U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-2828

Change History

Initial Analysis by NIST 7/03/2023 3:11:56 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* versions from (including) 9.11.0 up to (including) 9.16.41
     *cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:* versions from (including) 9.11.3 up to (including) 9.16.41
     *cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* versions from (including) 9.18.0 up to (including) 9.18.15
     *cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:* versions from (including) 9.18.11 up to (including) 9.18.15
     *cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* versions from (including) 9.19.0 up to (including) 9.19.13
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST CWE-770
Changed Reference Type
http://www.openwall.com/lists/oss-security/2023/06/21/6 No Types Assigned
http://www.openwall.com/lists/oss-security/2023/06/21/6 Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://kb.isc.org/docs/cve-2023-2828 No Types Assigned
https://kb.isc.org/docs/cve-2023-2828 Vendor Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/ Mailing List, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/ Mailing List, Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20230703-0010/ No Types Assigned
https://security.netapp.com/advisory/ntap-20230703-0010/ Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2023/dsa-5439 No Types Assigned
https://www.debian.org/security/2023/dsa-5439 Third Party Advisory