diff --git a/2024/43xxx/CVE-2024-43338.json b/2024/43xxx/CVE-2024-43338.json index 335edbd43e1..e1536508bb1 100644 --- a/2024/43xxx/CVE-2024-43338.json +++ b/2024/43xxx/CVE-2024-43338.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50303.json b/2024/50xxx/CVE-2024-50303.json index 4076abb9c0b..f9ed4234e02 100644 --- a/2024/50xxx/CVE-2024-50303.json +++ b/2024/50xxx/CVE-2024-50303.json @@ -1,18 +1,102 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-50303", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nresource,kexec: walk_system_ram_res_rev must retain resource flags\n\nwalk_system_ram_res_rev() erroneously discards resource flags when passing\nthe information to the callback.\n\nThis causes systems with IORESOURCE_SYSRAM_DRIVER_MANAGED memory to have\nthese resources selected during kexec to store kexec buffers if that\nmemory happens to be at placed above normal system ram.\n\nThis leads to undefined behavior after reboot. If the kexec buffer is\nnever touched, nothing happens. If the kexec buffer is touched, it could\nlead to a crash (like below) or undefined behavior.\n\nTested on a system with CXL memory expanders with driver managed memory,\nTPM enabled, and CONFIG_IMA_KEXEC=y. Adding printk's showed the flags\nwere being discarded and as a result the check for\nIORESOURCE_SYSRAM_DRIVER_MANAGED passes.\n\nfind_next_iomem_res: name(System RAM (kmem))\n\t\t start(10000000000)\n\t\t end(1034fffffff)\n\t\t flags(83000200)\n\nlocate_mem_hole_top_down: start(10000000000) end(1034fffffff) flags(0)\n\n[.] BUG: unable to handle page fault for address: ffff89834ffff000\n[.] #PF: supervisor read access in kernel mode\n[.] #PF: error_code(0x0000) - not-present page\n[.] PGD c04c8bf067 P4D c04c8bf067 PUD c04c8be067 PMD 0\n[.] Oops: 0000 [#1] SMP\n[.] RIP: 0010:ima_restore_measurement_list+0x95/0x4b0\n[.] RSP: 0018:ffffc900000d3a80 EFLAGS: 00010286\n[.] RAX: 0000000000001000 RBX: 0000000000000000 RCX: ffff89834ffff000\n[.] RDX: 0000000000000018 RSI: ffff89834ffff000 RDI: ffff89834ffff018\n[.] RBP: ffffc900000d3ba0 R08: 0000000000000020 R09: ffff888132b8a900\n[.] R10: 4000000000000000 R11: 000000003a616d69 R12: 0000000000000000\n[.] R13: ffffffff8404ac28 R14: 0000000000000000 R15: ffff89834ffff000\n[.] FS: 0000000000000000(0000) GS:ffff893d44640000(0000) knlGS:0000000000000000\n[.] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[.] ata5: SATA link down (SStatus 0 SControl 300)\n[.] CR2: ffff89834ffff000 CR3: 000001034d00f001 CR4: 0000000000770ef0\n[.] PKRU: 55555554\n[.] Call Trace:\n[.] \n[.] ? __die+0x78/0xc0\n[.] ? page_fault_oops+0x2a8/0x3a0\n[.] ? exc_page_fault+0x84/0x130\n[.] ? asm_exc_page_fault+0x22/0x30\n[.] ? ima_restore_measurement_list+0x95/0x4b0\n[.] ? template_desc_init_fields+0x317/0x410\n[.] ? crypto_alloc_tfm_node+0x9c/0xc0\n[.] ? init_ima_lsm+0x30/0x30\n[.] ima_load_kexec_buffer+0x72/0xa0\n[.] ima_init+0x44/0xa0\n[.] __initstub__kmod_ima__373_1201_init_ima7+0x1e/0xb0\n[.] ? init_ima_lsm+0x30/0x30\n[.] do_one_initcall+0xad/0x200\n[.] ? idr_alloc_cyclic+0xaa/0x110\n[.] ? new_slab+0x12c/0x420\n[.] ? new_slab+0x12c/0x420\n[.] ? number+0x12a/0x430\n[.] ? sysvec_apic_timer_interrupt+0xa/0x80\n[.] ? asm_sysvec_apic_timer_interrupt+0x16/0x20\n[.] ? parse_args+0xd4/0x380\n[.] ? parse_args+0x14b/0x380\n[.] kernel_init_freeable+0x1c1/0x2b0\n[.] ? rest_init+0xb0/0xb0\n[.] kernel_init+0x16/0x1a0\n[.] ret_from_fork+0x2f/0x40\n[.] ? rest_init+0xb0/0xb0\n[.] ret_from_fork_asm+0x11/0x20\n[.] " } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7acf164b259d", + "version_value": "dc9031b7919b" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.8", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.8", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.7", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/dc9031b7919bd346514ea9a720f433b8daf3970d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/dc9031b7919bd346514ea9a720f433b8daf3970d" + }, + { + "url": "https://git.kernel.org/stable/c/b125a0def25a082ae944c9615208bf359abdb61c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b125a0def25a082ae944c9615208bf359abdb61c" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" } } \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50304.json b/2024/50xxx/CVE-2024-50304.json index 7703fb4d1b1..cfaaee17e96 100644 --- a/2024/50xxx/CVE-2024-50304.json +++ b/2024/50xxx/CVE-2024-50304.json @@ -1,18 +1,102 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-50304", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()\n\nThe per-netns IP tunnel hash table is protected by the RTNL mutex and\nip_tunnel_find() is only called from the control path where the mutex is\ntaken.\n\nAdd a lockdep expression to hlist_for_each_entry_rcu() in\nip_tunnel_find() in order to validate that the mutex is held and to\nsilence the suspicious RCU usage warning [1].\n\n[1]\nWARNING: suspicious RCU usage\n6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted\n-----------------------------\nnet/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n1 lock held by ip/362:\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60\n\nstack backtrace:\nCPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139\nHardware name: Bochs Bochs, BIOS Bochs 01/01/2011\nCall Trace:\n \n dump_stack_lvl+0xba/0x110\n lockdep_rcu_suspicious.cold+0x4f/0xd6\n ip_tunnel_find+0x435/0x4d0\n ip_tunnel_newlink+0x517/0x7a0\n ipgre_newlink+0x14c/0x170\n __rtnl_newlink+0x1173/0x19c0\n rtnl_newlink+0x6c/0xa0\n rtnetlink_rcv_msg+0x3cc/0xf60\n netlink_rcv_skb+0x171/0x450\n netlink_unicast+0x539/0x7f0\n netlink_sendmsg+0x8c1/0xd80\n ____sys_sendmsg+0x8f9/0xc20\n ___sys_sendmsg+0x197/0x1e0\n __sys_sendmsg+0x122/0x1f0\n do_syscall_64+0xbb/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "c54419321455", + "version_value": "f20fe2cfe06c" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "3.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "3.10", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.7", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/f20fe2cfe06ca1b008b09da4f2b4e0c5547ccef6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f20fe2cfe06ca1b008b09da4f2b4e0c5547ccef6" + }, + { + "url": "https://git.kernel.org/stable/c/90e0569dd3d32f4f4d2ca691d3fa5a8a14a13c12", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/90e0569dd3d32f4f4d2ca691d3fa5a8a14a13c12" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" } } \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50516.json b/2024/50xxx/CVE-2024-50516.json index ce4526b3ed7..21da9aab924 100644 --- a/2024/50xxx/CVE-2024-50516.json +++ b/2024/50xxx/CVE-2024-50516.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50517.json b/2024/50xxx/CVE-2024-50517.json index 00fa02c8933..9d816d0ff9b 100644 --- a/2024/50xxx/CVE-2024-50517.json +++ b/2024/50xxx/CVE-2024-50517.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50518.json b/2024/50xxx/CVE-2024-50518.json index dfd4c561387..ec974647344 100644 --- a/2024/50xxx/CVE-2024-50518.json +++ b/2024/50xxx/CVE-2024-50518.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50519.json b/2024/50xxx/CVE-2024-50519.json index fa5c2c517ad..72e3cc86543 100644 --- a/2024/50xxx/CVE-2024-50519.json +++ b/2024/50xxx/CVE-2024-50519.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50520.json b/2024/50xxx/CVE-2024-50520.json index 63eb90569aa..b834cbbfe4f 100644 --- a/2024/50xxx/CVE-2024-50520.json +++ b/2024/50xxx/CVE-2024-50520.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50521.json b/2024/50xxx/CVE-2024-50521.json index 596580f9212..55c76810f35 100644 --- a/2024/50xxx/CVE-2024-50521.json +++ b/2024/50xxx/CVE-2024-50521.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50522.json b/2024/50xxx/CVE-2024-50522.json index 1eb5a110e3d..8a6cfdd634d 100644 --- a/2024/50xxx/CVE-2024-50522.json +++ b/2024/50xxx/CVE-2024-50522.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/50xxx/CVE-2024-50532.json b/2024/50xxx/CVE-2024-50532.json index 2e8141a53ac..29ec202d8a7 100644 --- a/2024/50xxx/CVE-2024-50532.json +++ b/2024/50xxx/CVE-2024-50532.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51911.json b/2024/51xxx/CVE-2024-51911.json index 44da2de77de..7c428a90430 100644 --- a/2024/51xxx/CVE-2024-51911.json +++ b/2024/51xxx/CVE-2024-51911.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51912.json b/2024/51xxx/CVE-2024-51912.json index 0f5b81506b8..fc5b30326b8 100644 --- a/2024/51xxx/CVE-2024-51912.json +++ b/2024/51xxx/CVE-2024-51912.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51913.json b/2024/51xxx/CVE-2024-51913.json index 1b06792e6e9..e6fccd1d7d9 100644 --- a/2024/51xxx/CVE-2024-51913.json +++ b/2024/51xxx/CVE-2024-51913.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51914.json b/2024/51xxx/CVE-2024-51914.json index baf83a764a8..902643d923b 100644 --- a/2024/51xxx/CVE-2024-51914.json +++ b/2024/51xxx/CVE-2024-51914.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51916.json b/2024/51xxx/CVE-2024-51916.json index a27c73d90b4..8d4220574bd 100644 --- a/2024/51xxx/CVE-2024-51916.json +++ b/2024/51xxx/CVE-2024-51916.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51917.json b/2024/51xxx/CVE-2024-51917.json index a3bbd6e68ba..ba42c7ca96c 100644 --- a/2024/51xxx/CVE-2024-51917.json +++ b/2024/51xxx/CVE-2024-51917.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51918.json b/2024/51xxx/CVE-2024-51918.json index 12bfec2fe19..41cefcbbd9d 100644 --- a/2024/51xxx/CVE-2024-51918.json +++ b/2024/51xxx/CVE-2024-51918.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51920.json b/2024/51xxx/CVE-2024-51920.json index 44d26162a62..70f70ff86ef 100644 --- a/2024/51xxx/CVE-2024-51920.json +++ b/2024/51xxx/CVE-2024-51920.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51921.json b/2024/51xxx/CVE-2024-51921.json index bc31740efda..21a6f0c8266 100644 --- a/2024/51xxx/CVE-2024-51921.json +++ b/2024/51xxx/CVE-2024-51921.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51922.json b/2024/51xxx/CVE-2024-51922.json index c7bc4587048..de76e575585 100644 --- a/2024/51xxx/CVE-2024-51922.json +++ b/2024/51xxx/CVE-2024-51922.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51923.json b/2024/51xxx/CVE-2024-51923.json index 94dc23b637c..91354cbadf0 100644 --- a/2024/51xxx/CVE-2024-51923.json +++ b/2024/51xxx/CVE-2024-51923.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51924.json b/2024/51xxx/CVE-2024-51924.json index 38cd0aa732e..044c6cb0b6a 100644 --- a/2024/51xxx/CVE-2024-51924.json +++ b/2024/51xxx/CVE-2024-51924.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51925.json b/2024/51xxx/CVE-2024-51925.json index 7f82cb5baf5..0146ef4f31e 100644 --- a/2024/51xxx/CVE-2024-51925.json +++ b/2024/51xxx/CVE-2024-51925.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51926.json b/2024/51xxx/CVE-2024-51926.json index ed4d62fdfd3..3872876f4aa 100644 --- a/2024/51xxx/CVE-2024-51926.json +++ b/2024/51xxx/CVE-2024-51926.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51927.json b/2024/51xxx/CVE-2024-51927.json index 7ec4d8a3c9d..f4e2d799281 100644 --- a/2024/51xxx/CVE-2024-51927.json +++ b/2024/51xxx/CVE-2024-51927.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51928.json b/2024/51xxx/CVE-2024-51928.json index 9683dc5d56b..2daed5e12a2 100644 --- a/2024/51xxx/CVE-2024-51928.json +++ b/2024/51xxx/CVE-2024-51928.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51929.json b/2024/51xxx/CVE-2024-51929.json index 529367638bf..4376f458fde 100644 --- a/2024/51xxx/CVE-2024-51929.json +++ b/2024/51xxx/CVE-2024-51929.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51930.json b/2024/51xxx/CVE-2024-51930.json index 632139f069e..860d70f7bf1 100644 --- a/2024/51xxx/CVE-2024-51930.json +++ b/2024/51xxx/CVE-2024-51930.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51931.json b/2024/51xxx/CVE-2024-51931.json index 68eb9e96698..5003f3f3280 100644 --- a/2024/51xxx/CVE-2024-51931.json +++ b/2024/51xxx/CVE-2024-51931.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51932.json b/2024/51xxx/CVE-2024-51932.json index 4474f87fbee..67ff8be01bb 100644 --- a/2024/51xxx/CVE-2024-51932.json +++ b/2024/51xxx/CVE-2024-51932.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51933.json b/2024/51xxx/CVE-2024-51933.json index f9dfec5dea1..9c49ae75f69 100644 --- a/2024/51xxx/CVE-2024-51933.json +++ b/2024/51xxx/CVE-2024-51933.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51934.json b/2024/51xxx/CVE-2024-51934.json index 728b5a4ef81..6fa445e5ebb 100644 --- a/2024/51xxx/CVE-2024-51934.json +++ b/2024/51xxx/CVE-2024-51934.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51935.json b/2024/51xxx/CVE-2024-51935.json index 39b349bd274..ec15e64f3b4 100644 --- a/2024/51xxx/CVE-2024-51935.json +++ b/2024/51xxx/CVE-2024-51935.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51936.json b/2024/51xxx/CVE-2024-51936.json index be50f9660bd..edd600e4cab 100644 --- a/2024/51xxx/CVE-2024-51936.json +++ b/2024/51xxx/CVE-2024-51936.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51937.json b/2024/51xxx/CVE-2024-51937.json index 31d58f816f8..de01195aff1 100644 --- a/2024/51xxx/CVE-2024-51937.json +++ b/2024/51xxx/CVE-2024-51937.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/51xxx/CVE-2024-51938.json b/2024/51xxx/CVE-2024-51938.json index 0d5751d9aa9..c9da69f71a5 100644 --- a/2024/51xxx/CVE-2024-51938.json +++ b/2024/51xxx/CVE-2024-51938.json @@ -68,19 +68,6 @@ "source": { "discovery": "EXTERNAL" }, - "solution": [ - { - "lang": "en", - "supportingMedia": [ - { - "base64": false, - "type": "text/html", - "value": "Deactivate and delete." - } - ], - "value": "Deactivate and delete." - } - ], "credits": [ { "lang": "en", diff --git a/2024/53xxx/CVE-2024-53042.json b/2024/53xxx/CVE-2024-53042.json new file mode 100644 index 00000000000..51b138482e9 --- /dev/null +++ b/2024/53xxx/CVE-2024-53042.json @@ -0,0 +1,156 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53042", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()\n\nThere are code paths from which the function is called without holding\nthe RCU read lock, resulting in a suspicious RCU usage warning [1].\n\nFix by using l3mdev_master_upper_ifindex_by_index() which will acquire\nthe RCU read lock before calling\nl3mdev_master_upper_ifindex_by_index_rcu().\n\n[1]\nWARNING: suspicious RCU usage\n6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted\n-----------------------------\nnet/core/dev.c:876 RCU-list traversed in non-reader section!!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n1 lock held by ip/361:\n #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 361 Comm: ip Not tainted 6.12.0-rc3-custom-gac8f72681cf2 #141\nHardware name: Bochs Bochs, BIOS Bochs 01/01/2011\nCall Trace:\n \n dump_stack_lvl+0xba/0x110\n lockdep_rcu_suspicious.cold+0x4f/0xd6\n dev_get_by_index_rcu+0x1d3/0x210\n l3mdev_master_upper_ifindex_by_index_rcu+0x2b/0xf0\n ip_tunnel_bind_dev+0x72f/0xa00\n ip_tunnel_newlink+0x368/0x7a0\n ipgre_newlink+0x14c/0x170\n __rtnl_newlink+0x1173/0x19c0\n rtnl_newlink+0x6c/0xa0\n rtnetlink_rcv_msg+0x3cc/0xf60\n netlink_rcv_skb+0x171/0x450\n netlink_unicast+0x539/0x7f0\n netlink_sendmsg+0x8c1/0xd80\n ____sys_sendmsg+0x8f9/0xc20\n ___sys_sendmsg+0x197/0x1e0\n __sys_sendmsg+0x122/0x1f0\n do_syscall_64+0xbb/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "ab6c9463b137", + "version_value": "e2742758c9c8" + }, + { + "version_affected": "<", + "version_name": "760852df5707", + "version_value": "5edcb3fdb12c" + }, + { + "version_affected": "<", + "version_name": "db53cd3d88dc", + "version_value": "72c0f482e39c" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.18", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.18", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.229", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.171", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.116", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.60", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.7", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/e2742758c9c85c84e077ede5f916479f724e11c2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e2742758c9c85c84e077ede5f916479f724e11c2" + }, + { + "url": "https://git.kernel.org/stable/c/5edcb3fdb12c3d46a6e79eeeec27d925b80fc168", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5edcb3fdb12c3d46a6e79eeeec27d925b80fc168" + }, + { + "url": "https://git.kernel.org/stable/c/72c0f482e39c87317ebf67661e28c8d86c93e870", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/72c0f482e39c87317ebf67661e28c8d86c93e870" + }, + { + "url": "https://git.kernel.org/stable/c/699b48fc31727792edf2cab3829586ae6ba649e2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/699b48fc31727792edf2cab3829586ae6ba649e2" + }, + { + "url": "https://git.kernel.org/stable/c/6dfaa458fe923211c766238a224e0a3c0522935c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6dfaa458fe923211c766238a224e0a3c0522935c" + }, + { + "url": "https://git.kernel.org/stable/c/ad4a3ca6a8e886f6491910a3ae5d53595e40597d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ad4a3ca6a8e886f6491910a3ae5d53595e40597d" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53060.json b/2024/53xxx/CVE-2024-53060.json new file mode 100644 index 00000000000..8a005877c9a --- /dev/null +++ b/2024/53xxx/CVE-2024-53060.json @@ -0,0 +1,158 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53060", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\n\nacpi_evaluate_object() may return AE_NOT_FOUND (failure), which\nwould result in dereferencing buffer.pointer (obj) while being NULL.\n\nAlthough this case may be unrealistic for the current code, it is\nstill better to protect against possible bugs.\n\nBail out also when status is AE_NOT_FOUND.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity\nReport: CID 1600951: Null pointer dereferences (FORWARD_NULL)\n\n(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "ce8a00a00e36" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.19.324", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.286", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.230", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.172", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.117", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43" + }, + { + "url": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b" + }, + { + "url": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7" + }, + { + "url": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe" + }, + { + "url": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80" + }, + { + "url": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b" + }, + { + "url": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30" + }, + { + "url": "https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53061.json b/2024/53xxx/CVE-2024-53061.json new file mode 100644 index 00000000000..7bdd7a2e178 --- /dev/null +++ b/2024/53xxx/CVE-2024-53061.json @@ -0,0 +1,168 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53061", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p-jpeg: prevent buffer overflows\n\nThe current logic allows word to be less than 2. If this happens,\nthere will be buffer overflows, as reported by smatch. Add extra\nchecks to prevent it.\n\nWhile here, remove an unused word = 0 assignment." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6c96dbbc2aa9", + "version_value": "c5f6fefcda8f" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.4", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.324", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.286", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.230", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.172", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.117", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/c5f6fefcda8fac8f082b6c5bf416567f4e100c51", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c5f6fefcda8fac8f082b6c5bf416567f4e100c51" + }, + { + "url": "https://git.kernel.org/stable/c/e5117f6e7adcf9fd7546cdd0edc9abe4474bc98b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e5117f6e7adcf9fd7546cdd0edc9abe4474bc98b" + }, + { + "url": "https://git.kernel.org/stable/c/f54e8e1e39dacccebcfb9a9a36f0552a0a97e2ef", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f54e8e1e39dacccebcfb9a9a36f0552a0a97e2ef" + }, + { + "url": "https://git.kernel.org/stable/c/a930cddfd153b5d4401df0c01effa14c831ff21e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a930cddfd153b5d4401df0c01effa14c831ff21e" + }, + { + "url": "https://git.kernel.org/stable/c/c85db2d4432de4ff9d97006691ce2dcb5bda660e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c85db2d4432de4ff9d97006691ce2dcb5bda660e" + }, + { + "url": "https://git.kernel.org/stable/c/784bc785a453eb2f8433dd62075befdfa1b2d6fd", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/784bc785a453eb2f8433dd62075befdfa1b2d6fd" + }, + { + "url": "https://git.kernel.org/stable/c/c951a0859fdacf49a2298b5551a7e52b95ff6f51", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c951a0859fdacf49a2298b5551a7e52b95ff6f51" + }, + { + "url": "https://git.kernel.org/stable/c/14a22762c3daeac59a5a534e124acbb4d7a79b3a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/14a22762c3daeac59a5a534e124acbb4d7a79b3a" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53062.json b/2024/53xxx/CVE-2024-53062.json new file mode 100644 index 00000000000..8afb598eb74 --- /dev/null +++ b/2024/53xxx/CVE-2024-53062.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53062", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mgb4: protect driver against spectre\n\nFrequency range is set from sysfs via frequency_range_store(),\nbeing vulnerable to spectre, as reported by smatch:\n\n\tdrivers/media/pci/mgb4/mgb4_cmt.c:231 mgb4_cmt_set_vin_freq_range() warn: potential spectre issue 'cmt_vals_in' [r]\n\tdrivers/media/pci/mgb4/mgb4_cmt.c:238 mgb4_cmt_set_vin_freq_range() warn: possible spectre second half. 'reg_set'\n\nFix it." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0ab13674a9bd", + "version_value": "e0bc90742bbd" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.7", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/e0bc90742bbd6eb9c63e6c22f8f6e10be7b1e225", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e0bc90742bbd6eb9c63e6c22f8f6e10be7b1e225" + }, + { + "url": "https://git.kernel.org/stable/c/2aee207e5b3c94ef859316008119ea06d6798d49", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2aee207e5b3c94ef859316008119ea06d6798d49" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53063.json b/2024/53xxx/CVE-2024-53063.json new file mode 100644 index 00000000000..f1fcb8d2382 --- /dev/null +++ b/2024/53xxx/CVE-2024-53063.json @@ -0,0 +1,168 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53063", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: prevent the risk of out of memory access\n\nThe dvbdev contains a static variable used to store dvb minors.\n\nThe behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set\nor not. When not set, dvb_register_device() won't check for\nboundaries, as it will rely that a previous call to\ndvb_register_adapter() would already be enforcing it.\n\nOn a similar way, dvb_device_open() uses the assumption\nthat the register functions already did the needed checks.\n\nThis can be fragile if some device ends using different\ncalls. This also generate warnings on static check analysers\nlike Coverity.\n\nSo, add explicit guards to prevent potential risk of OOM issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5dd3f3071070", + "version_value": "fedfde9deb83" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.6.29", + "status": "affected" + }, + { + "version": "0", + "lessThan": "2.6.29", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.324", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.286", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.230", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.172", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.117", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/fedfde9deb83ac8d2f3d5f36f111023df34b1684", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fedfde9deb83ac8d2f3d5f36f111023df34b1684" + }, + { + "url": "https://git.kernel.org/stable/c/3b88675e18b6517043a6f734eaa8ea6eb3bfa140", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3b88675e18b6517043a6f734eaa8ea6eb3bfa140" + }, + { + "url": "https://git.kernel.org/stable/c/a4a17210c03ade1c8d9a9f193a105654b7a05c11", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a4a17210c03ade1c8d9a9f193a105654b7a05c11" + }, + { + "url": "https://git.kernel.org/stable/c/5f76f7df14861e3a560898fa41979ec92424b58f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5f76f7df14861e3a560898fa41979ec92424b58f" + }, + { + "url": "https://git.kernel.org/stable/c/b751a96025275c17f04083cbfe856822f1658946", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b751a96025275c17f04083cbfe856822f1658946" + }, + { + "url": "https://git.kernel.org/stable/c/1e461672616b726f29261ee81bb991528818537c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1e461672616b726f29261ee81bb991528818537c" + }, + { + "url": "https://git.kernel.org/stable/c/9c17085fabbde2041c893d29599800f2d4992b23", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9c17085fabbde2041c893d29599800f2d4992b23" + }, + { + "url": "https://git.kernel.org/stable/c/972e63e895abbe8aa1ccbdbb4e6362abda7cd457", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/972e63e895abbe8aa1ccbdbb4e6362abda7cd457" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53064.json b/2024/53xxx/CVE-2024-53064.json new file mode 100644 index 00000000000..927457839db --- /dev/null +++ b/2024/53xxx/CVE-2024-53064.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53064", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix idpf_vc_core_init error path\n\nIn an event where the platform running the device control plane\nis rebooted, reset is detected on the driver. It releases\nall the resources and waits for the reset to complete. Once the\nreset is done, it tries to build the resources back. At this\ntime if the device control plane is not yet started, then\nthe driver timeouts on the virtchnl message and retries to\nestablish the mailbox again.\n\nIn the retry flow, mailbox is deinitialized but the mailbox\nworkqueue is still alive and polling for the mailbox message.\nThis results in accessing the released control queue leading to\nnull-ptr-deref. Fix it by unrolling the work queue cancellation\nand mailbox deinitialization in the reverse order which they got\ninitialized." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4930fbf419a7", + "version_value": "683fcd90ba22" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.7", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266" + }, + { + "url": "https://git.kernel.org/stable/c/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53065.json b/2024/53xxx/CVE-2024-53065.json new file mode 100644 index 00000000000..6e7a6e2af4d --- /dev/null +++ b/2024/53xxx/CVE-2024-53065.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53065", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: fix warning caused by duplicate kmem_cache creation in kmem_buckets_create\n\nCommit b035f5a6d852 (\"mm: slab: reduce the kmalloc() minimum alignment\nif DMA bouncing possible\") reduced ARCH_KMALLOC_MINALIGN to 8 on arm64.\nHowever, with KASAN_HW_TAGS enabled, arch_slab_minalign() becomes 16.\nThis causes kmalloc_caches[*][8] to be aliased to kmalloc_caches[*][16],\nresulting in kmem_buckets_create() attempting to create a kmem_cache for\nsize 16 twice. This duplication triggers warnings on boot:\n\n[ 2.325108] ------------[ cut here ]------------\n[ 2.325135] kmem_cache of name 'memdup_user-16' already exists\n[ 2.325783] WARNING: CPU: 0 PID: 1 at mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0\n[ 2.327957] Modules linked in:\n[ 2.328550] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5mm-unstable-arm64+ #12\n[ 2.328683] Hardware name: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024\n[ 2.328790] pstate: 61000009 (nZCv daif -PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2.328911] pc : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.328930] lr : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.328942] sp : ffff800083d6fc50\n[ 2.328961] x29: ffff800083d6fc50 x28: f2ff0000c1674410 x27: ffff8000820b0598\n[ 2.329061] x26: 000000007fffffff x25: 0000000000000010 x24: 0000000000002000\n[ 2.329101] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388\n[ 2.329118] x20: f2ff0000c1674410 x19: f5ff0000c16364c0 x18: ffff800083d80030\n[ 2.329135] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 2.329152] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120\n[ 2.329169] x11: 656820747563205b x10: 2d2d2d2d2d2d2d2d x9 : 0000000000000000\n[ 2.329194] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n[ 2.329210] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 2.329226] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n[ 2.329291] Call trace:\n[ 2.329407] __kmem_cache_create_args+0xb8/0x3b0\n[ 2.329499] kmem_buckets_create+0xfc/0x320\n[ 2.329526] init_user_buckets+0x34/0x78\n[ 2.329540] do_one_initcall+0x64/0x3c8\n[ 2.329550] kernel_init_freeable+0x26c/0x578\n[ 2.329562] kernel_init+0x3c/0x258\n[ 2.329574] ret_from_fork+0x10/0x20\n[ 2.329698] ---[ end trace 0000000000000000 ]---\n\n[ 2.403704] ------------[ cut here ]------------\n[ 2.404716] kmem_cache of name 'msg_msg-16' already exists\n[ 2.404801] WARNING: CPU: 2 PID: 1 at mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0\n[ 2.404842] Modules linked in:\n[ 2.404971] CPU: 2 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W 6.12.0-rc5mm-unstable-arm64+ #12\n[ 2.405026] Tainted: [W]=WARN\n[ 2.405043] Hardware name: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024\n[ 2.405057] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2.405079] pc : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.405100] lr : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.405111] sp : ffff800083d6fc50\n[ 2.405115] x29: ffff800083d6fc50 x28: fbff0000c1674410 x27: ffff8000820b0598\n[ 2.405135] x26: 000000000000ffd0 x25: 0000000000000010 x24: 0000000000006000\n[ 2.405153] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388\n[ 2.405169] x20: fbff0000c1674410 x19: fdff0000c163d6c0 x18: ffff800083d80030\n[ 2.405185] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 2.405201] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120\n[ 2.405217] x11: 656820747563205b x10: 2d2d2d2d2d2d2d2d x9 : 0000000000000000\n[ 2.405233] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n[ 2.405248] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 2.405271] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n[ 2.405287] Call trace:\n[ 2\n---truncated---" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "b32801d1255b", + "version_value": "1b47f9febf48" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.11", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1b47f9febf48641d3530ec877f4d0995c58e6b73", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1b47f9febf48641d3530ec877f4d0995c58e6b73" + }, + { + "url": "https://git.kernel.org/stable/c/9c9201afebea1efc7ea4b8f721ee18a05bb8aca1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9c9201afebea1efc7ea4b8f721ee18a05bb8aca1" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53066.json b/2024/53xxx/CVE-2024-53066.json new file mode 100644 index 00000000000..197f81753a2 --- /dev/null +++ b/2024/53xxx/CVE-2024-53066.json @@ -0,0 +1,168 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53066", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Fix KMSAN warning in decode_getfattr_attrs()\n\nFix the following KMSAN warning:\n\nCPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B\nTainted: [B]=BAD_PAGE\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009)\n=====================================================\n=====================================================\nBUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90\n decode_getfattr_attrs+0x2d6d/0x2f90\n decode_getfattr_generic+0x806/0xb00\n nfs4_xdr_dec_getattr+0x1de/0x240\n rpcauth_unwrap_resp_decode+0xab/0x100\n rpcauth_unwrap_resp+0x95/0xc0\n call_decode+0x4ff/0xb50\n __rpc_execute+0x57b/0x19d0\n rpc_execute+0x368/0x5e0\n rpc_run_task+0xcfe/0xee0\n nfs4_proc_getattr+0x5b5/0x990\n __nfs_revalidate_inode+0x477/0xd00\n nfs_access_get_cached+0x1021/0x1cc0\n nfs_do_access+0x9f/0xae0\n nfs_permission+0x1e4/0x8c0\n inode_permission+0x356/0x6c0\n link_path_walk+0x958/0x1330\n path_lookupat+0xce/0x6b0\n filename_lookup+0x23e/0x770\n vfs_statx+0xe7/0x970\n vfs_fstatat+0x1f2/0x2c0\n __se_sys_newfstatat+0x67/0x880\n __x64_sys_newfstatat+0xbd/0x120\n x64_sys_call+0x1826/0x3cf0\n do_syscall_64+0xd0/0x1b0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe KMSAN warning is triggered in decode_getfattr_attrs(), when calling\ndecode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not\ninitialized.\n\nFix the issue by initializing fattr->mdsthreshold to NULL in\nnfs_fattr_init()." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "88034c3d88c2", + "version_value": "25ffd294fef8" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "3.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "3.5", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.324", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.286", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.230", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.172", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.117", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/25ffd294fef81a7f3cd9528adf21560c04d98747", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/25ffd294fef81a7f3cd9528adf21560c04d98747" + }, + { + "url": "https://git.kernel.org/stable/c/bbfcd261cc068fe1cd02a4e871275074a0daa4e2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bbfcd261cc068fe1cd02a4e871275074a0daa4e2" + }, + { + "url": "https://git.kernel.org/stable/c/8fc5ea9231af9122d227c9c13f5e578fca48d2e3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8fc5ea9231af9122d227c9c13f5e578fca48d2e3" + }, + { + "url": "https://git.kernel.org/stable/c/9b453e8b108a5a93a6e348cf2ba4c9c138314a00", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9b453e8b108a5a93a6e348cf2ba4c9c138314a00" + }, + { + "url": "https://git.kernel.org/stable/c/f6b2b2b981af8e7d7c62d34143acefa4e1edfe8b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f6b2b2b981af8e7d7c62d34143acefa4e1edfe8b" + }, + { + "url": "https://git.kernel.org/stable/c/f749cb60a01f8391c760a1d6ecd938cadacf9549", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f749cb60a01f8391c760a1d6ecd938cadacf9549" + }, + { + "url": "https://git.kernel.org/stable/c/9be0a21ae52b3b822d0eec4d14e909ab394f8a92", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9be0a21ae52b3b822d0eec4d14e909ab394f8a92" + }, + { + "url": "https://git.kernel.org/stable/c/dc270d7159699ad6d11decadfce9633f0f71c1db", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/dc270d7159699ad6d11decadfce9633f0f71c1db" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53067.json b/2024/53xxx/CVE-2024-53067.json new file mode 100644 index 00000000000..dc7ca81ccd6 --- /dev/null +++ b/2024/53xxx/CVE-2024-53067.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53067", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Start the RTC update work later\n\nThe RTC update work involves runtime resuming the UFS controller. Hence,\nonly start the RTC update work after runtime power management in the UFS\ndriver has been fully initialized. This patch fixes the following kernel\ncrash:\n\nInternal error: Oops: 0000000096000006 [#1] PREEMPT SMP\nWorkqueue: events ufshcd_rtc_work\nCall trace:\n _raw_spin_lock_irqsave+0x34/0x8c (P)\n pm_runtime_get_if_active+0x24/0x9c (L)\n pm_runtime_get_if_active+0x24/0x9c\n ufshcd_rtc_work+0x138/0x1b4\n process_one_work+0x148/0x288\n worker_thread+0x2cc/0x3d4\n kthread+0x110/0x114\n ret_from_fork+0x10/0x20" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6bf999e0eb41", + "version_value": "4c25f784fba8" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.8", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.8", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/4c25f784fba81227e0437337f962d34380d1c250", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4c25f784fba81227e0437337f962d34380d1c250" + }, + { + "url": "https://git.kernel.org/stable/c/54c814c8b23bc7617be3d46abdb896937695dbfa", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/54c814c8b23bc7617be3d46abdb896937695dbfa" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53068.json b/2024/53xxx/CVE-2024-53068.json new file mode 100644 index 00000000000..646daf681fd --- /dev/null +++ b/2024/53xxx/CVE-2024-53068.json @@ -0,0 +1,113 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53068", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()\n\nThe scmi_dev->name is released prematurely in __scmi_device_destroy(),\nwhich causes slab-use-after-free when accessing scmi_dev->name in\nscmi_bus_notifier(). So move the release of scmi_dev->name to\nscmi_device_release() to avoid slab-use-after-free.\n\n | BUG: KASAN: slab-use-after-free in strncmp+0xe4/0xec\n | Read of size 1 at addr ffffff80a482bcc0 by task swapper/0/1\n |\n | CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.6.38-debug #1\n | Hardware name: Qualcomm Technologies, Inc. SA8775P Ride (DT)\n | Call trace:\n | dump_backtrace+0x94/0x114\n | show_stack+0x18/0x24\n | dump_stack_lvl+0x48/0x60\n | print_report+0xf4/0x5b0\n | kasan_report+0xa4/0xec\n | __asan_report_load1_noabort+0x20/0x2c\n | strncmp+0xe4/0xec\n | scmi_bus_notifier+0x5c/0x54c\n | notifier_call_chain+0xb4/0x31c\n | blocking_notifier_call_chain+0x68/0x9c\n | bus_notify+0x54/0x78\n | device_del+0x1bc/0x840\n | device_unregister+0x20/0xb4\n | __scmi_device_destroy+0xac/0x280\n | scmi_device_destroy+0x94/0xd0\n | scmi_chan_setup+0x524/0x750\n | scmi_probe+0x7fc/0x1508\n | platform_probe+0xc4/0x19c\n | really_probe+0x32c/0x99c\n | __driver_probe_device+0x15c/0x3c4\n | driver_probe_device+0x5c/0x170\n | __driver_attach+0x1c8/0x440\n | bus_for_each_dev+0xf4/0x178\n | driver_attach+0x3c/0x58\n | bus_add_driver+0x234/0x4d4\n | driver_register+0xf4/0x3c0\n | __platform_driver_register+0x60/0x88\n | scmi_driver_init+0xb0/0x104\n | do_one_initcall+0xb4/0x664\n | kernel_init_freeable+0x3c8/0x894\n | kernel_init+0x24/0x1e8\n | ret_from_fork+0x10/0x20\n |\n | Allocated by task 1:\n | kasan_save_stack+0x2c/0x54\n | kasan_set_track+0x2c/0x40\n | kasan_save_alloc_info+0x24/0x34\n | __kasan_kmalloc+0xa0/0xb8\n | __kmalloc_node_track_caller+0x6c/0x104\n | kstrdup+0x48/0x84\n | kstrdup_const+0x34/0x40\n | __scmi_device_create.part.0+0x8c/0x408\n | scmi_device_create+0x104/0x370\n | scmi_chan_setup+0x2a0/0x750\n | scmi_probe+0x7fc/0x1508\n | platform_probe+0xc4/0x19c\n | really_probe+0x32c/0x99c\n | __driver_probe_device+0x15c/0x3c4\n | driver_probe_device+0x5c/0x170\n | __driver_attach+0x1c8/0x440\n | bus_for_each_dev+0xf4/0x178\n | driver_attach+0x3c/0x58\n | bus_add_driver+0x234/0x4d4\n | driver_register+0xf4/0x3c0\n | __platform_driver_register+0x60/0x88\n | scmi_driver_init+0xb0/0x104\n | do_one_initcall+0xb4/0x664\n | kernel_init_freeable+0x3c8/0x894\n | kernel_init+0x24/0x1e8\n | ret_from_fork+0x10/0x20\n |\n | Freed by task 1:\n | kasan_save_stack+0x2c/0x54\n | kasan_set_track+0x2c/0x40\n | kasan_save_free_info+0x38/0x5c\n | __kasan_slab_free+0xe8/0x164\n | __kmem_cache_free+0x11c/0x230\n | kfree+0x70/0x130\n | kfree_const+0x20/0x40\n | __scmi_device_destroy+0x70/0x280\n | scmi_device_destroy+0x94/0xd0\n | scmi_chan_setup+0x524/0x750\n | scmi_probe+0x7fc/0x1508\n | platform_probe+0xc4/0x19c\n | really_probe+0x32c/0x99c\n | __driver_probe_device+0x15c/0x3c4\n | driver_probe_device+0x5c/0x170\n | __driver_attach+0x1c8/0x440\n | bus_for_each_dev+0xf4/0x178\n | driver_attach+0x3c/0x58\n | bus_add_driver+0x234/0x4d4\n | driver_register+0xf4/0x3c0\n | __platform_driver_register+0x60/0x88\n | scmi_driver_init+0xb0/0x104\n | do_one_initcall+0xb4/0x664\n | kernel_init_freeable+0x3c8/0x894\n | kernel_init+0x24/0x1e8\n | ret_from_fork+0x10/0x20" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "ee7a9c9f67c5", + "version_value": "15b17bbcea07" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.6", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/15b17bbcea07d49c43d21aa700485cbd9f9d00d8", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/15b17bbcea07d49c43d21aa700485cbd9f9d00d8" + }, + { + "url": "https://git.kernel.org/stable/c/1e1f523b185a8ccdcba625b31ff0312d052900e2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1e1f523b185a8ccdcba625b31ff0312d052900e2" + }, + { + "url": "https://git.kernel.org/stable/c/295416091e44806760ccf753aeafdafc0ae268f3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/295416091e44806760ccf753aeafdafc0ae268f3" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53069.json b/2024/53xxx/CVE-2024-53069.json new file mode 100644 index 00000000000..87edf6ac82a --- /dev/null +++ b/2024/53xxx/CVE-2024-53069.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53069", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: qcom: scm: fix a NULL-pointer dereference\n\nSome SCM calls can be invoked with __scm being NULL (the driver may not\nhave been and will not be probed as there's no SCM entry in device-tree).\nMake sure we don't dereference a NULL pointer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "449d0d84bcd8", + "version_value": "3d36e2b1d803" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.11", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/3d36e2b1d803f0d1cc674115d295a8f20ddb9268", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3d36e2b1d803f0d1cc674115d295a8f20ddb9268" + }, + { + "url": "https://git.kernel.org/stable/c/ca61d6836e6f4442a77762e1074d2706a2a6e578", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ca61d6836e6f4442a77762e1074d2706a2a6e578" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53070.json b/2024/53xxx/CVE-2024-53070.json new file mode 100644 index 00000000000..9e08e3826ee --- /dev/null +++ b/2024/53xxx/CVE-2024-53070.json @@ -0,0 +1,127 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53070", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\n\nIf the device was already runtime suspended then during system suspend\nwe cannot access the device registers else it will crash.\n\nAlso we cannot access any registers after dwc3_core_exit() on some\nplatforms so move the dwc3_enable_susphy() call to the top." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "073530898ebf", + "version_value": "d9e65d461a9d" + }, + { + "version_affected": "<", + "version_name": "85ca88f93162", + "version_value": "562804b1561c" + }, + { + "version_affected": "<", + "version_name": "4fad73700867", + "version_value": "4abc5ee334fe" + }, + { + "version_affected": "<", + "version_name": "a690a9e38e6b", + "version_value": "06b98197b69e" + }, + { + "version_affected": "<", + "version_name": "705e3ce37bcc", + "version_value": "9cfb31e4c89d" + }, + { + "version_affected": "<", + "version_name": "5.15.170", + "version_value": "5.15.172" + }, + { + "version_affected": "<", + "version_name": "6.1.115", + "version_value": "6.1.117" + }, + { + "version_affected": "<", + "version_name": "6.6.59", + "version_value": "6.6.61" + }, + { + "version_affected": "<", + "version_name": "6.11.5", + "version_value": "6.11.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/d9e65d461a9de037e7c9d584776d025cfce6d86d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d9e65d461a9de037e7c9d584776d025cfce6d86d" + }, + { + "url": "https://git.kernel.org/stable/c/562804b1561cc248cc37746a1c96c83cab1d7209", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/562804b1561cc248cc37746a1c96c83cab1d7209" + }, + { + "url": "https://git.kernel.org/stable/c/4abc5ee334fe4aba50461c45fdaaa4c5e5c57789", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4abc5ee334fe4aba50461c45fdaaa4c5e5c57789" + }, + { + "url": "https://git.kernel.org/stable/c/06b98197b69e2f2af9cb1991ee0b1c876edf7b86", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/06b98197b69e2f2af9cb1991ee0b1c876edf7b86" + }, + { + "url": "https://git.kernel.org/stable/c/9cfb31e4c89d200d8ab7cb1e0bb9e6e8d621ca0b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9cfb31e4c89d200d8ab7cb1e0bb9e6e8d621ca0b" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53071.json b/2024/53xxx/CVE-2024-53071.json new file mode 100644 index 00000000000..324c09d4e1d --- /dev/null +++ b/2024/53xxx/CVE-2024-53071.json @@ -0,0 +1,102 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53071", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Be stricter about IO mapping flags\n\nThe current panthor_device_mmap_io() implementation has two issues:\n\n1. For mapping DRM_PANTHOR_USER_FLUSH_ID_MMIO_OFFSET,\n panthor_device_mmap_io() bails if VM_WRITE is set, but does not clear\n VM_MAYWRITE. That means userspace can use mprotect() to make the mapping\n writable later on. This is a classic Linux driver gotcha.\n I don't think this actually has any impact in practice:\n When the GPU is powered, writes to the FLUSH_ID seem to be ignored; and\n when the GPU is not powered, the dummy_latest_flush page provided by the\n driver is deliberately designed to not do any flushes, so the only thing\n writing to the dummy_latest_flush could achieve would be to make *more*\n flushes happen.\n\n2. panthor_device_mmap_io() does not block MAP_PRIVATE mappings (which are\n mappings without the VM_SHARED flag).\n MAP_PRIVATE in combination with VM_MAYWRITE indicates that the VMA has\n copy-on-write semantics, which for VM_PFNMAP are semi-supported but\n fairly cursed.\n In particular, in such a mapping, the driver can only install PTEs\n during mmap() by calling remap_pfn_range() (because remap_pfn_range()\n wants to **store the physical address of the mapped physical memory into\n the vm_pgoff of the VMA**); installing PTEs later on with a fault\n handler (as panthor does) is not supported in private mappings, and so\n if you try to fault in such a mapping, vmf_insert_pfn_prot() splats when\n it hits a BUG() check.\n\nFix it by clearing the VM_MAYWRITE flag (userspace writing to the FLUSH_ID\ndoesn't make sense) and requiring VM_SHARED (copy-on-write semantics for\nthe FLUSH_ID don't make sense).\n\nReproducers for both scenarios are in the notes of my patch on the mailing\nlist; I tested that these bugs exist on a Rock 5B machine.\n\nNote that I only compile-tested the patch, I haven't tested it; I don't\nhave a working kernel build setup for the test machine yet. Please test it\nbefore applying it." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5fe909cae118", + "version_value": "2604afd65043" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.10", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/2604afd65043e8f9d4be036cb1242adf6b5723cf", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2604afd65043e8f9d4be036cb1242adf6b5723cf" + }, + { + "url": "https://git.kernel.org/stable/c/f432a1621f049bb207e78363d9d0e3c6fa2da5db", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f432a1621f049bb207e78363d9d0e3c6fa2da5db" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53072.json b/2024/53xxx/CVE-2024-53072.json new file mode 100644 index 00000000000..dc832fcb973 --- /dev/null +++ b/2024/53xxx/CVE-2024-53072.json @@ -0,0 +1,124 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2024-53072", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd/pmc: Detect when STB is not available\n\nLoading the amd_pmc module as:\n\n amd_pmc enable_stb=1\n\n...can result in the following messages in the kernel ring buffer:\n\n amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff\n ioremap on RAM at 0x0000000000000000 - 0x0000000000ffffff\n WARNING: CPU: 10 PID: 2151 at arch/x86/mm/ioremap.c:217 __ioremap_caller+0x2cd/0x340\n\nFurther debugging reveals that this occurs when the requests for\nS2D_PHYS_ADDR_LOW and S2D_PHYS_ADDR_HIGH return a value of 0,\nindicating that the STB is inaccessible. To prevent the ioremap\nwarning and provide clarity to the user, handle the invalid address\nand display an error message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3d7d407dfb05", + "version_value": "a50863dd1f92" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.18", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.18", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.117", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.61", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.11.8", + "lessThanOrEqual": "6.11.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.12", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/a50863dd1f92d43c975ab2ecc3476617fe98a66e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a50863dd1f92d43c975ab2ecc3476617fe98a66e" + }, + { + "url": "https://git.kernel.org/stable/c/7a3ed3f125292bc3398e04d10108124250892e3f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7a3ed3f125292bc3398e04d10108124250892e3f" + }, + { + "url": "https://git.kernel.org/stable/c/67ff30e24a0466bdd5be1d0b84385ec3c85fdacd", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/67ff30e24a0466bdd5be1d0b84385ec3c85fdacd" + }, + { + "url": "https://git.kernel.org/stable/c/bceec87a73804bb4c33b9a6c96e2d27cd893a801", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bceec87a73804bb4c33b9a6c96e2d27cd893a801" + } + ] + }, + "generator": { + "engine": "bippy-8e903de6a542" + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53076.json b/2024/53xxx/CVE-2024-53076.json new file mode 100644 index 00000000000..a86b7d4ebbb --- /dev/null +++ b/2024/53xxx/CVE-2024-53076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53077.json b/2024/53xxx/CVE-2024-53077.json new file mode 100644 index 00000000000..81fcb531c99 --- /dev/null +++ b/2024/53xxx/CVE-2024-53077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53078.json b/2024/53xxx/CVE-2024-53078.json new file mode 100644 index 00000000000..fc34e9f193b --- /dev/null +++ b/2024/53xxx/CVE-2024-53078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53079.json b/2024/53xxx/CVE-2024-53079.json new file mode 100644 index 00000000000..93326b9ec82 --- /dev/null +++ b/2024/53xxx/CVE-2024-53079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53080.json b/2024/53xxx/CVE-2024-53080.json new file mode 100644 index 00000000000..3f539e3295b --- /dev/null +++ b/2024/53xxx/CVE-2024-53080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53081.json b/2024/53xxx/CVE-2024-53081.json new file mode 100644 index 00000000000..3ee84286377 --- /dev/null +++ b/2024/53xxx/CVE-2024-53081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53082.json b/2024/53xxx/CVE-2024-53082.json new file mode 100644 index 00000000000..0b3c161b55d --- /dev/null +++ b/2024/53xxx/CVE-2024-53082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53083.json b/2024/53xxx/CVE-2024-53083.json new file mode 100644 index 00000000000..26216255502 --- /dev/null +++ b/2024/53xxx/CVE-2024-53083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53084.json b/2024/53xxx/CVE-2024-53084.json new file mode 100644 index 00000000000..034f817591f --- /dev/null +++ b/2024/53xxx/CVE-2024-53084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53085.json b/2024/53xxx/CVE-2024-53085.json new file mode 100644 index 00000000000..b0bfc228711 --- /dev/null +++ b/2024/53xxx/CVE-2024-53085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53086.json b/2024/53xxx/CVE-2024-53086.json new file mode 100644 index 00000000000..bc6a35a773b --- /dev/null +++ b/2024/53xxx/CVE-2024-53086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53087.json b/2024/53xxx/CVE-2024-53087.json new file mode 100644 index 00000000000..8636264b8e3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53088.json b/2024/53xxx/CVE-2024-53088.json new file mode 100644 index 00000000000..4c43a79f474 --- /dev/null +++ b/2024/53xxx/CVE-2024-53088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53089.json b/2024/53xxx/CVE-2024-53089.json new file mode 100644 index 00000000000..48194d1f834 --- /dev/null +++ b/2024/53xxx/CVE-2024-53089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53090.json b/2024/53xxx/CVE-2024-53090.json new file mode 100644 index 00000000000..68d40a3d2d3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53091.json b/2024/53xxx/CVE-2024-53091.json new file mode 100644 index 00000000000..7a79fe08334 --- /dev/null +++ b/2024/53xxx/CVE-2024-53091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53092.json b/2024/53xxx/CVE-2024-53092.json new file mode 100644 index 00000000000..7fd1e3e421d --- /dev/null +++ b/2024/53xxx/CVE-2024-53092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53093.json b/2024/53xxx/CVE-2024-53093.json new file mode 100644 index 00000000000..a5f0e40cbea --- /dev/null +++ b/2024/53xxx/CVE-2024-53093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53094.json b/2024/53xxx/CVE-2024-53094.json new file mode 100644 index 00000000000..74e29a172d5 --- /dev/null +++ b/2024/53xxx/CVE-2024-53094.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53094", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53095.json b/2024/53xxx/CVE-2024-53095.json new file mode 100644 index 00000000000..010228f73bb --- /dev/null +++ b/2024/53xxx/CVE-2024-53095.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53095", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53096.json b/2024/53xxx/CVE-2024-53096.json new file mode 100644 index 00000000000..c7aa79e002f --- /dev/null +++ b/2024/53xxx/CVE-2024-53096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53097.json b/2024/53xxx/CVE-2024-53097.json new file mode 100644 index 00000000000..cef28181ba4 --- /dev/null +++ b/2024/53xxx/CVE-2024-53097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53098.json b/2024/53xxx/CVE-2024-53098.json new file mode 100644 index 00000000000..75ad37ff7ca --- /dev/null +++ b/2024/53xxx/CVE-2024-53098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53099.json b/2024/53xxx/CVE-2024-53099.json new file mode 100644 index 00000000000..f5bbea1799b --- /dev/null +++ b/2024/53xxx/CVE-2024-53099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53100.json b/2024/53xxx/CVE-2024-53100.json new file mode 100644 index 00000000000..595186dd0b1 --- /dev/null +++ b/2024/53xxx/CVE-2024-53100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53101.json b/2024/53xxx/CVE-2024-53101.json new file mode 100644 index 00000000000..eb2ebbbdf8f --- /dev/null +++ b/2024/53xxx/CVE-2024-53101.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53101", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53102.json b/2024/53xxx/CVE-2024-53102.json new file mode 100644 index 00000000000..493c5c1ec56 --- /dev/null +++ b/2024/53xxx/CVE-2024-53102.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53102", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53103.json b/2024/53xxx/CVE-2024-53103.json new file mode 100644 index 00000000000..e0785f525a8 --- /dev/null +++ b/2024/53xxx/CVE-2024-53103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53104.json b/2024/53xxx/CVE-2024-53104.json new file mode 100644 index 00000000000..56d50cc1b77 --- /dev/null +++ b/2024/53xxx/CVE-2024-53104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53105.json b/2024/53xxx/CVE-2024-53105.json new file mode 100644 index 00000000000..cc0fd87be5f --- /dev/null +++ b/2024/53xxx/CVE-2024-53105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53106.json b/2024/53xxx/CVE-2024-53106.json new file mode 100644 index 00000000000..4b40c7e737c --- /dev/null +++ b/2024/53xxx/CVE-2024-53106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53107.json b/2024/53xxx/CVE-2024-53107.json new file mode 100644 index 00000000000..5131a2af85f --- /dev/null +++ b/2024/53xxx/CVE-2024-53107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53108.json b/2024/53xxx/CVE-2024-53108.json new file mode 100644 index 00000000000..a3ae7dd4148 --- /dev/null +++ b/2024/53xxx/CVE-2024-53108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53109.json b/2024/53xxx/CVE-2024-53109.json new file mode 100644 index 00000000000..3383b01cadf --- /dev/null +++ b/2024/53xxx/CVE-2024-53109.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53109", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53110.json b/2024/53xxx/CVE-2024-53110.json new file mode 100644 index 00000000000..1ea460891ff --- /dev/null +++ b/2024/53xxx/CVE-2024-53110.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53110", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53111.json b/2024/53xxx/CVE-2024-53111.json new file mode 100644 index 00000000000..d93c4951d2e --- /dev/null +++ b/2024/53xxx/CVE-2024-53111.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53111", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53112.json b/2024/53xxx/CVE-2024-53112.json new file mode 100644 index 00000000000..e2254aabaf3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53113.json b/2024/53xxx/CVE-2024-53113.json new file mode 100644 index 00000000000..4384ab1700a --- /dev/null +++ b/2024/53xxx/CVE-2024-53113.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53113", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53114.json b/2024/53xxx/CVE-2024-53114.json new file mode 100644 index 00000000000..bab2328a41e --- /dev/null +++ b/2024/53xxx/CVE-2024-53114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53115.json b/2024/53xxx/CVE-2024-53115.json new file mode 100644 index 00000000000..351b5417925 --- /dev/null +++ b/2024/53xxx/CVE-2024-53115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53116.json b/2024/53xxx/CVE-2024-53116.json new file mode 100644 index 00000000000..addd2edbd4d --- /dev/null +++ b/2024/53xxx/CVE-2024-53116.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53116", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53117.json b/2024/53xxx/CVE-2024-53117.json new file mode 100644 index 00000000000..8337a7dd0c3 --- /dev/null +++ b/2024/53xxx/CVE-2024-53117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53118.json b/2024/53xxx/CVE-2024-53118.json new file mode 100644 index 00000000000..9f5886574e2 --- /dev/null +++ b/2024/53xxx/CVE-2024-53118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53119.json b/2024/53xxx/CVE-2024-53119.json new file mode 100644 index 00000000000..50ccab83b66 --- /dev/null +++ b/2024/53xxx/CVE-2024-53119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file