diff --git a/2021/47xxx/CVE-2021-47063.json b/2021/47xxx/CVE-2021-47063.json index a231039f31c..425b634a6fe 100644 --- a/2021/47xxx/CVE-2021-47063.json +++ b/2021/47xxx/CVE-2021-47063.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47064.json b/2021/47xxx/CVE-2021-47064.json index 373dc9f8c36..f87f8929953 100644 --- a/2021/47xxx/CVE-2021-47064.json +++ b/2021/47xxx/CVE-2021-47064.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47065.json b/2021/47xxx/CVE-2021-47065.json index 7ff11bb144a..43e3f53bcef 100644 --- a/2021/47xxx/CVE-2021-47065.json +++ b/2021/47xxx/CVE-2021-47065.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47066.json b/2021/47xxx/CVE-2021-47066.json index 5bf776fe34c..7ee9d925c45 100644 --- a/2021/47xxx/CVE-2021-47066.json +++ b/2021/47xxx/CVE-2021-47066.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47067.json b/2021/47xxx/CVE-2021-47067.json index 319b31dc538..9b9d0802dda 100644 --- a/2021/47xxx/CVE-2021-47067.json +++ b/2021/47xxx/CVE-2021-47067.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47068.json b/2021/47xxx/CVE-2021-47068.json index 636ca5c9357..8919f4d6c8b 100644 --- a/2021/47xxx/CVE-2021-47068.json +++ b/2021/47xxx/CVE-2021-47068.json @@ -209,6 +209,6 @@ ] }, "generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47069.json b/2021/47xxx/CVE-2021-47069.json index 902bb475fc5..4e9bf09f0a6 100644 --- a/2021/47xxx/CVE-2021-47069.json +++ b/2021/47xxx/CVE-2021-47069.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47070.json b/2021/47xxx/CVE-2021-47070.json index 92c3ba01c65..bc2e00dcf18 100644 --- a/2021/47xxx/CVE-2021-47070.json +++ b/2021/47xxx/CVE-2021-47070.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47071.json b/2021/47xxx/CVE-2021-47071.json index 1ff5c395585..3157ed85e7b 100644 --- a/2021/47xxx/CVE-2021-47071.json +++ b/2021/47xxx/CVE-2021-47071.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47072.json b/2021/47xxx/CVE-2021-47072.json index d467119ae70..e7d5d84bfae 100644 --- a/2021/47xxx/CVE-2021-47072.json +++ b/2021/47xxx/CVE-2021-47072.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47073.json b/2021/47xxx/CVE-2021-47073.json index bdb22d5beac..ace3a8b69d2 100644 --- a/2021/47xxx/CVE-2021-47073.json +++ b/2021/47xxx/CVE-2021-47073.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47074.json b/2021/47xxx/CVE-2021-47074.json index c7a9f3114b5..68b7acc0ef6 100644 --- a/2021/47xxx/CVE-2021-47074.json +++ b/2021/47xxx/CVE-2021-47074.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47075.json b/2021/47xxx/CVE-2021-47075.json index b0ee63fcdb7..5f0e7f12a2b 100644 --- a/2021/47xxx/CVE-2021-47075.json +++ b/2021/47xxx/CVE-2021-47075.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47076.json b/2021/47xxx/CVE-2021-47076.json index 9e79ffc97c6..fd26a375c42 100644 --- a/2021/47xxx/CVE-2021-47076.json +++ b/2021/47xxx/CVE-2021-47076.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47077.json b/2021/47xxx/CVE-2021-47077.json index 7bd5c42d869..6831c507715 100644 --- a/2021/47xxx/CVE-2021-47077.json +++ b/2021/47xxx/CVE-2021-47077.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47078.json b/2021/47xxx/CVE-2021-47078.json index e65ebaf7b1b..8abaa7b6f5f 100644 --- a/2021/47xxx/CVE-2021-47078.json +++ b/2021/47xxx/CVE-2021-47078.json @@ -152,6 +152,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47079.json b/2021/47xxx/CVE-2021-47079.json index ee0bc2d360f..5b6559ba9a1 100644 --- a/2021/47xxx/CVE-2021-47079.json +++ b/2021/47xxx/CVE-2021-47079.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47080.json b/2021/47xxx/CVE-2021-47080.json index 6843863b3bd..36020485ac2 100644 --- a/2021/47xxx/CVE-2021-47080.json +++ b/2021/47xxx/CVE-2021-47080.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47081.json b/2021/47xxx/CVE-2021-47081.json index 45a4673695c..7fbfa7df83e 100644 --- a/2021/47xxx/CVE-2021-47081.json +++ b/2021/47xxx/CVE-2021-47081.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47082.json b/2021/47xxx/CVE-2021-47082.json index 806c9a0f163..f64f01920e7 100644 --- a/2021/47xxx/CVE-2021-47082.json +++ b/2021/47xxx/CVE-2021-47082.json @@ -120,6 +120,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47083.json b/2021/47xxx/CVE-2021-47083.json index 46d5a8f1f3b..7ed0fef8ee5 100644 --- a/2021/47xxx/CVE-2021-47083.json +++ b/2021/47xxx/CVE-2021-47083.json @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47086.json b/2021/47xxx/CVE-2021-47086.json index 3f67d4ddbf3..ca78978704a 100644 --- a/2021/47xxx/CVE-2021-47086.json +++ b/2021/47xxx/CVE-2021-47086.json @@ -153,6 +153,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47087.json b/2021/47xxx/CVE-2021-47087.json index 4c0819dadc5..1ae17c209bf 100644 --- a/2021/47xxx/CVE-2021-47087.json +++ b/2021/47xxx/CVE-2021-47087.json @@ -129,6 +129,6 @@ ] }, "generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47088.json b/2021/47xxx/CVE-2021-47088.json index 132ef20f05f..37e39c3a7b8 100644 --- a/2021/47xxx/CVE-2021-47088.json +++ b/2021/47xxx/CVE-2021-47088.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47089.json b/2021/47xxx/CVE-2021-47089.json index c99d68afd5a..2d267a90d07 100644 --- a/2021/47xxx/CVE-2021-47089.json +++ b/2021/47xxx/CVE-2021-47089.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47090.json b/2021/47xxx/CVE-2021-47090.json index 91387862fde..5faa66c6cee 100644 --- a/2021/47xxx/CVE-2021-47090.json +++ b/2021/47xxx/CVE-2021-47090.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47091.json b/2021/47xxx/CVE-2021-47091.json index edbb0bf05f2..44a717e4c82 100644 --- a/2021/47xxx/CVE-2021-47091.json +++ b/2021/47xxx/CVE-2021-47091.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47092.json b/2021/47xxx/CVE-2021-47092.json index fe57d7b783c..acebc292b63 100644 --- a/2021/47xxx/CVE-2021-47092.json +++ b/2021/47xxx/CVE-2021-47092.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47093.json b/2021/47xxx/CVE-2021-47093.json index bec1733aabe..a253ed907c5 100644 --- a/2021/47xxx/CVE-2021-47093.json +++ b/2021/47xxx/CVE-2021-47093.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47094.json b/2021/47xxx/CVE-2021-47094.json index 79af42a2546..52fcf5847ed 100644 --- a/2021/47xxx/CVE-2021-47094.json +++ b/2021/47xxx/CVE-2021-47094.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-5f0117140d9a" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47095.json b/2021/47xxx/CVE-2021-47095.json index 09087f3e1c5..530c889a1fe 100644 --- a/2021/47xxx/CVE-2021-47095.json +++ b/2021/47xxx/CVE-2021-47095.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47096.json b/2021/47xxx/CVE-2021-47096.json index 67428a3b193..5ce15c27607 100644 --- a/2021/47xxx/CVE-2021-47096.json +++ b/2021/47xxx/CVE-2021-47096.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47097.json b/2021/47xxx/CVE-2021-47097.json index 00303947b4d..c1872bc8545 100644 --- a/2021/47xxx/CVE-2021-47097.json +++ b/2021/47xxx/CVE-2021-47097.json @@ -129,6 +129,6 @@ ] }, "generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47323.json b/2021/47xxx/CVE-2021-47323.json index b3a9fda8c65..4e0378dac06 100644 --- a/2021/47xxx/CVE-2021-47323.json +++ b/2021/47xxx/CVE-2021-47323.json @@ -1,18 +1,169 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47323", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "0015581a79bb" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4.276", + "lessThanOrEqual": "4.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.9.276", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.240", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4" + }, + { + "url": "https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373" + }, + { + "url": "https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04" + }, + { + "url": "https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e" + }, + { + "url": "https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c" + }, + { + "url": "https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566" + }, + { + "url": "https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d" + }, + { + "url": "https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a" + }, + { + "url": "https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47324.json b/2021/47xxx/CVE-2021-47324.json index 70f180f351a..38e815c10d6 100644 --- a/2021/47xxx/CVE-2021-47324.json +++ b/2021/47xxx/CVE-2021-47324.json @@ -1,18 +1,169 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47324", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "63a3dc24bd05" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4.276", + "lessThanOrEqual": "4.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.9.276", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.240", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02" + }, + { + "url": "https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685" + }, + { + "url": "https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76" + }, + { + "url": "https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af" + }, + { + "url": "https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875" + }, + { + "url": "https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31" + }, + { + "url": "https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259" + }, + { + "url": "https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90" + }, + { + "url": "https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47325.json b/2021/47xxx/CVE-2021-47325.json index 0a528c8f1fe..da4097637d1 100644 --- a/2021/47xxx/CVE-2021-47325.json +++ b/2021/47xxx/CVE-2021-47325.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47325", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation\n\nThe reference counting issue happens in several exception handling paths\nof arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the\nfunction forgets to decrease the refcount of \"smmu\" increased by\narm_smmu_rpm_get(), causing a refcount leak.\n\nFix this issue by jumping to \"out\" label when those error scenarios\noccur." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "b11220803ad1" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0" + }, + { + "url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb" + }, + { + "url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492" + }, + { + "url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b" + }, + { + "url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47327.json b/2021/47xxx/CVE-2021-47327.json index 1db41cc90b1..d83d87370e4 100644 --- a/2021/47xxx/CVE-2021-47327.json +++ b/2021/47xxx/CVE-2021-47327.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47327", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails\n\narm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the\nrefcount of the \"smmu\" even though the return value is less than 0.\n\nThe reference counting issue happens in some error handling paths of\narm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get()\nfails, the caller functions forget to decrease the refcount of \"smmu\"\nincreased by arm_smmu_rpm_get(), causing a refcount leak.\n\nFix this issue by calling pm_runtime_resume_and_get() instead of\npm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount\nbalanced in case of failure." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "3761ae0d0e54" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f" + }, + { + "url": "https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2" + }, + { + "url": "https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3" + }, + { + "url": "https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a" + }, + { + "url": "https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47328.json b/2021/47xxx/CVE-2021-47328.json index 23d0e3b9709..d5083eea872 100644 --- a/2021/47xxx/CVE-2021-47328.json +++ b/2021/47xxx/CVE-2021-47328.json @@ -1,18 +1,136 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47328", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven't done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call\nto remove the target and it's devices, and know after that point there is\nno device or scsi-ml callout trying to access the session." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "bf20d85a8838" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11" + }, + { + "url": "https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00" + }, + { + "url": "https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250" + }, + { + "url": "https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1" + }, + { + "url": "https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9" + }, + { + "url": "https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47329.json b/2021/47xxx/CVE-2021-47329.json index 3746ed9e4eb..09f9e24db47 100644 --- a/2021/47xxx/CVE-2021-47329.json +++ b/2021/47xxx/CVE-2021-47329.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47329", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix resource leak in case of probe failure\n\nThe driver doesn't clean up all the allocated resources properly when\nscsi_add_host(), megasas_start_aen() function fails during the PCI device\nprobe.\n\nClean up all those resources." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "0c6226601c3e" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959" + }, + { + "url": "https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74" + }, + { + "url": "https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72" + }, + { + "url": "https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f" + }, + { + "url": "https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47330.json b/2021/47xxx/CVE-2021-47330.json index c4ffc8bee1e..d27028fc070 100644 --- a/2021/47xxx/CVE-2021-47330.json +++ b/2021/47xxx/CVE-2021-47330.json @@ -1,18 +1,169 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47330", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final 'serial_config()' fails, 'info' is\nleaking.\n\nAdd a resource handling path to free this memory." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "b5a2799cd62e" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4.276", + "lessThanOrEqual": "4.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.9.276", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.240", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c" + }, + { + "url": "https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc" + }, + { + "url": "https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584" + }, + { + "url": "https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461" + }, + { + "url": "https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67" + }, + { + "url": "https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32" + }, + { + "url": "https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2" + }, + { + "url": "https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5" + }, + { + "url": "https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47331.json b/2021/47xxx/CVE-2021-47331.json index 3746be5a956..71de7cdb3f7 100644 --- a/2021/47xxx/CVE-2021-47331.json +++ b/2021/47xxx/CVE-2021-47331.json @@ -1,18 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47331", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: common: usb-conn-gpio: fix NULL pointer dereference of charger\n\nWhen power on system with OTG cable, IDDIG's interrupt arises before\nthe charger registration, it will cause a NULL pointer dereference,\nfix the issue by registering the power supply before requesting\nIDDIG/VBUS irq." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "8e8d910e9a3a" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b" + }, + { + "url": "https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1" + }, + { + "url": "https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25" + }, + { + "url": "https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47332.json b/2021/47xxx/CVE-2021-47332.json index bd39311bad9..fa7e53a3a23 100644 --- a/2021/47xxx/CVE-2021-47332.json +++ b/2021/47xxx/CVE-2021-47332.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47332", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usx2y: Don't call free_pages_exact() with NULL address\n\nUnlike some other functions, we can't pass NULL pointer to\nfree_pages_exact(). Add a proper NULL check for avoiding possible\nOops." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "88262229b778" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19" + }, + { + "url": "https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d" + }, + { + "url": "https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a" + }, + { + "url": "https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196" + }, + { + "url": "https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47333.json b/2021/47xxx/CVE-2021-47333.json index c672f8ade5c..4e0d53ce72f 100644 --- a/2021/47xxx/CVE-2021-47333.json +++ b/2021/47xxx/CVE-2021-47333.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47333", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: alcor_pci: fix null-ptr-deref when there is no PCI bridge\n\nThere is an issue with the ASPM(optional) capability checking function.\nA device might be attached to root complex directly, in this case,\nbus->self(bridge) will be NULL, thus priv->parent_pdev is NULL.\nSince alcor_pci_init_check_aspm(priv->parent_pdev) checks the PCI link's\nASPM capability and populate parent_cap_off, which will be used later by\nalcor_pci_aspm_ctrl() to dynamically turn on/off device, what we can do\nhere is to avoid checking the capability if we are on the root complex.\nThis will make pdev_cap_off 0 and alcor_pci_aspm_ctrl() will simply\nreturn when bring called, effectively disable ASPM for the device.\n\n[ 1.246492] BUG: kernel NULL pointer dereference, address: 00000000000000c0\n[ 1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40\n[ 1.253998] Call Trace:\n[ 1.254131] ? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci]\n[ 1.254476] alcor_pci_probe+0x169/0x2d5 [alcor_pci]" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "d2639ffdcad4" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb" + }, + { + "url": "https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309" + }, + { + "url": "https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174" + }, + { + "url": "https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d" + }, + { + "url": "https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47334.json b/2021/47xxx/CVE-2021-47334.json index da13db4e94c..c4ea4092862 100644 --- a/2021/47xxx/CVE-2021-47334.json +++ b/2021/47xxx/CVE-2021-47334.json @@ -1,18 +1,169 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47334", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp->remote.mouse_dev and sp->remote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "1512e7dc5eb0" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4.276", + "lessThanOrEqual": "4.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.9.276", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.240", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.134", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.52", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.19", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.4", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069" + }, + { + "url": "https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a" + }, + { + "url": "https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab" + }, + { + "url": "https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e" + }, + { + "url": "https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d" + }, + { + "url": "https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3" + }, + { + "url": "https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c" + }, + { + "url": "https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274" + }, + { + "url": "https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47335.json b/2021/47xxx/CVE-2021-47335.json index 4ab9d229465..d6a43ea6448 100644 --- a/2021/47xxx/CVE-2021-47335.json +++ b/2021/47xxx/CVE-2021-47335.json @@ -1,18 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47335", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances\n\nAs syzbot reported, there is an use-after-free issue during f2fs recovery:\n\nUse-after-free write at 0xffff88823bc16040 (in kfence-#10):\n kmem_cache_destroy+0x1f/0x120 mm/slab_common.c:486\n f2fs_recover_fsync_data+0x75b0/0x8380 fs/f2fs/recovery.c:869\n f2fs_fill_super+0x9393/0xa420 fs/f2fs/super.c:3945\n mount_bdev+0x26c/0x3a0 fs/super.c:1367\n legacy_get_tree+0xea/0x180 fs/fs_context.c:592\n vfs_get_tree+0x86/0x270 fs/super.c:1497\n do_new_mount fs/namespace.c:2905 [inline]\n path_mount+0x196f/0x2be0 fs/namespace.c:3235\n do_mount fs/namespace.c:3248 [inline]\n __do_sys_mount fs/namespace.c:3456 [inline]\n __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3433\n do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe root cause is multi f2fs filesystem instances can race on accessing\nglobal fsync_entry_slab pointer, result in use-after-free issue of slab\ncache, fixes to init/destroy this slab cache only once during module\ninit/destroy procedure to avoid this issue." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "86786603014e" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.10.51", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.18", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.3", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048" + }, + { + "url": "https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409" + }, + { + "url": "https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a" + }, + { + "url": "https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47336.json b/2021/47xxx/CVE-2021-47336.json index 82a1aa0735b..8a2f8a53da3 100644 --- a/2021/47xxx/CVE-2021-47336.json +++ b/2021/47xxx/CVE-2021-47336.json @@ -1,18 +1,158 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-47336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmackfs: restrict bytes count in smk_set_cipso()\n\nOops, I failed to update subject line.\n\nFrom 07571157c91b98ce1a4aa70967531e64b78e8346 Mon Sep 17 00:00:00 2001\nDate: Mon, 12 Apr 2021 22:25:06 +0900\nSubject: [PATCH] smackfs: restrict bytes count in smk_set_cipso()\n\nCommit 7ef4c19d245f3dc2 (\"smackfs: restrict bytes count in smackfs write\nfunctions\") missed that count > SMK_CIPSOMAX check applies to only\nformat == SMK_FIXED24_FMT case." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "5f9880403e6b" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.9.276", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.240", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.198", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.133", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.51", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.18", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13.3", + "lessThanOrEqual": "5.13.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.14", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca" + }, + { + "url": "https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2" + }, + { + "url": "https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d" + }, + { + "url": "https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6" + }, + { + "url": "https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0" + }, + { + "url": "https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b" + }, + { + "url": "https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766" + }, + { + "url": "https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd" + } + ] + }, + "generator": { + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47337.json b/2021/47xxx/CVE-2021-47337.json index 6b4108248c9..d9ec1b222ce 100644 --- a/2021/47xxx/CVE-2021-47337.json +++ b/2021/47xxx/CVE-2021-47337.json @@ -193,6 +193,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47338.json b/2021/47xxx/CVE-2021-47338.json index 52fd90ac552..9bbc9fef461 100644 --- a/2021/47xxx/CVE-2021-47338.json +++ b/2021/47xxx/CVE-2021-47338.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47339.json b/2021/47xxx/CVE-2021-47339.json index 989593adac2..199f07670fa 100644 --- a/2021/47xxx/CVE-2021-47339.json +++ b/2021/47xxx/CVE-2021-47339.json @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47340.json b/2021/47xxx/CVE-2021-47340.json index af757aaaac7..e071ee79863 100644 --- a/2021/47xxx/CVE-2021-47340.json +++ b/2021/47xxx/CVE-2021-47340.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47341.json b/2021/47xxx/CVE-2021-47341.json index 94a3903201d..a0d4281ecfc 100644 --- a/2021/47xxx/CVE-2021-47341.json +++ b/2021/47xxx/CVE-2021-47341.json @@ -145,6 +145,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47342.json b/2021/47xxx/CVE-2021-47342.json index 916f9ffebb4..40c5a628d0a 100644 --- a/2021/47xxx/CVE-2021-47342.json +++ b/2021/47xxx/CVE-2021-47342.json @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47343.json b/2021/47xxx/CVE-2021-47343.json index 1a29cb8cf7b..e7ae55b3756 100644 --- a/2021/47xxx/CVE-2021-47343.json +++ b/2021/47xxx/CVE-2021-47343.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47344.json b/2021/47xxx/CVE-2021-47344.json index 90dcefd83cd..c1829464969 100644 --- a/2021/47xxx/CVE-2021-47344.json +++ b/2021/47xxx/CVE-2021-47344.json @@ -174,6 +174,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47345.json b/2021/47xxx/CVE-2021-47345.json index 12f391e3427..393af32b5e3 100644 --- a/2021/47xxx/CVE-2021-47345.json +++ b/2021/47xxx/CVE-2021-47345.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47346.json b/2021/47xxx/CVE-2021-47346.json index 0ee09244d37..6d2b249c9d9 100644 --- a/2021/47xxx/CVE-2021-47346.json +++ b/2021/47xxx/CVE-2021-47346.json @@ -141,6 +141,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47347.json b/2021/47xxx/CVE-2021-47347.json index 9163ddde4c0..5ac89fbc296 100644 --- a/2021/47xxx/CVE-2021-47347.json +++ b/2021/47xxx/CVE-2021-47347.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47348.json b/2021/47xxx/CVE-2021-47348.json index 80d31c093ae..2ede04bc152 100644 --- a/2021/47xxx/CVE-2021-47348.json +++ b/2021/47xxx/CVE-2021-47348.json @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47349.json b/2021/47xxx/CVE-2021-47349.json index 016e469030f..7449fc6ba5e 100644 --- a/2021/47xxx/CVE-2021-47349.json +++ b/2021/47xxx/CVE-2021-47349.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47350.json b/2021/47xxx/CVE-2021-47350.json index 7d6217dcd31..45129af27a4 100644 --- a/2021/47xxx/CVE-2021-47350.json +++ b/2021/47xxx/CVE-2021-47350.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47351.json b/2021/47xxx/CVE-2021-47351.json index 250ddbb2a35..db2a5dc4ebe 100644 --- a/2021/47xxx/CVE-2021-47351.json +++ b/2021/47xxx/CVE-2021-47351.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47352.json b/2021/47xxx/CVE-2021-47352.json index e9d4279d087..fabd37f60cd 100644 --- a/2021/47xxx/CVE-2021-47352.json +++ b/2021/47xxx/CVE-2021-47352.json @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47353.json b/2021/47xxx/CVE-2021-47353.json index 39a2668561a..c4024e29d29 100644 --- a/2021/47xxx/CVE-2021-47353.json +++ b/2021/47xxx/CVE-2021-47353.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47354.json b/2021/47xxx/CVE-2021-47354.json index 6356322c648..bd32664eb4a 100644 --- a/2021/47xxx/CVE-2021-47354.json +++ b/2021/47xxx/CVE-2021-47354.json @@ -120,6 +120,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47355.json b/2021/47xxx/CVE-2021-47355.json index 1cc08ce0971..914d65ad74b 100644 --- a/2021/47xxx/CVE-2021-47355.json +++ b/2021/47xxx/CVE-2021-47355.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2021/47xxx/CVE-2021-47356.json b/2021/47xxx/CVE-2021-47356.json index 2b29113ce03..343285a47be 100644 --- a/2021/47xxx/CVE-2021-47356.json +++ b/2021/47xxx/CVE-2021-47356.json @@ -164,6 +164,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48630.json b/2022/48xxx/CVE-2022-48630.json index a31b83a4f34..fac7e15a076 100644 --- a/2022/48xxx/CVE-2022-48630.json +++ b/2022/48xxx/CVE-2022-48630.json @@ -161,6 +161,6 @@ ] }, "generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48631.json b/2022/48xxx/CVE-2022-48631.json index 9f7cebccf66..e11d5404579 100644 --- a/2022/48xxx/CVE-2022-48631.json +++ b/2022/48xxx/CVE-2022-48631.json @@ -120,6 +120,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48632.json b/2022/48xxx/CVE-2022-48632.json index 385b562c6c4..82da361233e 100644 --- a/2022/48xxx/CVE-2022-48632.json +++ b/2022/48xxx/CVE-2022-48632.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48633.json b/2022/48xxx/CVE-2022-48633.json index 790ecb28706..f9c24795309 100644 --- a/2022/48xxx/CVE-2022-48633.json +++ b/2022/48xxx/CVE-2022-48633.json @@ -87,6 +87,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48634.json b/2022/48xxx/CVE-2022-48634.json index 591ce45e390..fb9a4c950f1 100644 --- a/2022/48xxx/CVE-2022-48634.json +++ b/2022/48xxx/CVE-2022-48634.json @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48635.json b/2022/48xxx/CVE-2022-48635.json index 73fb21103a4..bdd82b5e95f 100644 --- a/2022/48xxx/CVE-2022-48635.json +++ b/2022/48xxx/CVE-2022-48635.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48636.json b/2022/48xxx/CVE-2022-48636.json index d48241fa500..9de625cf15d 100644 --- a/2022/48xxx/CVE-2022-48636.json +++ b/2022/48xxx/CVE-2022-48636.json @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48637.json b/2022/48xxx/CVE-2022-48637.json index 906e830e588..678e21114c9 100644 --- a/2022/48xxx/CVE-2022-48637.json +++ b/2022/48xxx/CVE-2022-48637.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48638.json b/2022/48xxx/CVE-2022-48638.json index 07938ebcbb5..abad7392d57 100644 --- a/2022/48xxx/CVE-2022-48638.json +++ b/2022/48xxx/CVE-2022-48638.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48639.json b/2022/48xxx/CVE-2022-48639.json index b073ea1506a..27f87441a5f 100644 --- a/2022/48xxx/CVE-2022-48639.json +++ b/2022/48xxx/CVE-2022-48639.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48640.json b/2022/48xxx/CVE-2022-48640.json index f51c7e546b4..c7982d26cdc 100644 --- a/2022/48xxx/CVE-2022-48640.json +++ b/2022/48xxx/CVE-2022-48640.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48641.json b/2022/48xxx/CVE-2022-48641.json index 1da38664ea4..fdcc8dacdf9 100644 --- a/2022/48xxx/CVE-2022-48641.json +++ b/2022/48xxx/CVE-2022-48641.json @@ -152,6 +152,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48642.json b/2022/48xxx/CVE-2022-48642.json index 62cdfa41ee4..42dbcbd996f 100644 --- a/2022/48xxx/CVE-2022-48642.json +++ b/2022/48xxx/CVE-2022-48642.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48643.json b/2022/48xxx/CVE-2022-48643.json index 072ccfc0734..84076d05bdc 100644 --- a/2022/48xxx/CVE-2022-48643.json +++ b/2022/48xxx/CVE-2022-48643.json @@ -107,6 +107,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48644.json b/2022/48xxx/CVE-2022-48644.json index 923ac8b78ad..304fe367504 100644 --- a/2022/48xxx/CVE-2022-48644.json +++ b/2022/48xxx/CVE-2022-48644.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48645.json b/2022/48xxx/CVE-2022-48645.json index 1cb20d85750..f0959002676 100644 --- a/2022/48xxx/CVE-2022-48645.json +++ b/2022/48xxx/CVE-2022-48645.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48646.json b/2022/48xxx/CVE-2022-48646.json index faaed32f3b5..f13034487be 100644 --- a/2022/48xxx/CVE-2022-48646.json +++ b/2022/48xxx/CVE-2022-48646.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48647.json b/2022/48xxx/CVE-2022-48647.json index 9b79a5ca3d3..9281e15cfc0 100644 --- a/2022/48xxx/CVE-2022-48647.json +++ b/2022/48xxx/CVE-2022-48647.json @@ -129,6 +129,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48648.json b/2022/48xxx/CVE-2022-48648.json index 08d0048256e..c5c8b3b0144 100644 --- a/2022/48xxx/CVE-2022-48648.json +++ b/2022/48xxx/CVE-2022-48648.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48649.json b/2022/48xxx/CVE-2022-48649.json index 6037b134fea..2dd029a1869 100644 --- a/2022/48xxx/CVE-2022-48649.json +++ b/2022/48xxx/CVE-2022-48649.json @@ -77,6 +77,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48650.json b/2022/48xxx/CVE-2022-48650.json index 55f87117c8e..48736d988eb 100644 --- a/2022/48xxx/CVE-2022-48650.json +++ b/2022/48xxx/CVE-2022-48650.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48651.json b/2022/48xxx/CVE-2022-48651.json index d7c4ffb5d00..36634b66066 100644 --- a/2022/48xxx/CVE-2022-48651.json +++ b/2022/48xxx/CVE-2022-48651.json @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48652.json b/2022/48xxx/CVE-2022-48652.json index 088eb6c0b09..81c52206c40 100644 --- a/2022/48xxx/CVE-2022-48652.json +++ b/2022/48xxx/CVE-2022-48652.json @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48653.json b/2022/48xxx/CVE-2022-48653.json index a66fea387e8..0277165ed9f 100644 --- a/2022/48xxx/CVE-2022-48653.json +++ b/2022/48xxx/CVE-2022-48653.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48654.json b/2022/48xxx/CVE-2022-48654.json index 0c02f354102..0057a6de66d 100644 --- a/2022/48xxx/CVE-2022-48654.json +++ b/2022/48xxx/CVE-2022-48654.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48655.json b/2022/48xxx/CVE-2022-48655.json index 4496486fd27..58d046349be 100644 --- a/2022/48xxx/CVE-2022-48655.json +++ b/2022/48xxx/CVE-2022-48655.json @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48656.json b/2022/48xxx/CVE-2022-48656.json index 0d88390db89..0e420eaf793 100644 --- a/2022/48xxx/CVE-2022-48656.json +++ b/2022/48xxx/CVE-2022-48656.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48657.json b/2022/48xxx/CVE-2022-48657.json index 9b78e8624e4..357dd9e202c 100644 --- a/2022/48xxx/CVE-2022-48657.json +++ b/2022/48xxx/CVE-2022-48657.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48658.json b/2022/48xxx/CVE-2022-48658.json index 81725890688..75da9fc266d 100644 --- a/2022/48xxx/CVE-2022-48658.json +++ b/2022/48xxx/CVE-2022-48658.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48659.json b/2022/48xxx/CVE-2022-48659.json index 9a90a090682..1c47f4a4ca3 100644 --- a/2022/48xxx/CVE-2022-48659.json +++ b/2022/48xxx/CVE-2022-48659.json @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48660.json b/2022/48xxx/CVE-2022-48660.json index f16cd82d429..4f91f7f4070 100644 --- a/2022/48xxx/CVE-2022-48660.json +++ b/2022/48xxx/CVE-2022-48660.json @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48661.json b/2022/48xxx/CVE-2022-48661.json index 3121d1c302b..a04b6079fc3 100644 --- a/2022/48xxx/CVE-2022-48661.json +++ b/2022/48xxx/CVE-2022-48661.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2022/48xxx/CVE-2022-48662.json b/2022/48xxx/CVE-2022-48662.json index 6055a916fc7..80575fe2057 100644 --- a/2022/48xxx/CVE-2022-48662.json +++ b/2022/48xxx/CVE-2022-48662.json @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-d175d3acf727" + "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2023/30xxx/CVE-2023-30310.json b/2023/30xxx/CVE-2023-30310.json index 9cb1f7d559c..e6ac6a3c4f4 100644 --- a/2023/30xxx/CVE-2023-30310.json +++ b/2023/30xxx/CVE-2023-30310.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-30310", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-30310", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue discovered in Comfast Comfast CF-616AC routers allows attackers to hijack TCP sessions which could lead to a denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/", + "url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/" } ] }