From f2f102f23c0f83ee5c310e03a1dde5bc0dc4a8ad Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 17 Jun 2024 17:00:33 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/47xxx/CVE-2021-47472.json | 221 +-------------------------------- 2024/23xxx/CVE-2024-23134.json | 2 +- 2024/6xxx/CVE-2024-6076.json | 18 +++ 2024/6xxx/CVE-2024-6077.json | 18 +++ 2024/6xxx/CVE-2024-6078.json | 18 +++ 2024/6xxx/CVE-2024-6079.json | 18 +++ 2024/6xxx/CVE-2024-6080.json | 18 +++ 7 files changed, 93 insertions(+), 220 deletions(-) create mode 100644 2024/6xxx/CVE-2024-6076.json create mode 100644 2024/6xxx/CVE-2024-6077.json create mode 100644 2024/6xxx/CVE-2024-6078.json create mode 100644 2024/6xxx/CVE-2024-6079.json create mode 100644 2024/6xxx/CVE-2024-6080.json diff --git a/2021/47xxx/CVE-2021-47472.json b/2021/47xxx/CVE-2021-47472.json index 32ae19552d1..1f875a74107 100644 --- a/2021/47xxx/CVE-2021-47472.json +++ b/2021/47xxx/CVE-2021-47472.json @@ -5,231 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2021-47472", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdiobus: Fix memory leak in __mdiobus_register\n\nOnce device_register() failed, we should call put_device() to\ndecrement reference count for cleanup. Or it will cause memory\nleak.\n\nBUG: memory leak\nunreferenced object 0xffff888114032e00 (size 256):\n comm \"kworker/1:3\", pid 2960, jiffies 4294943572 (age 15.920s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 08 2e 03 14 81 88 ff ff ................\n 08 2e 03 14 81 88 ff ff 90 76 65 82 ff ff ff ff .........ve.....\n backtrace:\n [] kmalloc include/linux/slab.h:591 [inline]\n [] kzalloc include/linux/slab.h:721 [inline]\n [] device_private_init drivers/base/core.c:3203 [inline]\n [] device_add+0x89b/0xdf0 drivers/base/core.c:3253\n [] __mdiobus_register+0xc3/0x450 drivers/net/phy/mdio_bus.c:537\n [] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [] call_driver_probe drivers/base/dd.c:517 [inline]\n [] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [] really_probe drivers/base/dd.c:558 [inline]\n [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427\n [] __device_attach+0x122/0x260 drivers/base/dd.c:969\n [] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487\n [] device_add+0x5fb/0xdf0 drivers/base/core.c:3359\n [] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2170\n [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n\nBUG: memory leak\nunreferenced object 0xffff888116f06900 (size 32):\n comm \"kworker/0:2\", pid 2670, jiffies 4294944448 (age 7.160s)\n hex dump (first 32 bytes):\n 75 73 62 2d 30 30 31 3a 30 30 33 00 00 00 00 00 usb-001:003.....\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [] kstrdup+0x36/0x70 mm/util.c:60\n [] kstrdup_const+0x53/0x80 mm/util.c:83\n [] kvasprintf_const+0xc2/0x110 lib/kasprintf.c:48\n [] kobject_set_name_vargs+0x3b/0xe0 lib/kobject.c:289\n [] dev_set_name+0x63/0x90 drivers/base/core.c:3147\n [] __mdiobus_register+0xbb/0x450 drivers/net/phy/mdio_bus.c:535\n [] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [] call_driver_probe drivers/base/dd.c:517 [inline]\n [] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [] really_probe drivers/base/dd.c:558 [inline]\n [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [] bus_for_each\n---truncated---" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "1da177e4c3f4", - "version_value": "fd2400dd4f1b" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "4.4.290", - "lessThanOrEqual": "4.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.4.291", - "lessThanOrEqual": "4.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.9.288", - "lessThanOrEqual": "4.9.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.9.289", - "lessThanOrEqual": "4.9.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.14.253", - "lessThanOrEqual": "4.14.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.14.254", - "lessThanOrEqual": "4.14.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.19.214", - "lessThanOrEqual": "4.19.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "4.19.215", - "lessThanOrEqual": "4.19.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.4.156", - "lessThanOrEqual": "5.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.4.157", - "lessThanOrEqual": "5.4.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.10.76", - "lessThanOrEqual": "5.10.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.10.77", - "lessThanOrEqual": "5.10.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.14.15", - "lessThanOrEqual": "5.14.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.14.16", - "lessThanOrEqual": "5.14.*", - "status": "unaffected", - "versionType": "custom" - }, - { - "version": "5.15", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01" - }, - { - "url": "https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4" - }, - { - "url": "https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433" - }, - { - "url": "https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d" - }, - { - "url": "https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417" - }, - { - "url": "https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4" - }, - { - "url": "https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611" - }, - { - "url": "https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9" - }, - { - "url": "https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728" - }, - { - "url": "https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec" - }, - { - "url": "https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b" - }, - { - "url": "https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa" - }, - { - "url": "https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193" - }, - { - "url": "https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a" - }, - { - "url": "https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e" - } - ] - }, - "generator": { - "engine": "bippy-a5840b7849dd" } } \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23134.json b/2024/23xxx/CVE-2024-23134.json index 0b24cd99358..d674dd2959c 100644 --- a/2024/23xxx/CVE-2024-23134.json +++ b/2024/23xxx/CVE-2024-23134.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A maliciously crafted IGS or IGES file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process." + "value": "A maliciously crafted IGS file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process." } ] }, diff --git a/2024/6xxx/CVE-2024-6076.json b/2024/6xxx/CVE-2024-6076.json new file mode 100644 index 00000000000..58c6d7459fd --- /dev/null +++ b/2024/6xxx/CVE-2024-6076.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6076", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6077.json b/2024/6xxx/CVE-2024-6077.json new file mode 100644 index 00000000000..299525a168f --- /dev/null +++ b/2024/6xxx/CVE-2024-6077.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6077", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6078.json b/2024/6xxx/CVE-2024-6078.json new file mode 100644 index 00000000000..0d9c308a7e5 --- /dev/null +++ b/2024/6xxx/CVE-2024-6078.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6078", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6079.json b/2024/6xxx/CVE-2024-6079.json new file mode 100644 index 00000000000..e2f939d028a --- /dev/null +++ b/2024/6xxx/CVE-2024-6079.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6079", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6080.json b/2024/6xxx/CVE-2024-6080.json new file mode 100644 index 00000000000..eca26d4b33d --- /dev/null +++ b/2024/6xxx/CVE-2024-6080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file