"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-28 20:02:35 +00:00
parent 82a79d5c62
commit b88e5aaad9
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
100 changed files with 1777 additions and 144 deletions

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -209,6 +209,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -129,6 +129,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -129,6 +129,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47323",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "0015581a79bb"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4"
},
{
"url": "https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373"
},
{
"url": "https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04"
},
{
"url": "https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e"
},
{
"url": "https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c"
},
{
"url": "https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566"
},
{
"url": "https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d"
},
{
"url": "https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a"
},
{
"url": "https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47324",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "63a3dc24bd05"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02"
},
{
"url": "https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685"
},
{
"url": "https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76"
},
{
"url": "https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af"
},
{
"url": "https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875"
},
{
"url": "https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31"
},
{
"url": "https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259"
},
{
"url": "https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90"
},
{
"url": "https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47325",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation\n\nThe reference counting issue happens in several exception handling paths\nof arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the\nfunction forgets to decrease the refcount of \"smmu\" increased by\narm_smmu_rpm_get(), causing a refcount leak.\n\nFix this issue by jumping to \"out\" label when those error scenarios\noccur."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "b11220803ad1"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0"
},
{
"url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb"
},
{
"url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492"
},
{
"url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b"
},
{
"url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47327",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails\n\narm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the\nrefcount of the \"smmu\" even though the return value is less than 0.\n\nThe reference counting issue happens in some error handling paths of\narm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get()\nfails, the caller functions forget to decrease the refcount of \"smmu\"\nincreased by arm_smmu_rpm_get(), causing a refcount leak.\n\nFix this issue by calling pm_runtime_resume_and_get() instead of\npm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount\nbalanced in case of failure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "3761ae0d0e54"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f"
},
{
"url": "https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2"
},
{
"url": "https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3"
},
{
"url": "https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a"
},
{
"url": "https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,136 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47328",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven't done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call\nto remove the target and it's devices, and know after that point there is\nno device or scsi-ml callout trying to access the session."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "bf20d85a8838"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11"
},
{
"url": "https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00"
},
{
"url": "https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250"
},
{
"url": "https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1"
},
{
"url": "https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9"
},
{
"url": "https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47329",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix resource leak in case of probe failure\n\nThe driver doesn't clean up all the allocated resources properly when\nscsi_add_host(), megasas_start_aen() function fails during the PCI device\nprobe.\n\nClean up all those resources."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "0c6226601c3e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959"
},
{
"url": "https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74"
},
{
"url": "https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72"
},
{
"url": "https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f"
},
{
"url": "https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47330",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final 'serial_config()' fails, 'info' is\nleaking.\n\nAdd a resource handling path to free this memory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "b5a2799cd62e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c"
},
{
"url": "https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc"
},
{
"url": "https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584"
},
{
"url": "https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461"
},
{
"url": "https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67"
},
{
"url": "https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32"
},
{
"url": "https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2"
},
{
"url": "https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5"
},
{
"url": "https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,114 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47331",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: common: usb-conn-gpio: fix NULL pointer dereference of charger\n\nWhen power on system with OTG cable, IDDIG's interrupt arises before\nthe charger registration, it will cause a NULL pointer dereference,\nfix the issue by registering the power supply before requesting\nIDDIG/VBUS irq."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "8e8d910e9a3a"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b"
},
{
"url": "https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1"
},
{
"url": "https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25"
},
{
"url": "https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47332",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usx2y: Don't call free_pages_exact() with NULL address\n\nUnlike some other functions, we can't pass NULL pointer to\nfree_pages_exact(). Add a proper NULL check for avoiding possible\nOops."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "88262229b778"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19"
},
{
"url": "https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d"
},
{
"url": "https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a"
},
{
"url": "https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196"
},
{
"url": "https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,125 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47333",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: alcor_pci: fix null-ptr-deref when there is no PCI bridge\n\nThere is an issue with the ASPM(optional) capability checking function.\nA device might be attached to root complex directly, in this case,\nbus->self(bridge) will be NULL, thus priv->parent_pdev is NULL.\nSince alcor_pci_init_check_aspm(priv->parent_pdev) checks the PCI link's\nASPM capability and populate parent_cap_off, which will be used later by\nalcor_pci_aspm_ctrl() to dynamically turn on/off device, what we can do\nhere is to avoid checking the capability if we are on the root complex.\nThis will make pdev_cap_off 0 and alcor_pci_aspm_ctrl() will simply\nreturn when bring called, effectively disable ASPM for the device.\n\n[ 1.246492] BUG: kernel NULL pointer dereference, address: 00000000000000c0\n[ 1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40\n[ 1.253998] Call Trace:\n[ 1.254131] ? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci]\n[ 1.254476] alcor_pci_probe+0x169/0x2d5 [alcor_pci]"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "d2639ffdcad4"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb"
},
{
"url": "https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309"
},
{
"url": "https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174"
},
{
"url": "https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d"
},
{
"url": "https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47334",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp->remote.mouse_dev and sp->remote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "1512e7dc5eb0"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069"
},
{
"url": "https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a"
},
{
"url": "https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab"
},
{
"url": "https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e"
},
{
"url": "https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d"
},
{
"url": "https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3"
},
{
"url": "https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c"
},
{
"url": "https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274"
},
{
"url": "https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,114 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47335",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances\n\nAs syzbot reported, there is an use-after-free issue during f2fs recovery:\n\nUse-after-free write at 0xffff88823bc16040 (in kfence-#10):\n kmem_cache_destroy+0x1f/0x120 mm/slab_common.c:486\n f2fs_recover_fsync_data+0x75b0/0x8380 fs/f2fs/recovery.c:869\n f2fs_fill_super+0x9393/0xa420 fs/f2fs/super.c:3945\n mount_bdev+0x26c/0x3a0 fs/super.c:1367\n legacy_get_tree+0xea/0x180 fs/fs_context.c:592\n vfs_get_tree+0x86/0x270 fs/super.c:1497\n do_new_mount fs/namespace.c:2905 [inline]\n path_mount+0x196f/0x2be0 fs/namespace.c:3235\n do_mount fs/namespace.c:3248 [inline]\n __do_sys_mount fs/namespace.c:3456 [inline]\n __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3433\n do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe root cause is multi f2fs filesystem instances can race on accessing\nglobal fsync_entry_slab pointer, result in use-after-free issue of slab\ncache, fixes to init/destroy this slab cache only once during module\ninit/destroy procedure to avoid this issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "86786603014e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.10.51",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.18",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.3",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048"
},
{
"url": "https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409"
},
{
"url": "https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a"
},
{
"url": "https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,158 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47336",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmackfs: restrict bytes count in smk_set_cipso()\n\nOops, I failed to update subject line.\n\nFrom 07571157c91b98ce1a4aa70967531e64b78e8346 Mon Sep 17 00:00:00 2001\nDate: Mon, 12 Apr 2021 22:25:06 +0900\nSubject: [PATCH] smackfs: restrict bytes count in smk_set_cipso()\n\nCommit 7ef4c19d245f3dc2 (\"smackfs: restrict bytes count in smackfs write\nfunctions\") missed that count > SMK_CIPSOMAX check applies to only\nformat == SMK_FIXED24_FMT case."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "5f9880403e6b"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.133",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.51",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.18",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.3",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca"
},
{
"url": "https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2"
},
{
"url": "https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d"
},
{
"url": "https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6"
},
{
"url": "https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0"
},
{
"url": "https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b"
},
{
"url": "https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766"
},
{
"url": "https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -193,6 +193,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -145,6 +145,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -174,6 +174,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -161,6 +161,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -107,6 +107,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -129,6 +129,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -77,6 +77,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-30310",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-30310",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in Comfast Comfast CF-616AC routers allows attackers to hijack TCP sessions which could lead to a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/",
"url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/"
}
]
}