mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3a5e181eec
commit
724924d643
@ -5,110 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2022-48700",
|
"ID": "CVE-2022-48700",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/type1: Unpin zero pages\n\nThere's currently a reference count leak on the zero page. We increment\nthe reference via pin_user_pages_remote(), but the page is later handled\nas an invalid/reserved page, therefore it's not accounted against the\nuser and not unpinned by our put_pfn().\n\nIntroducing special zero page handling in put_pfn() would resolve the\nleak, but without accounting of the zero page, a single user could\nstill create enough mappings to generate a reference count overflow.\n\nThe zero page is always resident, so for our purposes there's no reason\nto keep it pinned. Therefore, add a loop to walk pages returned from\npin_user_pages_remote() and unpin any zero pages."
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "578d644edc7d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "5.10.146",
|
|
||||||
"lessThanOrEqual": "5.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.15.68",
|
|
||||||
"lessThanOrEqual": "5.15.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.19.9",
|
|
||||||
"lessThanOrEqual": "5.19.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.0",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/578d644edc7d2c1ff53f7e4d0a25da473deb4a03",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/578d644edc7d2c1ff53f7e4d0a25da473deb4a03"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5321908ef74fb593e0dbc8737d25038fc86c9986",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/5321908ef74fb593e0dbc8737d25038fc86c9986"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5d721bf222936f5cf3ee15ced53cc483ecef7e46",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/5d721bf222936f5cf3ee15ced53cc483ecef7e46"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,176 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2023-52759",
|
"ID": "CVE-2023-52759",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: ignore negated quota changes\n\nWhen lots of quota changes are made, there may be cases in which an\ninode's quota information is increased and then decreased, such as when\nblocks are added to a file, then deleted from it. If the timing is\nright, function do_qc can add pending quota changes to a transaction,\nthen later, another call to do_qc can negate those changes, resulting\nin a net gain of 0. The quota_change information is recorded in the qc\nbuffer (and qd element of the inode as well). The buffer is added to the\ntransaction by the first call to do_qc, but a subsequent call changes\nthe value from non-zero back to zero. At that point it's too late to\nremove the buffer_head from the transaction. Later, when the quota sync\ncode is called, the zero-change qd element is discovered and flagged as\nan assert warning. If the fs is mounted with errors=panic, the kernel\nwill panic.\n\nThis is usually seen when files are truncated and the quota changes are\nnegated by punch_hole/truncate which uses gfs2_quota_hold and\ngfs2_quota_unhold rather than block allocations that use gfs2_quota_lock\nand gfs2_quota_unlock which automatically do quota sync.\n\nThis patch solves the problem by adding a check to qd_check_sync such\nthat net-zero quota changes already added to the transaction are no\nlonger deemed necessary to be synced, and skipped.\n\nIn this case references are taken for the qd and the slot from do_qc\nso those need to be put. The normal sequence of events for a normal\nnon-zero quota change is as follows:\n\ngfs2_quota_change\n do_qc\n qd_hold\n slot_hold\n\nLater, when the changes are to be synced:\n\ngfs2_quota_sync\n qd_fish\n qd_check_sync\n gets qd ref via lockref_get_not_dead\n do_sync\n do_qc(QC_SYNC)\n qd_put\n\t lockref_put_or_lock\n qd_unlock\n qd_put\n lockref_put_or_lock\n\nIn the net-zero change case, we add a check to qd_check_sync so it puts\nthe qd and slot references acquired in gfs2_quota_change and skip the\nunneeded sync."
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "1c28dace6601"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "4.14.331",
|
|
||||||
"lessThanOrEqual": "4.14.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "4.19.300",
|
|
||||||
"lessThanOrEqual": "4.19.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.4.262",
|
|
||||||
"lessThanOrEqual": "5.4.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.10.202",
|
|
||||||
"lessThanOrEqual": "5.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.15.140",
|
|
||||||
"lessThanOrEqual": "5.15.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.1.64",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.5.13",
|
|
||||||
"lessThanOrEqual": "6.5.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.3",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.57",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.7",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/1c28dace66015b675a343b89b0c87abbfda05ff4",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/1c28dace66015b675a343b89b0c87abbfda05ff4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/b4deec69fe32b58dc5fb4ace52456ece85b75561",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/b4deec69fe32b58dc5fb4ace52456ece85b75561"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2bb42a27a92ff3984c9fa5fbe128eced3ea693f2",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/2bb42a27a92ff3984c9fa5fbe128eced3ea693f2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2a054b87a1b799b391e578597a42ee6e57a987ae",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/2a054b87a1b799b391e578597a42ee6e57a987ae"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5bfda356e903633d16ae1bac1ee38364e12628a3",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/5bfda356e903633d16ae1bac1ee38364e12628a3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/53fc16c1ad84f5467ec24341670b63aa759335d3",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/53fc16c1ad84f5467ec24341670b63aa759335d3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/212f112fe5e90e98eb8d48585682880dae139f4c",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/212f112fe5e90e98eb8d48585682880dae139f4c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/119565e566f91ff3588ffcd5812f0c8061586c6b",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/119565e566f91ff3588ffcd5812f0c8061586c6b"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/50e33567bc4a1c4ed79a1d289fe93c9a26491848",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/50e33567bc4a1c4ed79a1d289fe93c9a26491848"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/4c6a08125f2249531ec01783a5f4317d7342add5",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/4c6a08125f2249531ec01783a5f4317d7342add5"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,17 +1,85 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-12331",
|
"ID": "CVE-2024-12331",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "security@wordfence.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-862 Missing Authorization",
|
||||||
|
"cweId": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "ninjateam",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "File Manager Pro \u2013 Filester",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "*",
|
||||||
|
"version_value": "1.8.6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b09bfff-4d6e-4de0-b6ab-6ac27c4f2be6?source=cve",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b09bfff-4d6e-4de0-b6ab-6ac27c4f2be6?source=cve"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3208858/filester",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://plugins.trac.wordpress.org/changeset/3208858/filester"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Tr\u01b0\u01a1ng H\u1eefu Ph\u00fac (truonghuuphuc)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,85 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-12626",
|
"ID": "CVE-2024-12626",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "security@wordfence.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "The AutomatorWP \u2013 Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018a-0-o-search_field_value\u2019 parameter in all versions up to, and including, 5.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. When used in conjunction with the plugin's import and code action feature, this vulnerability can be leveraged to execute arbitrary code."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||||
|
"cweId": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "rubengc",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "AutomatorWP \u2013 The #1 automator plugin for no-code automation in WordPress",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "*",
|
||||||
|
"version_value": "5.0.9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8abcc7b-6c68-4fc8-81af-e88624e417dd?source=cve",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8abcc7b-6c68-4fc8-81af-e88624e417dd?source=cve"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3209794/automatorwp",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://plugins.trac.wordpress.org/changeset/3209794/automatorwp"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vincent Fourcade"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.6,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -5,109 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-26713",
|
"ID": "CVE-2024-26713",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: Fix iommu initialisation during DLPAR add\n\nWhen a PCI device is dynamically added, the kernel oopses with a NULL\npointer dereference:\n\n BUG: Kernel NULL pointer dereference on read at 0x00000030\n Faulting instruction address: 0xc0000000006bbe5c\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66\n Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n NIP: c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8\n REGS: c00000009924f240 TRAP: 0300 Not tainted (6.7.0-203405+)\n MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 24002220 XER: 20040006\n CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0\n ...\n NIP sysfs_add_link_to_group+0x34/0x94\n LR iommu_device_link+0x5c/0x118\n Call Trace:\n iommu_init_device+0x26c/0x318 (unreliable)\n iommu_device_link+0x5c/0x118\n iommu_init_device+0xa8/0x318\n iommu_probe_device+0xc0/0x134\n iommu_bus_notifier+0x44/0x104\n notifier_call_chain+0xb8/0x19c\n blocking_notifier_call_chain+0x64/0x98\n bus_notify+0x50/0x7c\n device_add+0x640/0x918\n pci_device_add+0x23c/0x298\n of_create_pci_dev+0x400/0x884\n of_scan_pci_dev+0x124/0x1b0\n __of_scan_bus+0x78/0x18c\n pcibios_scan_phb+0x2a4/0x3b0\n init_phb_dynamic+0xb8/0x110\n dlpar_add_slot+0x170/0x3b8 [rpadlpar_io]\n add_slot_store.part.0+0xb4/0x130 [rpadlpar_io]\n kobj_attr_store+0x2c/0x48\n sysfs_kf_write+0x64/0x78\n kernfs_fop_write_iter+0x1b0/0x290\n vfs_write+0x350/0x4a0\n ksys_write+0x84/0x140\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n\nCommit a940904443e4 (\"powerpc/iommu: Add iommu_ops to report capabilities\nand allow blocking domains\") broke DLPAR add of PCI devices.\n\nThe above added iommu_device structure to pci_controller. During\nsystem boot, PCI devices are discovered and this newly added iommu_device\nstructure is initialized by a call to iommu_device_register().\n\nDuring DLPAR add of a PCI device, a new pci_controller structure is\nallocated but there are no calls made to iommu_device_register()\ninterface.\n\nFix is to register the iommu device during DLPAR add as well.\n\n[mpe: Trim oops and tweak some change log wording]"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "a940904443e4",
|
|
||||||
"version_value": "9978d5b744e0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "6.4",
|
|
||||||
"status": "affected"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "0",
|
|
||||||
"lessThan": "6.4",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.18",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.7.6",
|
|
||||||
"lessThanOrEqual": "6.7.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.8",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,241 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-26720",
|
"ID": "CVE-2024-26720",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\n\n(struct dirty_throttle_control *)->thresh is an unsigned long, but is\npassed as the u32 divisor argument to div_u64(). On architectures where\nunsigned long is 64 bytes, the argument will be implicitly truncated.\n\nUse div64_u64() instead of div_u64() so that the value used in the \"is\nthis a safe division\" check is the same as the divisor.\n\nAlso, remove redundant cast of the numerator to u64, as that should happen\nimplicitly.\n\nThis would be difficult to exploit in memcg domain, given the ratio-based\narithmetic domain_drity_limits() uses, but is much easier in global\nwriteback domain with a BDI_CAP_STRICTLIMIT-backing device, using e.g. \nvm.dirty_bytes=(1<<32)*PAGE_SIZE so that dtc->thresh == (1<<32)"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "f6789593d5ce",
|
|
||||||
"version_value": "c593d26fb5d5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "3.16",
|
|
||||||
"status": "affected"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "0",
|
|
||||||
"lessThan": "3.16",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "4.19.307",
|
|
||||||
"lessThanOrEqual": "4.19.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "4.19.318",
|
|
||||||
"lessThanOrEqual": "4.19.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.4.269",
|
|
||||||
"lessThanOrEqual": "5.4.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.4.280",
|
|
||||||
"lessThanOrEqual": "5.4.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.10.210",
|
|
||||||
"lessThanOrEqual": "5.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.10.222",
|
|
||||||
"lessThanOrEqual": "5.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.15.149",
|
|
||||||
"lessThanOrEqual": "5.15.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "5.15.163",
|
|
||||||
"lessThanOrEqual": "5.15.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.1.79",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.1.98",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.18",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.39",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.7.6",
|
|
||||||
"lessThanOrEqual": "6.7.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.8",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9.9",
|
|
||||||
"lessThanOrEqual": "6.9.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5099871b370335809c0fd1abad74d9c7c205d43f",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/5099871b370335809c0fd1abad74d9c7c205d43f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/16b1025eaa8fc223ab4273ece20d1c3a4211a95d",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/16b1025eaa8fc223ab4273ece20d1c3a4211a95d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ec18ec230301583395576915d274b407743d8f6c",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/ec18ec230301583395576915d274b407743d8f6c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/65977bed167a92e87085e757fffa5798f7314c9f",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/65977bed167a92e87085e757fffa5798f7314c9f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9319b647902cbd5cc884ac08a8a6d54ce111fc78",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/9319b647902cbd5cc884ac08a8a6d54ce111fc78"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,109 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-26972",
|
"ID": "CVE-2024-26972",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: ubifs_symlink: Fix memleak of inode->i_link in error path\n\nFor error handling path in ubifs_symlink(), inode will be marked as\nbad first, then iput() is invoked. If inode->i_link is initialized by\nfscrypt_encrypt_symlink() in encryption scenario, inode->i_link won't\nbe freed by callchain ubifs_free_inode -> fscrypt_free_inode in error\nhandling path, because make_bad_inode() has changed 'inode->i_mode' as\n'S_IFREG'.\nFollowing kmemleak is easy to be reproduced by injecting error in\nubifs_jnl_update() when doing symlink in encryption scenario:\n unreferenced object 0xffff888103da3d98 (size 8):\n comm \"ln\", pid 1692, jiffies 4294914701 (age 12.045s)\n backtrace:\n kmemdup+0x32/0x70\n __fscrypt_encrypt_symlink+0xed/0x1c0\n ubifs_symlink+0x210/0x300 [ubifs]\n vfs_symlink+0x216/0x360\n do_symlinkat+0x11a/0x190\n do_syscall_64+0x3b/0xe0\nThere are two ways fixing it:\n 1. Remove make_bad_inode() in error handling path. We can do that\n because ubifs_evict_inode() will do same processes for good\n symlink inode and bad symlink inode, for inode->i_nlink checking\n is before is_bad_inode().\n 2. Free inode->i_link before marking inode bad.\nMethod 2 is picked, it has less influence, personally, I think."
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "2c58d548f570",
|
|
||||||
"version_value": "3faea7810e2b"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "5.2",
|
|
||||||
"status": "affected"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "0",
|
|
||||||
"lessThan": "5.2",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.55",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.8.3",
|
|
||||||
"lessThanOrEqual": "6.8.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/3faea7810e2b3e9a9a92ef42d7e5feaeb8ff7133",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/3faea7810e2b3e9a9a92ef42d7e5feaeb8ff7133"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/62b5ae00c2b835639002ce898ccb5d82c51073ae",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/62b5ae00c2b835639002ce898ccb5d82c51073ae"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/6379b44cdcd67f5f5d986b73953e99700591edfa",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/6379b44cdcd67f5f5d986b73953e99700591edfa"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,110 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-35928",
|
"ID": "CVE-2024-35928",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()\n\nThis ensures that the memory mapped by ioremap for adev->rmmio, is\nproperly handled in amdgpu_device_init(). If the function exits early\ndue to an error, the memory is unmapped. If the function completes\nsuccessfully, the memory remains mapped.\n\nReported by smatch:\ndrivers/gpu/drm/amd/amdgpu/amdgpu_device.c:4337 amdgpu_device_init() warn: 'adev->rmmio' from ioremap() not released on lines: 4035,4045,4051,4058,4068,4337"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "c5f9fe2c1e50"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "6.1.86",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.27",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.8.6",
|
|
||||||
"lessThanOrEqual": "6.8.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c5f9fe2c1e5023fa096189a8bfba6420aa035587",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/c5f9fe2c1e5023fa096189a8bfba6420aa035587"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/14ac934db851642ea8cd1bd4121c788a8899ef69",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/14ac934db851642ea8cd1bd4121c788a8899ef69"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/aa665c3a2aca2ffe31b9645bda278e96dfc3b55c",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/aa665c3a2aca2ffe31b9645bda278e96dfc3b55c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/eb4f139888f636614dab3bcce97ff61cefc4b3a7",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/eb4f139888f636614dab3bcce97ff61cefc4b3a7"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,99 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-36885",
|
"ID": "CVE-2024-36885",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()\n\nCurrently, enabling SG_DEBUG in the kernel will cause nouveau to hit a\nBUG() on startup:\n\n kernel BUG at include/linux/scatterlist.h:187!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 7 PID: 930 Comm: (udev-worker) Not tainted 6.9.0-rc3Lyude-Test+ #30\n Hardware name: MSI MS-7A39/A320M GAMING PRO (MS-7A39), BIOS 1.I0 01/22/2019\n RIP: 0010:sg_init_one+0x85/0xa0\n Code: 69 88 32 01 83 e1 03 f6 c3 03 75 20 a8 01 75 1e 48 09 cb 41 89 54\n 24 08 49 89 1c 24 41 89 6c 24 0c 5b 5d 41 5c e9 7b b9 88 00 <0f> 0b 0f 0b\n 0f 0b 48 8b 05 5e 46 9a 01 eb b2 66 66 2e 0f 1f 84 00\n RSP: 0018:ffffa776017bf6a0 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffffa77600d87000 RCX: 000000000000002b\n RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffa77680d87000\n RBP: 000000000000e000 R08: 0000000000000000 R09: 0000000000000000\n R10: ffff98f4c46aa508 R11: 0000000000000000 R12: ffff98f4c46aa508\n R13: ffff98f4c46aa008 R14: ffffa77600d4a000 R15: ffffa77600d4a018\n FS: 00007feeb5aae980(0000) GS:ffff98f5c4dc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f22cb9a4520 CR3: 00000001043ba000 CR4: 00000000003506f0\n Call Trace:\n <TASK>\n ? die+0x36/0x90\n ? do_trap+0xdd/0x100\n ? sg_init_one+0x85/0xa0\n ? do_error_trap+0x65/0x80\n ? sg_init_one+0x85/0xa0\n ? exc_invalid_op+0x50/0x70\n ? sg_init_one+0x85/0xa0\n ? asm_exc_invalid_op+0x1a/0x20\n ? sg_init_one+0x85/0xa0\n nvkm_firmware_ctor+0x14a/0x250 [nouveau]\n nvkm_falcon_fw_ctor+0x42/0x70 [nouveau]\n ga102_gsp_booter_ctor+0xb4/0x1a0 [nouveau]\n r535_gsp_oneinit+0xb3/0x15f0 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n ? nvkm_udevice_new+0x95/0x140 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n ? ktime_get+0x47/0xb0\n ? srso_return_thunk+0x5/0x5f\n nvkm_subdev_oneinit_+0x4f/0x120 [nouveau]\n nvkm_subdev_init_+0x39/0x140 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n nvkm_subdev_init+0x44/0x90 [nouveau]\n nvkm_device_init+0x166/0x2e0 [nouveau]\n nvkm_udevice_init+0x47/0x70 [nouveau]\n nvkm_object_init+0x41/0x1c0 [nouveau]\n nvkm_ioctl_new+0x16a/0x290 [nouveau]\n ? __pfx_nvkm_client_child_new+0x10/0x10 [nouveau]\n ? __pfx_nvkm_udevice_new+0x10/0x10 [nouveau]\n nvkm_ioctl+0x126/0x290 [nouveau]\n nvif_object_ctor+0x112/0x190 [nouveau]\n nvif_device_ctor+0x23/0x60 [nouveau]\n nouveau_cli_init+0x164/0x640 [nouveau]\n nouveau_drm_device_init+0x97/0x9e0 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n ? pci_update_current_state+0x72/0xb0\n ? srso_return_thunk+0x5/0x5f\n nouveau_drm_probe+0x12c/0x280 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n local_pci_probe+0x45/0xa0\n pci_device_probe+0xc7/0x270\n really_probe+0xe6/0x3a0\n __driver_probe_device+0x87/0x160\n driver_probe_device+0x1f/0xc0\n __driver_attach+0xec/0x1f0\n ? __pfx___driver_attach+0x10/0x10\n bus_for_each_dev+0x88/0xd0\n bus_add_driver+0x116/0x220\n driver_register+0x59/0x100\n ? __pfx_nouveau_drm_init+0x10/0x10 [nouveau]\n do_one_initcall+0x5b/0x320\n do_init_module+0x60/0x250\n init_module_from_file+0x86/0xc0\n idempotent_init_module+0x120/0x2b0\n __x64_sys_finit_module+0x5e/0xb0\n do_syscall_64+0x83/0x160\n ? srso_return_thunk+0x5/0x5f\n entry_SYSCALL_64_after_hwframe+0x71/0x79\n RIP: 0033:0x7feeb5cc20cd\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0\n ff ff 73 01 c3 48 8b 0d 1b cd 0c 00 f7 d8 64 89 01 48\n RSP: 002b:00007ffcf220b2c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\n RAX: ffffffffffffffda RBX: 000055fdd2916aa0 RCX: 00007feeb5cc20cd\n RDX: 0000000000000000 RSI: 000055fdd29161e0 RDI: 0000000000000035\n RBP: 00007ffcf220b380 R08: 00007feeb5d8fb20 R09: 00007ffcf220b310\n R10: 000055fdd2909dc0 R11: 0000000000000246 R12: 000055\n---truncated---"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "1a88c18da464"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "6.6.31",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.8.10",
|
|
||||||
"lessThanOrEqual": "6.8.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/1a88c18da464db0ba8ea25196d0a06490f65322e",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/1a88c18da464db0ba8ea25196d0a06490f65322e"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/e05af009302893f39b072811a68fa4a196284c75",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/e05af009302893f39b072811a68fa4a196284c75"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/52a6947bf576b97ff8e14bb0a31c5eaf2d0d96e2",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/52a6947bf576b97ff8e14bb0a31c5eaf2d0d96e2"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,17 +1,126 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-37962",
|
"ID": "CVE-2024-37962",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "audit@patchstack.com",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Agency Dominion Fusion allows Stored XSS.This issue affects Fusion: from n/a through 1.6.1."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||||
|
"cweId": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Agency Dominion",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Fusion",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"changes": [
|
||||||
|
{
|
||||||
|
"at": "1.6.2",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lessThanOrEqual": "1.6.1",
|
||||||
|
"status": "affected",
|
||||||
|
"version": "n/a",
|
||||||
|
"versionType": "custom"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/wordpress/plugin/fusion/vulnerability/wordpress-fusion-page-builder-plugin-1-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://patchstack.com/database/wordpress/plugin/fusion/vulnerability/wordpress-fusion-page-builder-plugin-1-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"generator": {
|
||||||
|
"engine": "Vulnogram 0.2.0"
|
||||||
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Update to 1.6.2 or a higher version."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Update to\u00a01.6.2 or a higher version."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"credits": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "emad (Patchstack Alliance)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "savphill (Patchstack Alliance)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"impact": {
|
||||||
|
"cvss": [
|
||||||
|
{
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -5,131 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-41024",
|
"ID": "CVE-2024-41024",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Restrict untrusted app to attach to privileged PD\n\nUntrusted application with access to only non-secure fastrpc device\nnode can attach to root_pd or static PDs if it can make the respective\ninit request. This can cause problems as the untrusted application\ncan send bad requests to root_pd or static PDs. Add changes to reject\nattach to privileged PDs if the request is being made using non-secure\nfastrpc device node."
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "0871561055e6",
|
|
||||||
"version_value": "5e305b5986dc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "6.2",
|
|
||||||
"status": "affected"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "0",
|
|
||||||
"lessThan": "6.2",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.41",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.48",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9.10",
|
|
||||||
"lessThanOrEqual": "6.9.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.10",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.10.7",
|
|
||||||
"lessThanOrEqual": "6.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ea13bd807f1cef1af375d999980a9b9794c789b6",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/ea13bd807f1cef1af375d999980a9b9794c789b6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/bab2f5e8fd5d2f759db26b78d9db57412888f187",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/bab2f5e8fd5d2f759db26b78d9db57412888f187"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2eb973ee4770a26d9b5e292b58ad29822d321c7f",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/2eb973ee4770a26d9b5e292b58ad29822d321c7f"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,121 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-42116",
|
"ID": "CVE-2024-42116",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: fix a log entry using uninitialized netdev\n\nDuring successful probe, igc logs this:\n\n[ 5.133667] igc 0000:01:00.0 (unnamed net_device) (uninitialized): PHC added\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\nThe reason is that igc_ptp_init() is called very early, even before\nregister_netdev() has been called. So the netdev_info() call works\non a partially uninitialized netdev.\n\nFix this by calling igc_ptp_init() after register_netdev(), right\nafter the media autosense check, just as in igb. Add a comment,\njust as in igb.\n\nNow the log message is fine:\n\n[ 5.200987] igc 0000:01:00.0 eth0: PHC added"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "96839f3f5882"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "5.15.163",
|
|
||||||
"lessThanOrEqual": "5.15.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.1.98",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.39",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.9.9",
|
|
||||||
"lessThanOrEqual": "6.9.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.10",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/96839f3f588236593de36465f142b0126267f8b6",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/96839f3f588236593de36465f142b0126267f8b6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/98c8958980e829f023a490b9a9816ca1fe2f8b79",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/98c8958980e829f023a490b9a9816ca1fe2f8b79"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/991f036cabc3d13e886a37faeea1b6800181fdda",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/991f036cabc3d13e886a37faeea1b6800181fdda"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d478ec838cf2b1e1051a8709cfc744fe1c03110f",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/d478ec838cf2b1e1051a8709cfc744fe1c03110f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/86167183a17e03ec77198897975e9fdfbd53cb0b",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/86167183a17e03ec77198897975e9fdfbd53cb0b"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -5,110 +5,14 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2024-43903",
|
"ID": "CVE-2024-43903",
|
||||||
"ASSIGNER": "cve@kernel.org",
|
"ASSIGNER": "cve@kernel.org",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update\n\nThis commit adds a null check for the 'afb' variable in the\namdgpu_dm_plane_handle_cursor_update function. Previously, 'afb' was\nassumed to be null, but was used later in the code without a null check.\nThis could potentially lead to a null pointer dereference.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_plane.c:1298 amdgpu_dm_plane_handle_cursor_update() error: we previously assumed 'afb' could be null (see line 1252)"
|
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"affects": {
|
|
||||||
"vendor": {
|
|
||||||
"vendor_data": [
|
|
||||||
{
|
|
||||||
"vendor_name": "Linux",
|
|
||||||
"product": {
|
|
||||||
"product_data": [
|
|
||||||
{
|
|
||||||
"product_name": "Linux",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_affected": "<",
|
|
||||||
"version_name": "1da177e4c3f4",
|
|
||||||
"version_value": "ce5d090af683"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"versions": [
|
|
||||||
{
|
|
||||||
"version": "6.1.105",
|
|
||||||
"lessThanOrEqual": "6.1.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.6.46",
|
|
||||||
"lessThanOrEqual": "6.6.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.10.5",
|
|
||||||
"lessThanOrEqual": "6.10.*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "semver"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version": "6.11",
|
|
||||||
"lessThanOrEqual": "*",
|
|
||||||
"status": "unaffected",
|
|
||||||
"versionType": "original_commit_for_fix"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ce5d090af683137cb779ed7e3683839f9c778b35",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/ce5d090af683137cb779ed7e3683839f9c778b35"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/94220b35aeba2b68da81deeefbb784d94eeb5c04",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/94220b35aeba2b68da81deeefbb784d94eeb5c04"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/31a679a880102dee6e10985a7b1789af8dc328cc",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/31a679a880102dee6e10985a7b1789af8dc328cc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/38e6f715b02b572f74677eb2f29d3b4bc6f1ddff",
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://git.kernel.org/stable/c/38e6f715b02b572f74677eb2f29d3b4bc6f1ddff"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"generator": {
|
|
||||||
"engine": "bippy-9e1c9544281a"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
Loading…
x
Reference in New Issue
Block a user