diff --git a/2024/24xxx/CVE-2024-24891.json b/2024/24xxx/CVE-2024-24891.json index ba8d4268e78..e9fc51c736b 100644 --- a/2024/24xxx/CVE-2024-24891.json +++ b/2024/24xxx/CVE-2024-24891.json @@ -1,17 +1,145 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-24891", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securities@openeuler.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in openEuler kernel on Linux allows Resource Leak Exposure. This vulnerability is associated with program files https://gitee.Com/openeuler/kernel/blob/openEuler-1.0-LTS/drivers/staging/gmjstcm/tcm.C.\n\nThis issue affects kernel: from 4.19.90-2109.1.0.0108 before 4.19.90-2403.4.0.0244.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "openEuler", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "c04a1c6afc6bca0fa5739ecf4f58e4723d82e82f", + "status": "unaffected" + }, + { + "at": "4a049cbb02e83fdd7bd9400b6b6b27d1cda4fc99", + "status": "unaffected" + }, + { + "at": "08f66d6cf651fabd9dff262c300cb8cd7f8f0741", + "status": "unaffected" + }, + { + "at": "a3360846085a5558e5d8f9dd42a5c2e83345b4db", + "status": "unaffected" + } + ], + "lessThan": "4.19.90-2403.4.0.0244", + "status": "affected", + "version": "4.19.90-2109.1.0.0108", + "versionType": "git" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1358", + "refsource": "MISC", + "name": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1358" + }, + { + "url": "https://gitee.com/openeuler/kernel/pulls/2810", + "refsource": "MISC", + "name": "https://gitee.com/openeuler/kernel/pulls/2810" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1321", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1321" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1320", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1320" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1322", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1322" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "chlu22@m.fudan.edu.cn" + }, + { + "lang": "en", + "value": "caoyh23@m.fudan.edu.cn" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/24xxx/CVE-2024-24898.json b/2024/24xxx/CVE-2024-24898.json index 8607561d9f6..215040b47e0 100644 --- a/2024/24xxx/CVE-2024-24898.json +++ b/2024/24xxx/CVE-2024-24898.json @@ -1,17 +1,140 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-24898", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "securities@openeuler.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in openEuler kernel on Linux allows Resource Leak Exposure. This vulnerability is associated with program files https://gitee.Com/openeuler/kernel/blob/openEuler-1.0-LTS/drivers/staging/gmjstcm/tcm.C.\n\nThis issue affects kernel: from 4.19.90-2109.1.0.0108 before 4.19.90-2403.4.0.0244.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "openEuler", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "c04a1c6afc6bca0fa5739ecf4f58e4723d82e82f", + "status": "unaffected" + }, + { + "at": "4a049cbb02e83fdd7bd9400b6b6b27d1cda4fc99", + "status": "unaffected" + }, + { + "at": "08f66d6cf651fabd9dff262c300cb8cd7f8f0741", + "status": "unaffected" + }, + { + "at": "a3360846085a5558e5d8f9dd42a5c2e83345b4db", + "status": "unaffected" + } + ], + "lessThan": "4.19.90-2403.4.0.0244", + "status": "affected", + "version": "4.19.90-2109.1.0.0108", + "versionType": "git" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1358", + "refsource": "MISC", + "name": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1358" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1321", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1321" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1320", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1320" + }, + { + "url": "https://gitee.com/src-openeuler/kernel/pulls/1322", + "refsource": "MISC", + "name": "https://gitee.com/src-openeuler/kernel/pulls/1322" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "chlu22@m.fudan.edu.cn" + }, + { + "lang": "en", + "value": "caoyh23@m.fudan.edu.cn" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] }