - "version_value": "1183.v774b_0b_0a_a_451", - "version_affected": "<=" - }, { "version_value": "1175.1177.vda_175b_77d144", "version_affected": "!" + }, + { + "version_value": "1183.v774b_0b_0a_a_451", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43405.json b/2022/43xxx/CVE-2022-43405.json index c9271c195f80..927676d51a64 100644 --- a/2022/43xxx/CVE-2022-43405.json +++ b/2022/43xxx/CVE-2022-43405.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Pipeline: Groovy Libraries Plugin", "version": { "version_data": [ - { - "version_value": "612.v84da_9c54906d", - "version_affected": "<=" - }, { "version_value": "593.595.vfc6485d13dcd", "version_affected": "!" + }, + { + "version_value": "612.v84da_9c54906d", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43407.json b/2022/43xxx/CVE-2022-43407.json index 9a08838a83e8..e194a2c9409e 100644 --- a/2022/43xxx/CVE-2022-43407.json +++ b/2022/43xxx/CVE-2022-43407.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Pipeline: Input Step Plugin", "version": { "version_data": [ - { - "version_value": "451.vf1a_a_4f405289", - "version_affected": "<=" - }, { "version_value": "449.451.v9c3d42f23975", "version_affected": "!" + }, + { + "version_value": "451.vf1a_a_4f405289", + "version_affected": "<=" } ] } diff --git a/2022/43xxx/CVE-2022-43408.json b/2022/43xxx/CVE-2022-43408.json index 755e9066be2a..3bff48b2cfb7 100644 --- a/2022/43xxx/CVE-2022-43408.json +++ b/2022/43xxx/CVE-2022-43408.json @@ -15,13 +15,13 @@ "product_name": "Jenkins Pipeline: Stage View Plugin", "version": { "version_data": [ - { - "version_value": "2.26", - "version_affected": "<=" - }, { "version_value": "2.24.2", "version_affected": "!" + }, + { + "version_value": "2.26", + "version_affected": "<=" } ] }