"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-06-17 17:00:33 +00:00
parent 93521359fb
commit f2f102f23c
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
7 changed files with 93 additions and 220 deletions

View File

@ -5,231 +5,14 @@
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-47472", "ID": "CVE-2021-47472",
"ASSIGNER": "cve@kernel.org", "ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC" "STATE": "REJECT"
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdiobus: Fix memory leak in __mdiobus_register\n\nOnce device_register() failed, we should call put_device() to\ndecrement reference count for cleanup. Or it will cause memory\nleak.\n\nBUG: memory leak\nunreferenced object 0xffff888114032e00 (size 256):\n comm \"kworker/1:3\", pid 2960, jiffies 4294943572 (age 15.920s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 08 2e 03 14 81 88 ff ff ................\n 08 2e 03 14 81 88 ff ff 90 76 65 82 ff ff ff ff .........ve.....\n backtrace:\n [<ffffffff8265cfab>] kmalloc include/linux/slab.h:591 [inline]\n [<ffffffff8265cfab>] kzalloc include/linux/slab.h:721 [inline]\n [<ffffffff8265cfab>] device_private_init drivers/base/core.c:3203 [inline]\n [<ffffffff8265cfab>] device_add+0x89b/0xdf0 drivers/base/core.c:3253\n [<ffffffff828dd643>] __mdiobus_register+0xc3/0x450 drivers/net/phy/mdio_bus.c:537\n [<ffffffff828cb835>] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [<ffffffff82b92a00>] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [<ffffffff82b92a00>] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [<ffffffff82baa33f>] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [<ffffffff82c36e17>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [<ffffffff82661d17>] call_driver_probe drivers/base/dd.c:517 [inline]\n [<ffffffff82661d17>] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [<ffffffff826620bc>] really_probe drivers/base/dd.c:558 [inline]\n [<ffffffff826620bc>] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [<ffffffff826621ba>] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [<ffffffff82662a26>] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [<ffffffff8265eca7>] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427\n [<ffffffff826625a2>] __device_attach+0x122/0x260 drivers/base/dd.c:969\n [<ffffffff82660916>] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487\n [<ffffffff8265cd0b>] device_add+0x5fb/0xdf0 drivers/base/core.c:3359\n [<ffffffff82c343b9>] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2170\n [<ffffffff82c4473c>] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n\nBUG: memory leak\nunreferenced object 0xffff888116f06900 (size 32):\n comm \"kworker/0:2\", pid 2670, jiffies 4294944448 (age 7.160s)\n hex dump (first 32 bytes):\n 75 73 62 2d 30 30 31 3a 30 30 33 00 00 00 00 00 usb-001:003.....\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<ffffffff81484516>] kstrdup+0x36/0x70 mm/util.c:60\n [<ffffffff814845a3>] kstrdup_const+0x53/0x80 mm/util.c:83\n [<ffffffff82296ba2>] kvasprintf_const+0xc2/0x110 lib/kasprintf.c:48\n [<ffffffff82358d4b>] kobject_set_name_vargs+0x3b/0xe0 lib/kobject.c:289\n [<ffffffff826575f3>] dev_set_name+0x63/0x90 drivers/base/core.c:3147\n [<ffffffff828dd63b>] __mdiobus_register+0xbb/0x450 drivers/net/phy/mdio_bus.c:535\n [<ffffffff828cb835>] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [<ffffffff82b92a00>] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [<ffffffff82b92a00>] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [<ffffffff82baa33f>] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [<ffffffff82c36e17>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [<ffffffff82661d17>] call_driver_probe drivers/base/dd.c:517 [inline]\n [<ffffffff82661d17>] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [<ffffffff826620bc>] really_probe drivers/base/dd.c:558 [inline]\n [<ffffffff826620bc>] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [<ffffffff826621ba>] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [<ffffffff82662a26>] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [<ffffffff8265eca7>] bus_for_each\n---truncated---" "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
} }
] ]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "fd2400dd4f1b"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.290",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.291",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.288",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.289",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.253",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.254",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.214",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.215",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.156",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.157",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.76",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.77",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14.15",
"lessThanOrEqual": "5.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14.16",
"lessThanOrEqual": "5.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01"
},
{
"url": "https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4"
},
{
"url": "https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433"
},
{
"url": "https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d"
},
{
"url": "https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417"
},
{
"url": "https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4"
},
{
"url": "https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611"
},
{
"url": "https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9"
},
{
"url": "https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728"
},
{
"url": "https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec"
},
{
"url": "https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b"
},
{
"url": "https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa"
},
{
"url": "https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193"
},
{
"url": "https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a"
},
{
"url": "https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
} }
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A maliciously crafted IGS or IGES file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process." "value": "A maliciously crafted IGS file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process."
} }
] ]
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6076",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6077",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6078",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6079",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6080",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}