diff --git a/2024/0xxx/CVE-2024-0794.json b/2024/0xxx/CVE-2024-0794.json index 502ecba0906..a1cfaf1b4d9 100644 --- a/2024/0xxx/CVE-2024-0794.json +++ b/2024/0xxx/CVE-2024-0794.json @@ -54,9 +54,9 @@ "references": { "reference_data": [ { - "url": "https://support.hp.com/us-en/document/ish_10174031-10174074-16", + "url": "https://support.hp.com/us-en/document/ish_10174031-10198670-16", "refsource": "MISC", - "name": "https://support.hp.com/us-en/document/ish_10174031-10174074-16" + "name": "https://support.hp.com/us-en/document/ish_10174031-10198670-16" } ] }, diff --git a/2024/1xxx/CVE-2024-1696.json b/2024/1xxx/CVE-2024-1696.json new file mode 100644 index 00000000000..725bd3e09eb --- /dev/null +++ b/2024/1xxx/CVE-2024-1696.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1696", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/24xxx/CVE-2024-24474.json b/2024/24xxx/CVE-2024-24474.json index 3c337570774..905bd2a84d1 100644 --- a/2024/24xxx/CVE-2024-24474.json +++ b/2024/24xxx/CVE-2024-24474.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a remote attacker to execute arbitrary code via the async_len variable to the FIFO buffer component." + "value": "QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len." } ] }, diff --git a/2024/24xxx/CVE-2024-24475.json b/2024/24xxx/CVE-2024-24475.json index 4a53235638d..f3f8f051618 100644 --- a/2024/24xxx/CVE-2024-24475.json +++ b/2024/24xxx/CVE-2024-24475.json @@ -1,66 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2024-24475", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-24475", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An issue in Qemu before v.8.2.0 allows a remote attacker to execute arbitrary code via the contrib/elf2dmp/pdb.c, pdb_get_file_size(const struct pdb_reader *r, unsigned idx) component." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://github.com/qemu/qemu/commit/9d9c06b144da340b9a937ed01d45a936810715be", - "refsource": "MISC", - "name": "https://github.com/qemu/qemu/commit/9d9c06b144da340b9a937ed01d45a936810715be" - }, - { - "refsource": "MISC", - "name": "https://gist.github.com/1047524396/a9f9ad5e3f5cf4dd2cea332ce50c3fc8", - "url": "https://gist.github.com/1047524396/a9f9ad5e3f5cf4dd2cea332ce50c3fc8" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] }