diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json new file mode 100644 index 00000000000..89e7dd1ca5d --- /dev/null +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11850.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2020-11850", + "sourceIdentifier": "security@opentext.com", + "published": "2024-08-21T13:15:04.027", + "lastModified": "2024-08-21T13:15:04.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in OpenText Self Service Password Reset allows Cross-Site Scripting (XSS).\u00a0This issue affects Self Service Password Reset before 4.5.0.2 and\u00a04.4.0.6" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.netiq.com/documentation/self-service-password-reset-45/sspr-4502-release-notes/data/sspr-4502-release-notes.html#b149gz5h", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json index 24c7932fb34..3388a406c2e 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48867", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:03.860", - "lastModified": "2024-08-21T07:15:03.860", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Prevent use after free on completion memory\n\nOn driver unload any pending descriptors are flushed at the\ntime the interrupt is freed:\nidxd_dmaengine_drv_remove() ->\n\tdrv_disable_wq() ->\n\t\tidxd_wq_free_irq() ->\n\t\t\tidxd_flush_pending_descs().\n\nIf there are any descriptors present that need to be flushed this\nflow triggers a \"not present\" page fault as below:\n\n BUG: unable to handle page fault for address: ff391c97c70c9040\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n\nThe address that triggers the fault is the address of the\ndescriptor that was freed moments earlier via:\ndrv_disable_wq()->idxd_wq_free_resources()\n\nFix the use after free by freeing the descriptors after any possible\nusage. This is done after idxd_wq_reset() to ensure that the memory\nremains accessible during possible completion writes by the device." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: evita el use after free la memoria al finalizar. Al descargar el controlador, los descriptores pendientes se eliminan en el momento en que se libera la interrupci\u00f3n: idxd_dmaengine_drv_remove() -> drv_disable_wq() -> idxd_wq_free_irq () -> idxd_flush_pending_descs(). Si hay alg\u00fan descriptor presente que deba eliminarse, este flujo desencadena un error de p\u00e1gina \"no presente\" como se muestra a continuaci\u00f3n: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ff391c97c70c9040 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000 ) - p\u00e1gina no presente La direcci\u00f3n que desencadena la falla es la direcci\u00f3n del descriptor que se liber\u00f3 momentos antes a trav\u00e9s de: drv_disable_wq()->idxd_wq_free_resources() Corrige el use-after-free liberando los descriptores despu\u00e9s de cualquier posible uso. Esto se hace despu\u00e9s de idxd_wq_reset() para garantizar que la memoria permanezca accesible durante posibles escrituras completas por parte del dispositivo." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48868.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48868.json index 05579af625a..82226c9389b 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48868.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48868.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48868", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.020", - "lastModified": "2024-08-21T07:15:04.020", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Let probe fail when workqueue cannot be enabled\n\nThe workqueue is enabled when the appropriate driver is loaded and\ndisabled when the driver is removed. When the driver is removed it\nassumes that the workqueue was enabled successfully and proceeds to\nfree allocations made during workqueue enabling.\n\nFailure during workqueue enabling does not prevent the driver from\nbeing loaded. This is because the error path within drv_enable_wq()\nreturns success unless a second failure is encountered\nduring the error path. By returning success it is possible to load\nthe driver even if the workqueue cannot be enabled and\nallocations that do not exist are attempted to be freed during\ndriver remove.\n\nSome examples of problematic flows:\n(a)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_unmap_portal() is called on error exit path, but\n drv_enable_wq() returns 0 because idxd_wq_disable() succeeds. The\n driver is thus loaded successfully.\n\n idxd_dmaengine_drv_remove()->drv_disable_wq()->idxd_wq_unmap_portal()\n Above flow on driver unload triggers the WARN in devm_iounmap() because\n the device resource has already been removed during error path of\n drv_enable_wq().\n\n(b)\n\n idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq():\n In above flow, if idxd_wq_request_irq() fails then\n idxd_wq_init_percpu_ref() is never called to initialize the percpu\n counter, yet the driver loads successfully because drv_enable_wq()\n returns 0.\n\n idxd_dmaengine_drv_remove()->__idxd_wq_quiesce()->percpu_ref_kill():\n Above flow on driver unload triggers a BUG when attempting to drop the\n initial ref of the uninitialized percpu ref:\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n\nFix the drv_enable_wq() error path by returning the original error that\nindicates failure of workqueue enabling. This ensures that the probe\nfails when an error is encountered and the driver remove paths are only\nattempted when the workqueue was enabled successfully." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: permite que la sonda falle cuando no se puede habilitar la cola de trabajo. La cola de trabajo se habilita cuando se carga el controlador apropiado y se deshabilita cuando se elimina el controlador. Cuando se elimina el controlador, se supone que la cola de trabajo se habilit\u00f3 correctamente y procede a liberar las asignaciones realizadas durante la habilitaci\u00f3n de la cola de trabajo. La falla durante la habilitaci\u00f3n de la cola de trabajo no impide que se cargue el controlador. Esto se debe a que la ruta de error dentro de drv_enable_wq() devuelve \u00e9xito a menos que se encuentre una segunda falla durante la ruta de error. Al devolver el \u00e9xito, es posible cargar el controlador incluso si no se puede habilitar la cola de trabajo y se intenta liberar las asignaciones que no existen durante la eliminaci\u00f3n del controlador. Algunos ejemplos de flujos problem\u00e1ticos: (a) idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq(): en el flujo anterior, si idxd_wq_request_irq() falla, se llama a idxd_wq_unmap_portal() en la ruta de salida de error, pero drv_enable_wq() devuelve 0 porque idxd_wq_disable() tiene \u00e9xito. De este modo, el controlador se carga correctamente. idxd_dmaengine_drv_remove()->drv_disable_wq()->idxd_wq_unmap_portal() El flujo anterior al descargar el controlador activa la ADVERTENCIA en devm_iounmap() porque el recurso del dispositivo ya se elimin\u00f3 durante la ruta de error de drv_enable_wq(). (b) idxd_dmaengine_drv_probe() -> drv_enable_wq() -> idxd_wq_request_irq(): en el flujo anterior, si idxd_wq_request_irq() falla, nunca se llama a idxd_wq_init_percpu_ref() para inicializar el contador de percpu, pero el controlador se carga correctamente porque drv_enable_wq() devuelve 0 idxd_dmaengine_drv_remove()->__idxd_wq_quiesce()->percpu_ref_kill(): El flujo anterior en la descarga del controlador desencadena un ERROR al intentar eliminar la referencia inicial de la referencia percpu no inicializada: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000010 Corrija el drv_enable_wq(. ) ruta de error al devolver el error original que indica un error al habilitar la cola de trabajo. Esto garantiza que la sonda falle cuando se encuentre un error y que las rutas de eliminaci\u00f3n del controlador solo se intenten cuando la cola de trabajo se habilit\u00f3 correctamente." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json index ddc530a5eb0..8d25d79a4b8 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48869", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.080", - "lastModified": "2024-08-21T07:15:04.080", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadgetfs: Fix race between mounting and unmounting\n\nThe syzbot fuzzer and Gerald Lee have identified a use-after-free bug\nin the gadgetfs driver, involving processes concurrently mounting and\nunmounting the gadgetfs filesystem. In particular, gadgetfs_fill_super()\ncan race with gadgetfs_kill_sb(), causing the latter to deallocate\nthe_device while the former is using it. The output from KASAN says,\nin part:\n\nBUG: KASAN: use-after-free in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]\nBUG: KASAN: use-after-free in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]\nBUG: KASAN: use-after-free in __refcount_sub_and_test include/linux/refcount.h:272 [inline]\nBUG: KASAN: use-after-free in __refcount_dec_and_test include/linux/refcount.h:315 [inline]\nBUG: KASAN: use-after-free in refcount_dec_and_test include/linux/refcount.h:333 [inline]\nBUG: KASAN: use-after-free in put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]\nBUG: KASAN: use-after-free in gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086\nWrite of size 4 at addr ffff8880276d7840 by task syz-executor126/18689\n\nCPU: 0 PID: 18689 Comm: syz-executor126 Not tainted 6.1.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nCall Trace:\n \n...\n atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]\n __refcount_sub_and_test include/linux/refcount.h:272 [inline]\n __refcount_dec_and_test include/linux/refcount.h:315 [inline]\n refcount_dec_and_test include/linux/refcount.h:333 [inline]\n put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]\n gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086\n deactivate_locked_super+0xa7/0xf0 fs/super.c:332\n vfs_get_super fs/super.c:1190 [inline]\n get_tree_single+0xd0/0x160 fs/super.c:1207\n vfs_get_tree+0x88/0x270 fs/super.c:1531\n vfs_fsconfig_locked fs/fsopen.c:232 [inline]\n\nThe simplest solution is to ensure that gadgetfs_fill_super() and\ngadgetfs_kill_sb() are serialized by making them both acquire a new\nmutex." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: gadgetfs: corrige la ejecuci\u00f3n entre montar y desmontar Syzbot fuzzer y Gerald Lee han identificado un error de use-after-free en el controlador gadgetfs, que involucra procesos que montan y desmontan simult\u00e1neamente los gadgetfs. sistema de archivos. En particular, gadgetfs_fill_super() puede competir con gadgetfs_kill_sb(), provocando que este \u00faltimo desasigne the_device mientras el primero lo est\u00e1 usando. El resultado de KASAN dice, en parte: ERROR: KASAN: use-after-free en instrument_atomic_read_write include/linux/instrumented.h:102 [en l\u00ednea] ERROR: KASAN: use-after-free en atomic_fetch_sub_release include/linux/atomic/atomic -instrumented.h:176 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_dec_and_test include/linux/refcount.h :315 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en put_dev drivers/usb/gadget/legacy/inode.c :159 [en l\u00ednea] ERROR: KASAN: use-after-free en gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff8880276d7840 mediante la tarea syz-executor126/18689 CPU: 0 PID: 18689 Comunicaci\u00f3n: syz-executor126 No contaminado 6.1.0-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Seguimiento de llamadas: ... atomic_fetch_sub_release include/linux/ atomic/atomic-instrumented.h:176 [en l\u00ednea] __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] __refcount_dec_and_test include/linux/refcount.h:315 [en l\u00ednea] refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea ] put_dev drivers/usb/gadget/legacy/inode.c:159 [en l\u00ednea] gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 deactivate_locked_super+0xa7/0xf0 fs/super.c:332 vfs_get_super fs /super.c:1190 [en l\u00ednea] get_tree_single+0xd0/0x160 fs/super.c:1207 vfs_get_tree+0x88/0x270 fs/super.c:1531 vfs_fsconfig_locked fs/fsopen.c:232 [en l\u00ednea] La soluci\u00f3n m\u00e1s sencilla es garantizar que gadgetfs_fill_super() y gadgetfs_kill_sb() se serializan haciendo que ambos adquieran un nuevo mutex." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json index 09f8f6d7d65..66145f4f629 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48870", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.143", - "lastModified": "2024-08-21T07:15:04.143", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: fix possible null-ptr-defer in spk_ttyio_release\n\nRun the following tests on the qemu platform:\n\nsyzkaller:~# modprobe speakup_audptr\n input: Speakup as /devices/virtual/input/input4\n initialized device: /dev/synth, node (MAJOR 10, MINOR 125)\n speakup 3.1.6: initialized\n synth name on entry is: (null)\n synth probe\n\nspk_ttyio_initialise_ldisc failed because tty_kopen_exclusive returned\nfailed (errno -16), then remove the module, we will get a null-ptr-defer\nproblem, as follow:\n\nsyzkaller:~# modprobe -r speakup_audptr\n releasing synth audptr\n BUG: kernel NULL pointer dereference, address: 0000000000000080\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 0 P4D 0\n Oops: 0002 [#1] PREEMPT SMP PTI\n CPU: 2 PID: 204 Comm: modprobe Not tainted 6.1.0-rc6-dirty #1\n RIP: 0010:mutex_lock+0x14/0x30\n Call Trace:\n \n spk_ttyio_release+0x19/0x70 [speakup]\n synth_release.part.6+0xac/0xc0 [speakup]\n synth_remove+0x56/0x60 [speakup]\n __x64_sys_delete_module+0x156/0x250\n ? fpregs_assert_state_consistent+0x1d/0x50\n do_syscall_64+0x37/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n \n Modules linked in: speakup_audptr(-) speakup\n Dumping ftrace buffer:\n\nin_synth->dev was not initialized during modprobe, so we add check\nfor in_synth->dev to fix this bug." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: corrige posible null-ptr-defer en spk_ttyio_release Ejecute las siguientes pruebas en la plataforma qemu: syzkaller:~# modprobe Speakup_audptr input: Speakup as /devices/virtual/input/input4 dispositivo inicializado: /dev/synth, nodo (MAJOR 10, MINOR 125) Speakup 3.1.6: el nombre del sintetizador inicializado en la entrada es: (nulo) la sonda de sintetizador spk_ttyio_initialise_ldisc fall\u00f3 porque tty_kopen_exclusive devolvi\u00f3 un error (errno -16), luego elimine el m\u00f3dulo, obtendremos un problema de aplazamiento de ptr nulo, como sigue: syzkaller:~# modprobe -r Speakup_audptr liberando sintetizador audptr ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000080 #PF: acceso de escritura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0002 ) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP PTI CPU: 2 PID: 204 Comm: modprobe No contaminado 6.1.0-rc6-dirty #1 RIP: 0010:mutex_lock+0x14/0x30 Llamada Seguimiento: spk_ttyio_release+0x19/0x70 [speakup] synth_release.part.6+0xac/0xc0 [speakup] synth_remove+0x56/0x60 [speakup] __x64_sys_delete_module+0x156/0x250? fpregs_assert_state_consistent+0x1d/0x50 do_syscall_64+0x37/0x90 entry_syscall_64_after_hwframe+0x63/0xcd m\u00f3dulos vinculados en: sheakup_audptr (-) volcando ftrace b\u00fafer: in_synth->> nth-> dev para corregir este error." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json index a8f1c213b7f..cad23aad5ad 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48871", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.207", - "lastModified": "2024-08-21T07:15:04.207", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer\n\nDriver's probe allocates memory for RX FIFO (port->rx_fifo) based on\ndefault RX FIFO depth, e.g. 16. Later during serial startup the\nqcom_geni_serial_port_setup() updates the RX FIFO depth\n(port->rx_fifo_depth) to match real device capabilities, e.g. to 32.\n\nThe RX UART handle code will read \"port->rx_fifo_depth\" number of words\ninto \"port->rx_fifo\" buffer, thus exceeding the bounds. This can be\nobserved in certain configurations with Qualcomm Bluetooth HCI UART\ndevice and KASAN:\n\n Bluetooth: hci0: QCA Product ID :0x00000010\n Bluetooth: hci0: QCA SOC Version :0x400a0200\n Bluetooth: hci0: QCA ROM Version :0x00000200\n Bluetooth: hci0: QCA Patch Version:0x00000d2b\n Bluetooth: hci0: QCA controller version 0x02000200\n Bluetooth: hci0: QCA Downloading qca/htbtfw20.tlv\n bluetooth hci0: Direct firmware load for qca/htbtfw20.tlv failed with error -2\n Bluetooth: hci0: QCA Failed to request file: qca/htbtfw20.tlv (-2)\n Bluetooth: hci0: QCA Failed to download patch (-2)\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in handle_rx_uart+0xa8/0x18c\n Write of size 4 at addr ffff279347d578c0 by task swapper/0/0\n\n CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n Call trace:\n dump_backtrace.part.0+0xe0/0xf0\n show_stack+0x18/0x40\n dump_stack_lvl+0x8c/0xb8\n print_report+0x188/0x488\n kasan_report+0xb4/0x100\n __asan_store4+0x80/0xa4\n handle_rx_uart+0xa8/0x18c\n qcom_geni_serial_handle_rx+0x84/0x9c\n qcom_geni_serial_isr+0x24c/0x760\n __handle_irq_event_percpu+0x108/0x500\n handle_irq_event+0x6c/0x110\n handle_fasteoi_irq+0x138/0x2cc\n generic_handle_domain_irq+0x48/0x64\n\nIf the RX FIFO depth changes after probe, be sure to resize the buffer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: serial: qcom-geni-serial: corrige los l\u00edmites fuera de los l\u00edmites en el b\u00fafer RX FIFO La sonda del controlador asigna memoria para RX FIFO (puerto->rx_fifo) seg\u00fan el valor predeterminado Profundidad FIFO de RX, por ejemplo, 16. M\u00e1s adelante, durante el inicio en serie, qcom_geni_serial_port_setup() actualiza la profundidad FIFO de RX (puerto->rx_fifo_profundidad) para que coincida con las capacidades reales del dispositivo, por ejemplo, a 32. El c\u00f3digo de identificador de RX UART leer\u00e1 el n\u00famero \"puerto->rx_fifo_profundidad\" de palabras en el b\u00fafer \"port->rx_fifo\", excediendo as\u00ed los l\u00edmites. Esto se puede observar en ciertas configuraciones con el dispositivo Qualcomm Bluetooth HCI UART y KASAN: Bluetooth: hci0: QCA ID de producto: 0x00000010 Bluetooth: hci0: QCA SOC Version: 0x400a0200 Bluetooth: hci0: QCA ROM Version: 0x00000200 Bluetooth: hci0: QCA Patch Version :0x00000d2b Bluetooth: hci0: versi\u00f3n del controlador QCA 0x02000200 Bluetooth: hci0: QCA Descargando qca/htbtfw20.tlv bluetooth hci0: La carga directa del firmware para qca/htbtfw20.tlv fall\u00f3 con el error -2 Bluetooth: hci0: QCA No se pudo solicitar el archivo: qca/ htbtfw20.tlv (-2) Bluetooth: hci0: QCA Error al descargar el parche (-2) =============================== ==================================== ERROR: KASAN: losa fuera de los l\u00edmites en handle_rx_uart+ 0xa8/0x18c Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff279347d578c0 mediante task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26 Nombre de hardware: Qualcomm Technologies, Inc Rob\u00f3tica RB5 (DT) Seguimiento de llamadas: dump_backtrace.part.0+0xe0/0xf0 show_stack+0x18/0x40 dump_stack_lvl+0x8c/0xb8 print_report+0x188/0x488 kasan_report+0xb4/0x100 __asan_store4+0x80/0xa4 handle_rx_uart+0xa. 8/0x18c qcom_geni_serial_handle_rx+ 0x84/0x9c qcom_geni_serial_isr+0x24c/0x760 __handle_irq_event_percpu+0x108/0x500 handle_irq_event+0x6c/0x110 handle_fasteoi_irq+0x138/0x2cc generic_handle_domain_irq+0x48/0x64 Si la profundidad FIFO de RX cambia despu\u00e9s sonda, aseg\u00farese de cambiar el tama\u00f1o del b\u00fafer." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json index 5e621838268..4208fc86ea0 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48872", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.267", - "lastModified": "2024-08-21T07:15:04.267", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Fix use-after-free race condition for maps\n\nIt is possible that in between calling fastrpc_map_get() until\nmap->fl->lock is taken in fastrpc_free_map(), another thread can call\nfastrpc_map_lookup() and get a reference to a map that is about to be\ndeleted.\n\nRewrite fastrpc_map_get() to only increase the reference count of a map\nif it's non-zero. Propagate this to callers so they can know if a map is\nabout to be deleted.\n\nFixes this warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 5 PID: 10100 at lib/refcount.c:25 refcount_warn_saturate\n...\nCall trace:\n refcount_warn_saturate\n [fastrpc_map_get inlined]\n [fastrpc_map_lookup inlined]\n fastrpc_map_create\n fastrpc_internal_invoke\n fastrpc_device_ioctl\n __arm64_sys_ioctl\n invoke_syscall" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: corrige la condici\u00f3n de ejecuci\u00f3n de use-after-free para mapas. Es posible que entre llamadas a fastrpc_map_get() hasta que se tome map->fl->lock en fastrpc_free_map() , otro hilo puede llamar a fastrpc_map_lookup() y obtener una referencia a un mapa que est\u00e1 a punto de ser eliminado. Vuelva a escribir fastrpc_map_get() para aumentar solo el recuento de referencias de un mapa si no es cero. Propague esto a las personas que llaman para que puedan saber si un mapa est\u00e1 a punto de ser eliminado. Corrige esta advertencia: refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 5 PID: 10100 en lib/refcount.c:25 refcount_warn_saturate... Rastreo de llamadas: refcount_warn_saturate [fastrpc_map_get inlined] [fastrpc_map_lookup inlined] fastrpc_map_create fastrpc_internal_invoke fastrpc_device_ioctl __arm64_sys_ioctl invoke_sy llamar" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json index 01464766db6..45ed66a94fc 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48873", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.323", - "lastModified": "2024-08-21T07:15:04.323", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Don't remove map on creater_process and device_release\n\nDo not remove the map from the list on error path in\nfastrpc_init_create_process, instead call fastrpc_map_put, to avoid\nuse-after-free. Do not remove it on fastrpc_device_release either,\ncall fastrpc_map_put instead.\n\nThe fastrpc_free_map is the only proper place to remove the map.\nThis is called only after the reference count is 0." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: no elimine el mapa en creater_process y device_release. No elimine el mapa de la lista en la ruta de error en fastrpc_init_create_process; en su lugar, llame a fastrpc_map_put para evitar el use-after-free. Tampoco lo elimine en fastrpc_device_release; en su lugar, llame a fastrpc_map_put. fastrpc_free_map es el \u00fanico lugar adecuado para eliminar el mapa. Esto se llama solo despu\u00e9s de que el recuento de referencias sea 0." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48874.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48874.json index 9491026e96b..5d77eb8d796 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48874.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48874.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48874", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.383", - "lastModified": "2024-08-21T07:15:04.383", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Fix use-after-free and race in fastrpc_map_find\n\nCurrently, there is a race window between the point when the mutex is\nunlocked in fastrpc_map_lookup and the reference count increasing\n(fastrpc_map_get) in fastrpc_map_find, which can also lead to\nuse-after-free.\n\nSo lets merge fastrpc_map_find into fastrpc_map_lookup which allows us\nto both protect the maps list by also taking the &fl->lock spinlock and\nthe reference count, since the spinlock will be released only after.\nAdd take_ref argument to make this suitable for all callers." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: corrige use-after-free y ejecuci\u00f3n en fastrpc_map_find Actualmente, hay una ventana de ejecuci\u00f3n entre el punto en el que se desbloquea el mutex en fastrpc_map_lookup y el recuento de referencias aumenta (fastrpc_map_get ) en fastrpc_map_find, lo que tambi\u00e9n puede generar use-after-free. Entonces, fusionemos fastrpc_map_find con fastrpc_map_lookup, lo que nos permite proteger la lista de mapas tomando tambi\u00e9n el &fl->lock spinlock y el recuento de referencias, ya que el spinlock se liberar\u00e1 solo despu\u00e9s. Agregue el argumento take_ref para que sea adecuado para todas las personas que llaman." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48875.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48875.json index 6cfdd0669af..37750d0751b 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48875.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48875.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48875", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.440", - "lastModified": "2024-08-21T07:15:04.440", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: sdata can be NULL during AMPDU start\n\nieee80211_tx_ba_session_handle_start() may get NULL for sdata when a\ndeauthentication is ongoing.\n\nHere a trace triggering the race with the hostapd test\nmulti_ap_fronthaul_on_ap:\n\n(gdb) list *drv_ampdu_action+0x46\n0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396).\n391 int ret = -EOPNOTSUPP;\n392\n393 might_sleep();\n394\n395 sdata = get_bss_sdata(sdata);\n396 if (!check_sdata_in_driver(sdata))\n397 return -EIO;\n398\n399 trace_drv_ampdu_action(local, sdata, params);\n400\n\nwlan0: moving STA 02:00:00:00:03:00 to state 3\nwlan0: associated\nwlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING)\nwlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0\nwlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port)\nwlan0: moving STA 02:00:00:00:03:00 to state 2\nwlan0: moving STA 02:00:00:00:03:00 to state 1\nwlan0: Removed STA 02:00:00:00:03:00\nwlan0: Destroyed STA 02:00:00:00:03:00\nBUG: unable to handle page fault for address: fffffffffffffb48\nPGD 11814067 P4D 11814067 PUD 11816067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G W 6.1.0-rc8-wt+ #59\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014\nWorkqueue: phy3 ieee80211_ba_session_work [mac80211]\nRIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211]\nCode: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 <8b> 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85\nRSP: 0018:ffffc900025ebd20 EFLAGS: 00010287\nRAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240\nRDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40\nRBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001\nR10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0\nR13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8\nFS: 0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0\nCall Trace:\n \n ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211]\n ieee80211_ba_session_work+0xff/0x2e0 [mac80211]\n process_one_work+0x29f/0x620\n worker_thread+0x4d/0x3d0\n ? process_one_work+0x620/0x620\n kthread+0xfb/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30\n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: wifi: mac80211: sdata puede ser NULL durante el inicio de AMPDU. ieee80211_tx_ba_session_handle_start() puede obtener NULL para sdata cuando se est\u00e1 realizando una desautenticaci\u00f3n. Aqu\u00ed un rastro que desencadena la ejecuci\u00f3n con la prueba hostapd multi_ap_fronthaul_on_ap: (gdb) list *drv_ampdu_action+0x46 0x8b16 est\u00e1 en drv_ampdu_action (net/mac80211/driver-ops.c:396). 391 int ret = -EOPNOTSUPP; 392 393 podr\u00eda_dormir(); 394 395 sdata = get_bss_sdata(sdata); 396 si (!check_sdata_in_driver(sdata)) 397 retorno -EIO; 398 399 trace_drv_ampdu_action(local, sdata, params); 400 wlan0: mover STA 02:00:00:00:03:00 al estado 3 wlan0: wlan0 asociado: desautenticar desde 02:00:00:00:03:00 por elecci\u00f3n local (Raz\u00f3n: 3=DEAUTH_LEAVING) wlan3.sta1 : Sesi\u00f3n de BA abierta solicitada para 02:00:00:00:00:00 tid 0 wlan3.sta1: cuadro eliminado a 02:00:00:00:00:00 (puerto no autorizado) wlan0: moviendo STA 02:00:00 :00:03:00 al estado 2 wlan0: moviendo STA 02:00:00:00:03:00 al estado 1 wlan0: STA eliminada 02:00:00:00:03:00 wlan0: STA destruida 02:00: 00:00:03:00 ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: fffffffffffffffb48 PGD 11814067 P4D 11814067 PUD 11816067 PMD 0 Ups: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted : GW 6.1.0-rc8-wt+ #59 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 01/04/2014 Cola de trabajo: phy3 ieee80211_ba_session_work [mac80211] RIP: _ampdu_acci\u00f3n +0x46/0x280 [mac80211] C\u00f3digo: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 10 0e 00 00 <8b> 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85 RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287 RAX: 0000000000000000 RBX: ffffffffffff1f0 RCX: ffff888102228240 RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40 RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001 R10: 00000000000000001 R11: 0000000000000000 R12: 888118c18ec0 R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8 FS: 0000000000000000(0000) GS:ffff88817a600000(0000) 0000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0 Seguimiento de llamadas: ieee80211_tx_ba_session_handle_start+0xd0/0x190 11] ieee80211_ba_session_work+0xff/0x2e0 [mac80211] Process_one_work+0x29f/0x620 trabajador_thread+0x4d/0x3d0? proceso_one_work+0x620/0x620 kthread+0xfb/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 " } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48876.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48876.json index a2a60224d04..97478fe4807 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48876.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48876.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48876", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.500", - "lastModified": "2024-08-21T07:15:04.500", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix initialization of rx->link and rx->link_sta\n\nThere are some codepaths that do not initialize rx->link_sta properly. This\ncauses a crash in places which assume that rx->link_sta is valid if rx->sta\nis valid.\nOne known instance is triggered by __ieee80211_rx_h_amsdu being called from\nfast-rx. It results in a crash like this one:\n\n BUG: kernel NULL pointer dereference, address: 00000000000000a8\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page PGD 0 P4D 0\n Oops: 0002 [#1] PREEMPT SMP PTI\n CPU: 1 PID: 506 Comm: mt76-usb-rx phy Tainted: G E 6.1.0-debian64x+1.7 #3\n Hardware name: ZOTAC ZBOX-ID92/ZBOX-IQ01/ZBOX-ID92/ZBOX-IQ01, BIOS B220P007 05/21/2014\n RIP: 0010:ieee80211_deliver_skb+0x62/0x1f0 [mac80211]\n Code: 00 48 89 04 24 e8 9e a7 c3 df 89 c0 48 03 1c c5 a0 ea 39 a1 4c 01 6b 08 48 ff 03 48\n 83 7d 28 00 74 11 48 8b 45 30 48 63 55 44 <48> 83 84 d0 a8 00 00 00 01 41 8b 86 c0\n 11 00 00 8d 50 fd 83 fa 01\n RSP: 0018:ffff999040803b10 EFLAGS: 00010286\n RAX: 0000000000000000 RBX: ffffb9903f496480 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffff999040803ce0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d21828ac900\n R13: 000000000000004a R14: ffff8d2198ed89c0 R15: ffff8d2198ed8000\n FS: 0000000000000000(0000) GS:ffff8d24afe80000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000000a8 CR3: 0000000429810002 CR4: 00000000001706e0\n Call Trace:\n \n __ieee80211_rx_h_amsdu+0x1b5/0x240 [mac80211]\n ? ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]\n ? __local_bh_enable_ip+0x3b/0xa0\n ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]\n ? prepare_transfer+0x109/0x1a0 [xhci_hcd]\n ieee80211_rx_list+0xa80/0xda0 [mac80211]\n mt76_rx_complete+0x207/0x2e0 [mt76]\n mt76_rx_poll_complete+0x357/0x5a0 [mt76]\n mt76u_rx_worker+0x4f5/0x600 [mt76_usb]\n ? mt76_get_min_avg_rssi+0x140/0x140 [mt76]\n __mt76_worker_fn+0x50/0x80 [mt76]\n kthread+0xed/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30\n\nSince the initialization of rx->link and rx->link_sta is rather convoluted\nand duplicated in many places, clean it up by using a helper function to\nset it.\n\n[remove unnecessary rx->sta->sta.mlo check]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la inicializaci\u00f3n de rx->link y rx->link_sta Hay algunas rutas de c\u00f3digo que no inicializan rx->link_sta correctamente. Esto provoca un bloqueo en lugares que asumen que rx->link_sta es v\u00e1lido si rx->sta es v\u00e1lido. Una instancia conocida se activa cuando se llama a __ieee80211_rx_h_amsdu desde fast-rx. Resulta en un bloqueo como este: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000a8 #PF: acceso de escritura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0002) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0002 [#1 ] PREEMPT SMP PTI CPU: 1 PID: 506 Comm: mt76-usb-rx phy Contaminado: GE 6.1.0-debian64x+1.7 #3 Nombre del hardware: ZOTAC ZBOX-ID92/ZBOX-IQ01/ZBOX-ID92/ZBOX-IQ01, BIOS B220P007 21/05/2014 RIP: 0010:ieee80211_deliver_skb+0x62/0x1f0 [mac80211] C\u00f3digo: 00 48 89 04 24 e8 9e a7 c3 df 89 c0 48 03 1c c5 a0 ea 39 a1 4c 01 08 48 y siguientes 03 48 83 7d 28 00 74 11 48 8b 45 30 48 63 55 44 <48> 83 84 d0 a8 00 00 00 01 41 8b 86 c0 11 00 00 8d 50 fd 83 fa 01 RSP:ffff999040803b10 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffffb9903f496480 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000000000 RBP: ffff999040803ce0 R08: 00000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d21828ac900 R13: 000000000000004a R14: 98ed89c0 R15: ffff8d2198ed8000 FS: 0000000000000000(0000) GS:ffff8d24afe80000( 0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000a8 CR3: 0000000429810002 CR4: 00000000001 706e0 Seguimiento de llamadas: __ieee80211_rx_h_amsdu+0x1b5/0x240 [mac80211] ? ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]? __local_bh_enable_ip+0x3b/0xa0 ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]? prepare_transfer+0x109/0x1a0 [xhci_hcd] ieee80211_rx_list+0xa80/0xda0 [mac80211] mt76_rx_complete+0x207/0x2e0 [mt76] mt76_rx_poll_complete+0x357/0x5a0 [mt76u_rx_worker] +0x4f5/0x600 [mt76_usb] ? mt76_get_min_avg_rssi+0x140/0x140 [mt76] __mt76_worker_fn+0x50/0x80 [mt76] kthread+0xed/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 Dado que la inicializaci\u00f3n de rx->link y rx->link_sta es bastante complicada y duplicada en muchos lugares, l\u00edmpiela usando una funci\u00f3n auxiliar para configurarla. [eliminar comprobaci\u00f3n innecesaria de rx->sta->sta.mlo]" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json index 4d5407e51cf..adffcd9aab3 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.563", - "lastModified": "2024-08-21T07:15:04.563", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: let's avoid panic if extent_tree is not created\n\nThis patch avoids the below panic.\n\npc : __lookup_extent_tree+0xd8/0x760\nlr : f2fs_do_write_data_page+0x104/0x87c\nsp : ffffffc010cbb3c0\nx29: ffffffc010cbb3e0 x28: 0000000000000000\nx27: ffffff8803e7f020 x26: ffffff8803e7ed40\nx25: ffffff8803e7f020 x24: ffffffc010cbb460\nx23: ffffffc010cbb480 x22: 0000000000000000\nx21: 0000000000000000 x20: ffffffff22e90900\nx19: 0000000000000000 x18: ffffffc010c5d080\nx17: 0000000000000000 x16: 0000000000000020\nx15: ffffffdb1acdbb88 x14: ffffff888759e2b0\nx13: 0000000000000000 x12: ffffff802da49000\nx11: 000000000a001200 x10: ffffff8803e7ed40\nx9 : ffffff8023195800 x8 : ffffff802da49078\nx7 : 0000000000000001 x6 : 0000000000000000\nx5 : 0000000000000006 x4 : ffffffc010cbba28\nx3 : 0000000000000000 x2 : ffffffc010cbb480\nx1 : 0000000000000000 x0 : ffffff8803e7ed40\nCall trace:\n __lookup_extent_tree+0xd8/0x760\n f2fs_do_write_data_page+0x104/0x87c\n f2fs_write_single_data_page+0x420/0xb60\n f2fs_write_cache_pages+0x418/0xb1c\n __f2fs_write_data_pages+0x428/0x58c\n f2fs_write_data_pages+0x30/0x40\n do_writepages+0x88/0x190\n __writeback_single_inode+0x48/0x448\n writeback_sb_inodes+0x468/0x9e8\n __writeback_inodes_wb+0xb8/0x2a4\n wb_writeback+0x33c/0x740\n wb_do_writeback+0x2b4/0x400\n wb_workfn+0xe4/0x34c\n process_one_work+0x24c/0x5bc\n worker_thread+0x3e8/0xa50\n kthread+0x150/0x1b4" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: evitemos el p\u00e1nico si no se crea extend_tree. Este parche evita el siguiente p\u00e1nico. pc: __lookup_extent_tree+0xd8/0x760 lr: f2fs_do_write_data_page+0x104/0x87c sp: ffffffc010cbb3c0 x29: ffffffc010cbb3e0 x28: 0000000000000000 x27: ffffff8803e7f020 : ffffff8803e7ed40 x25: ffffff8803e7f020 x24: ffffffc010cbb460 x23: ffffffc010cbb480 x22: 0000000000000000 x21: 0000000000000000 x20: ffffffff22e9090 0x19: 0000000000000000 x18: ffffffc010c5d080 x17: 0000000000000000 x16: 0000000000000020 x15: ffffffdb1acdbb88 x14: ffffff888759e2b0 x13: 0000000000000000 x12: 02da49000 x11: 000000000a001200 x10: ffffff8803e7ed40 x9: ffffff8023195800 x8: ffffff802da49078 x7: 0000000000000001 x6: 0000000000000000 x5 000000000000006 x4: ffffffc010cbba28 x3: 0000000000000000 x2: ffffffc010cbb480 x1: 0000000000000000 x0: ffffff8803e7ed40 Rastreo de llamadas: __lookup_extent_tree+0xd8/0x760 f2fs_do_write_data_page+0x104/0x87c f2fs_write_single_data_page+0x420/0xb60 f 2fs_write_cache_pages+0x418/0xb1c __f2fs_write_data_pages+0x428/0x58c f2fs_write_data_pages+0x30/0x40 do_writepages+0x88/0x190 __writeback_single_inode+0x48/0x448 writeback_sb_inodes+0x468/0x9e8 __writeback_inodes_wb+0xb8/0x2a4 wb_writeback+0x33c/0x740 wb_do_writeback+0x2b4/0x400 wb_workfn+0xe4/0x34c Process_one_work+0x24c/0x5bc trabajador_thread+0x3e8/0xa 50 khilo+0x150/0x1b4" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48878.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48878.json index bb2e19ec85b..d5cee4c8d79 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48878.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48878.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48878", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.627", - "lastModified": "2024-08-21T07:15:04.627", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_qca: Fix driver shutdown on closed serdev\n\nThe driver shutdown callback (which sends EDL_SOC_RESET to the device\nover serdev) should not be invoked when HCI device is not open (e.g. if\nhci_dev_open_sync() failed), because the serdev and its TTY are not open\neither. Also skip this step if device is powered off\n(qca_power_shutdown()).\n\nThe shutdown callback causes use-after-free during system reboot with\nQualcomm Atheros Bluetooth:\n\n Unable to handle kernel paging request at virtual address\n 0072662f67726fd7\n ...\n CPU: 6 PID: 1 Comm: systemd-shutdow Tainted: G W\n 6.1.0-rt5-00325-g8a5f56bcfcca #8\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n Call trace:\n tty_driver_flush_buffer+0x4/0x30\n serdev_device_write_flush+0x24/0x34\n qca_serdev_shutdown+0x80/0x130 [hci_uart]\n device_shutdown+0x15c/0x260\n kernel_restart+0x48/0xac\n\nKASAN report:\n\n BUG: KASAN: use-after-free in tty_driver_flush_buffer+0x1c/0x50\n Read of size 8 at addr ffff16270c2e0018 by task systemd-shutdow/1\n\n CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted\n 6.1.0-next-20221220-00014-gb85aaf97fb01-dirty #28\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n Call trace:\n dump_backtrace.part.0+0xdc/0xf0\n show_stack+0x18/0x30\n dump_stack_lvl+0x68/0x84\n print_report+0x188/0x488\n kasan_report+0xa4/0xf0\n __asan_load8+0x80/0xac\n tty_driver_flush_buffer+0x1c/0x50\n ttyport_write_flush+0x34/0x44\n serdev_device_write_flush+0x48/0x60\n qca_serdev_shutdown+0x124/0x274\n device_shutdown+0x1e8/0x350\n kernel_restart+0x48/0xb0\n __do_sys_reboot+0x244/0x2d0\n __arm64_sys_reboot+0x54/0x70\n invoke_syscall+0x60/0x190\n el0_svc_common.constprop.0+0x7c/0x160\n do_el0_svc+0x44/0xf0\n el0_svc+0x2c/0x6c\n el0t_64_sync_handler+0xbc/0x140\n el0t_64_sync+0x190/0x194" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: hci_qca: corrige el apagado del controlador en serdev cerrado La devoluci\u00f3n de llamada de apagado del controlador (que env\u00eda EDL_SOC_RESET al dispositivo a trav\u00e9s de serdev) no debe invocarse cuando el dispositivo HCI no est\u00e1 abierto (por ejemplo, si hci_dev_open_sync () fall\u00f3), porque el serdev y su TTY tampoco est\u00e1n abiertos. Omita tambi\u00e9n este paso si el dispositivo est\u00e1 apagado (qca_power_shutdown()). La devoluci\u00f3n de llamada de apagado provoca use-after-free durante el reinicio del sistema con Qualcomm Atheros Bluetooth: no se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 0072662f67726fd7... CPU: 6 PID: 1 Comm: systemd-shutdow Contaminado: GW 6.1.0-rt5- 00325-g8a5f56bcfcca #8 Nombre del hardware: Qualcomm Technologies, Inc. Robotics RB5 (DT) Rastreo de llamadas: tty_driver_flush_b\u00fafer+0x4/0x30 serdev_device_write_flush+0x24/0x34 qca_serdev_shutdown+0x80/0x130 [hci_uart] device_shutdown+0x15c/0x2 60 kernel_restart+0x48/0xac KASAN informe: ERROR: KASAN: use-after-free en tty_driver_flush_b\u00fafer+0x1c/0x50 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff16270c2e0018 por tarea systemd-shutdow/1 CPU: 7 PID: 1 Comunicaciones: systemd-shutdow No contaminado 6.1.0-next- 20221220-00014-gb85aaf97fb01-dirty #28 Nombre del hardware: Qualcomm Technologies, Inc. Robotics RB5 (DT) Rastreo de llamadas: dump_backtrace.part.0+0xdc/0xf0 show_stack+0x18/0x30 dump_stack_lvl+0x68/0x84 print_report+0x188/0x488 puerto +0xa4/0xf0 __asan_load8+0x80/0xac tty_driver_flush_b\u00fafer+0x1c/0x50 ttyport_write_flush+0x34/0x44 serdev_device_write_flush+0x48/0x60 qca_serdev_shutdown+0x124/0x274 dispositivo_shutdown+0x1e8/0x3 50 kernel_restart+0x48/0xb0 __do_sys_reboot+0x244/0x2d0 __arm64_sys_reboot+0x54/0x70 invoke_syscall +0x60/0x190 el0_svc_common.constprop.0+0x7c/0x160 do_el0_svc+0x44/0xf0 el0_svc+0x2c/0x6c el0t_64_sync_handler+0xbc/0x140 el0t_64_sync+0x190/0x194" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48879.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48879.json index 402e299c5c4..99096fe10cf 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48879.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48879.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48879", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.690", - "lastModified": "2024-08-21T07:15:04.690", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: fix NULL-deref in init error path\n\nIn cases where runtime services are not supported or have been disabled,\nthe runtime services workqueue will never have been allocated.\n\nDo not try to destroy the workqueue unconditionally in the unlikely\nevent that EFI initialisation fails to avoid dereferencing a NULL\npointer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efi: corrige NULL-deref en la ruta de error de inicio En los casos en los que los servicios de ejecuci\u00f3n no son compatibles o se han deshabilitado, la cola de trabajo de los servicios de ejecuci\u00f3n nunca se habr\u00e1 asignado. No intente destruir la cola de trabajo incondicionalmente en el improbable caso de que la inicializaci\u00f3n de EFI no pueda evitar la desreferenciaci\u00f3n de un puntero NULL." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48880.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48880.json index ac2b9984be6..8e4f4bbcf2a 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48880.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48880.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48880", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.753", - "lastModified": "2024-08-21T07:15:04.753", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/surface: aggregator: Add missing call to ssam_request_sync_free()\n\nAlthough rare, ssam_request_sync_init() can fail. In that case, the\nrequest should be freed via ssam_request_sync_free(). Currently it is\nleaked instead. Fix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: plataforma/superficie: agregador: Agregar llamada faltante a ssam_request_sync_free() Aunque es poco com\u00fan, ssam_request_sync_init() puede fallar. En ese caso, la solicitud debe liberarse mediante ssam_request_sync_free(). Actualmente se filtra. Arregla esto." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48881.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48881.json index 8342071a28c..1de2c3ad256 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48881.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48881.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48881", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.810", - "lastModified": "2024-08-21T07:15:04.810", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: Fix refcount leak in amd_pmc_probe\n\npci_get_domain_bus_and_slot() takes reference, the caller should release\nthe reference by calling pci_dev_put() after use. Call pci_dev_put() in\nthe error path to fix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: plataforma/x86/amd: se corrigi\u00f3 la fuga de recuento en amd_pmc_probe pci_get_domain_bus_and_slot() toma referencia, la persona que llama debe liberar la referencia llamando a pci_dev_put() despu\u00e9s de su uso. Llame a pci_dev_put() en la ruta del error para solucionar este problema." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48882.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48882.json index f10caa7fd58..a95d74ff493 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48882.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48882.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48882", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.863", - "lastModified": "2024-08-21T07:15:04.863", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)\n\nUpon updating MAC security entity (SecY) in hw offload path, the macsec\nsecurity association (SA) initialization routine is called. In case of\nextended packet number (epn) is enabled the salt and ssci attributes are\nretrieved using the MACsec driver rx_sa context which is unavailable when\nupdating a SecY property such as encoding-sa hence the null dereference.\nFix by using the provided SA to set those attributes." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: corrige la posible desreferencia nula de macsec al actualizar la entidad de seguridad MAC (SecY) Al actualizar la entidad de seguridad MAC (SecY) en la ruta de descarga de hw, se inicializa la asociaci\u00f3n de seguridad (SA) de macsec se llama rutina. En caso de que el n\u00famero de paquete extendido (epn) est\u00e9 habilitado, los atributos salt y ssci se recuperan utilizando el contexto rx_sa del controlador MACsec que no est\u00e1 disponible al actualizar una propiedad SecY como encoding-sa, de ah\u00ed la desreferencia nula. Solucione utilizando el SA proporcionado para establecer esos atributos." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48883.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48883.json index 1339eb62c9e..4d5870b04fe 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48883.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48883.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.933", - "lastModified": "2024-08-21T07:15:04.933", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent\n\nA user is able to configure an arbitrary number of rx queues when\ncreating an interface via netlink. This doesn't work for child PKEY\ninterfaces because the child interface uses the parent receive channels.\n\nAlthough the child shares the parent's receive channels, the number of\nrx queues is important for the channel_stats array: the parent's rx\nchannel index is used to access the child's channel_stats. So the array\nhas to be at least as large as the parent's rx queue size for the\ncounting to work correctly and to prevent out of bound accesses.\n\nThis patch checks for the mentioned scenario and returns an error when\ntrying to create the interface. The error is propagated to the user." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: IPoIB, bloquea interfaces PKEY con menos colas de recepci\u00f3n que las principales. Un usuario puede configurar un n\u00famero arbitrario de colas de recepci\u00f3n al crear una interfaz a trav\u00e9s de netlink. Esto no funciona para interfaces PKEY secundarias porque la interfaz secundaria utiliza los canales de recepci\u00f3n principales. Aunque el ni\u00f1o comparte los canales de recepci\u00f3n de los padres, la cantidad de colas de recepci\u00f3n es importante para la matriz channel_stats: el \u00edndice del canal de recepci\u00f3n de los padres se usa para acceder a los channel_stats del ni\u00f1o. Por lo tanto, la matriz debe ser al menos tan grande como el tama\u00f1o de la cola de recepci\u00f3n principal para que el recuento funcione correctamente y evitar accesos fuera de los l\u00edmites. Este parche comprueba el escenario mencionado y devuelve un error al intentar crear la interfaz. El error se propaga al usuario." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48884.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48884.json index 4bbb8eed25e..e6fab5dba86 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48884.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48884.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48884", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.987", - "lastModified": "2024-08-21T07:15:04.987", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix command stats access after free\n\nCommand may fail while driver is reloading and can't accept FW commands\ntill command interface is reinitialized. Such command failure is being\nlogged to command stats. This results in NULL pointer access as command\nstats structure is being freed and reallocated during mlx5 devlink\nreload (see kernel log below).\n\nFix it by making command stats statically allocated on driver probe.\n\nKernel log:\n[ 2394.808802] BUG: unable to handle kernel paging request at 000000000002a9c0\n[ 2394.810610] PGD 0 P4D 0\n[ 2394.811811] Oops: 0002 [#1] SMP NOPTI\n...\n[ 2394.815482] RIP: 0010:native_queued_spin_lock_slowpath+0x183/0x1d0\n...\n[ 2394.829505] Call Trace:\n[ 2394.830667] _raw_spin_lock_irq+0x23/0x26\n[ 2394.831858] cmd_status_err+0x55/0x110 [mlx5_core]\n[ 2394.833020] mlx5_access_reg+0xe7/0x150 [mlx5_core]\n[ 2394.834175] mlx5_query_port_ptys+0x78/0xa0 [mlx5_core]\n[ 2394.835337] mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core]\n[ 2394.836454] ? kmem_cache_alloc_trace+0x140/0x1c0\n[ 2394.837562] __rh_call_get_link_ksettings+0x33/0x100\n[ 2394.838663] ? __rtnl_unlock+0x25/0x50\n[ 2394.839755] __ethtool_get_link_ksettings+0x72/0x150\n[ 2394.840862] duplex_show+0x6e/0xc0\n[ 2394.841963] dev_attr_show+0x1c/0x40\n[ 2394.843048] sysfs_kf_seq_show+0x9b/0x100\n[ 2394.844123] seq_read+0x153/0x410\n[ 2394.845187] vfs_read+0x91/0x140\n[ 2394.846226] ksys_read+0x4f/0xb0\n[ 2394.847234] do_syscall_64+0x5b/0x1a0\n[ 2394.848228] entry_SYSCALL_64_after_hwframe+0x65/0xca" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: corrige el acceso a las estad\u00edsticas de los comandos despu\u00e9s de liberarlos. El comando puede fallar mientras se recarga el controlador y no puede aceptar comandos de firmware hasta que se reinicialice la interfaz de comandos. Dicho error de comando se registra en las estad\u00edsticas de comando. Esto da como resultado un acceso al puntero NULL a medida que la estructura de estad\u00edsticas de comando se libera y reasigna durante la recarga de mlx5 devlink (consulte el registro del kernel a continuaci\u00f3n). Solucionelo haciendo que las estad\u00edsticas de comando se asignen est\u00e1ticamente en la sonda del controlador. Registro del kernel: [2394.808802] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en 000000000002a9c0 [2394.810610] PGD 0 P4D 0 [2394.811811] Vaya: 0002 [#1] SMP NOPTI... [2394.815482] RIP: 10:native_queued_spin_lock_slowpath+0x183/0x1d0 ... [2394.829505] Seguimiento de llamadas: [2394.830667] _raw_spin_lock_irq+0x23/0x26 [2394.831858] cmd_status_err+0x55/0x110 [mlx5_core] [2394.833020] mlx5_access_reg+0xe7/0x1 50 [mlx5_core] [2394.834175] mlx5_query_port_ptys+0x78/0xa0 [mlx5_core] [2394.835337] mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core] [2394.836454]? kmem_cache_alloc_trace+0x140/0x1c0 [ 2394.837562] __rh_call_get_link_ksettings+0x33/0x100 [ 2394.838663] ? __rtnl_unlock+0x25/0x50 [ 2394.839755] __ethtool_get_link_ksettings+0x72/0x150 [ 2394.840862] duplex_show+0x6e/0xc0 [ 2394.841963] dev_attr_show+0x1c/0x40 [ 2394.8 43048] sysfs_kf_seq_show+0x9b/0x100 [ 2394.844123] seq_read+0x153/0x410 [ 2394.845187] vfs_read+ 0x91/0x140 [ 2394.846226] ksys_read+0x4f/0xb0 [ 2394.847234] do_syscall_64+0x5b/0x1a0 [ 2394.848228] entrada_SYSCALL_64_after_hwframe+0x65/0xca" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json index 25116a7ad66..36de822e360 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48885", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.037", - "lastModified": "2024-08-21T07:15:05.037", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix potential memory leak in ice_gnss_tty_write()\n\nThe ice_gnss_tty_write() return directly if the write_buf alloc failed,\nleaking the cmd_buf.\n\nFix by free cmd_buf if write_buf alloc failed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: soluciona una posible p\u00e9rdida de memoria en ice_gnss_tty_write(). El ice_gnss_tty_write() regresa directamente si falla la asignaci\u00f3n write_buf, filtrando el cmd_buf. Corrija mediante cmd_buf gratuito si falla la asignaci\u00f3n de write_buf." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json index aa042549b5a..f888849b74f 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.090", - "lastModified": "2024-08-21T07:15:05.090", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Add check for kzalloc\n\nAdd the check for the return value of kzalloc in order to avoid\nNULL pointer dereference.\nMoreover, use the goto-label to share the clean code." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: Agregar verificaci\u00f3n para kzalloc Agregue la verificaci\u00f3n para el valor de retorno de kzalloc para evitar la desreferencia al puntero NULL. Adem\u00e1s, utilice la etiqueta goto para compartir el c\u00f3digo limpio." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json index 2cb8caf63b5..49b24c84490 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48887", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.143", - "lastModified": "2024-08-21T07:15:05.143", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Remove rcu locks from user resources\n\nUser resource lookups used rcu to avoid two extra atomics. Unfortunately\nthe rcu paths were buggy and it was easy to make the driver crash by\nsubmitting command buffers from two different threads. Because the\nlookups never show up in performance profiles replace them with a\nregular spin lock which fixes the races in accesses to those shared\nresources.\n\nFixes kernel oops'es in IGT's vmwgfx execution_buffer stress test and\nseen crashes with apps using shared resources." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: elimina los bloqueos de rcu de los recursos del usuario. Las b\u00fasquedas de recursos del usuario utilizaron rcu para evitar dos \u00e1tomos adicionales. Desafortunadamente, las rutas de rcu ten\u00edan errores y era f\u00e1cil hacer que el controlador fallara al enviar b\u00faferes de comando desde dos subprocesos diferentes. Debido a que las b\u00fasquedas nunca aparecen en los perfiles de rendimiento, reempl\u00e1celas con un bloqueo de giro normal que corrige las ejecuci\u00f3ns en los accesos a esos recursos compartidos. Corrige los fallos del kernel en la prueba de esfuerzo vmwgfxexecution_b\u00fafer de IGT y los fallos observados en las aplicaciones que utilizan recursos compartidos." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48888.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48888.json index 80c27a1fbcc..dad8987aab2 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48888.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48888.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48888", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.193", - "lastModified": "2024-08-21T07:15:05.193", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Fix memory leak in msm_mdss_parse_data_bus_icc_path\n\nof_icc_get() alloc resources for path1, we should release it when not\nneed anymore. Early return when IS_ERR_OR_NULL(path0) may leak path1.\nDefer getting path1 to fix this.\n\nPatchwork: https://patchwork.freedesktop.org/patch/514264/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/msm/dpu: corrige la p\u00e9rdida de memoria en msm_mdss_parse_data_bus_icc_path of_icc_get() asigna recursos para la ruta1, debemos liberarlos cuando ya no los necesitemos. Retorno anticipado cuando IS_ERR_OR_NULL(ruta0) puede filtrar la ruta1. Posponga la obtenci\u00f3n de la ruta 1 para solucionar este problema. Remiendo: https://patchwork.freedesktop.org/patch/514264/" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json index d18d0045303..5bbfb61985b 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.243", - "lastModified": "2024-08-21T07:15:05.243", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof-nau8825: fix module alias overflow\n\nThe maximum name length for a platform_device_id entry is 20 characters\nincluding the trailing NUL byte. The sof_nau8825.c file exceeds that,\nwhich causes an obscure error message:\n\nsound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding]\nMODULE_ALIAS(\"platform:adl_max98373_nau8825\");\n ^~~~\ninclude/linux/module.h:168:49: note: expanded from macro 'MODULE_ALIAS'\n ^~~~~~\ninclude/linux/module.h:165:56: note: expanded from macro 'MODULE_INFO'\n ^~~~\ninclude/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO'\n = __MODULE_INFO_PREFIX __stringify(tag) \"=\" info\n\nI could not figure out how to make the module handling robust enough\nto handle this better, but as a quick fix, using slightly shorter\nnames that are still unique avoids the build issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: Intel: sof-nau8825: corrige el desbordamiento del alias del m\u00f3dulo La longitud m\u00e1xima del nombre para una entrada platform_device_id es de 20 caracteres, incluido el byte NUL final. El archivo sof_nau8825.c excede eso, lo que provoca un oscuro mensaje de error: sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: codificaci\u00f3n de caracteres ilegal en cadena literal [-Werror,- Codificaci\u00f3n de fuente v\u00e1lida de Win] MODULE_ALIAS(\"plataforma:adl_max98373_nau8825\"); ^~~~ include/linux/module.h:168:49: nota: ampliado desde la macro 'MODULE_ALIAS' ^~~~~~ include/linux/module.h:165:56: nota: ampliado desde la macro 'MODULE_INFO' ^~~~ include/linux/moduleparam.h:26:47: nota: ampliado desde la macro '__MODULE_INFO' = __MODULE_INFO_PREFIX __stringify(tag) \"=\" info No pude entender c\u00f3mo hacer que el m\u00f3dulo sea lo suficientemente robusto para manejar esto mejor, pero como soluci\u00f3n r\u00e1pida, usar nombres ligeramente m\u00e1s cortos que sigan siendo \u00fanicos evita el problema de compilaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json index da3b46586c8..c1604463e0a 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48890", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.303", - "lastModified": "2024-08-21T07:15:05.303", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM\n\nstorvsc_queuecommand() maps the scatter/gather list using scsi_dma_map(),\nwhich in a confidential VM allocates swiotlb bounce buffers. If the I/O\nsubmission fails in storvsc_do_io(), the I/O is typically retried by higher\nlevel code, but the bounce buffer memory is never freed. The mostly like\ncause of I/O submission failure is a full VMBus channel ring buffer, which\nis not uncommon under high I/O loads. Eventually enough bounce buffer\nmemory leaks that the confidential VM can't do any I/O. The same problem\ncan arise in a non-confidential VM with kernel boot parameter\nswiotlb=force.\n\nFix this by doing scsi_dma_unmap() in the case of an I/O submission\nerror, which frees the bounce buffer memory." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: storvsc: corrige la fuga del b\u00fafer de rebote swiotlb en una VM confidencial storvsc_queuecommand() asigna la lista de dispersi\u00f3n/recopilaci\u00f3n usando scsi_dma_map(), que en una VM confidencial asigna buffers de rebote swiotlb. Si el env\u00edo de E/S falla en storvsc_do_io(), la E/S normalmente se reintenta mediante c\u00f3digo de nivel superior, pero la memoria del b\u00fafer de rebote nunca se libera. La causa m\u00e1s com\u00fan de falla en el env\u00edo de E/S es un b\u00fafer de anillo de canal VMBus lleno, lo cual no es infrecuente bajo cargas de E/S elevadas. Con el tiempo, se pierden suficientes memorias del b\u00fafer de rebote como para que la m\u00e1quina virtual confidencial no pueda realizar ninguna E/S. El mismo problema puede surgir en una m\u00e1quina virtual no confidencial con el par\u00e1metro de arranque del kernel swiotlb=force. Solucione este problema haciendo scsi_dma_unmap() en el caso de un error de env\u00edo de E/S, lo que libera la memoria del b\u00fafer de rebote." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json index 8fb14d64fe1..ba71a7a7d9e 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48891", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.360", - "lastModified": "2024-08-21T07:15:05.360", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: da9211: Use irq handler when ready\n\nIf the system does not come from reset (like when it is kexec()), the\nregulator might have an IRQ waiting for us.\n\nIf we enable the IRQ handler before its structures are ready, we crash.\n\nThis patch fixes:\n\n[ 1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078\n[ 1.316096] Call trace:\n[ 1.316101] blocking_notifier_call_chain+0x20/0xa8\n[ 1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests\n[ 1.327823] regulator_notifier_call_chain+0x1c/0x2c\n[ 1.327825] da9211_irq_handler+0x68/0xf8\n[ 1.327829] irq_thread+0x11c/0x234\n[ 1.327833] kthread+0x13c/0x154" + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: regulator: da9211: Usar irq handler cuando est\u00e9 listo Si el sistema no viene del reset (como cuando es kexec()), es posible que el regulador tenga una IRQ esper\u00e1ndonos. Si habilitamos el controlador IRQ antes de que sus estructuras est\u00e9n listas, fallamos. Este parche corrige: [1.141839] No se puede manejar la lectura del kernel desde una memoria ilegible en la direcci\u00f3n virtual 0000000000000078 [1.316096] Rastreo de llamadas: [1.316101] blocking_notifier_call_chain+0x20/0xa8 [ 1.322757] cpu cpu0: suministros ficticios no permitidos para solicitudes exclusivas [ 1.327 823] regulador_notificador_call_chain +0x1c/0x2c [ 1.327825] da9211_irq_handler+0x68/0xf8 [ 1.327829] irq_thread+0x11c/0x234 [ 1.327833] kthread+0x13c/0x154" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48892.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48892.json index 15212af49cc..e8953476ee1 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48892.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48892.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48892", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.420", - "lastModified": "2024-08-21T07:15:05.420", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Fix use-after-free bug in dup_user_cpus_ptr()\n\nSince commit 07ec77a1d4e8 (\"sched: Allow task CPU affinity to be\nrestricted on asymmetric systems\"), the setting and clearing of\nuser_cpus_ptr are done under pi_lock for arm64 architecture. However,\ndup_user_cpus_ptr() accesses user_cpus_ptr without any lock\nprotection. Since sched_setaffinity() can be invoked from another\nprocess, the process being modified may be undergoing fork() at\nthe same time. When racing with the clearing of user_cpus_ptr in\n__set_cpus_allowed_ptr_locked(), it can lead to user-after-free and\npossibly double-free in arm64 kernel.\n\nCommit 8f9ea86fdf99 (\"sched: Always preserve the user requested\ncpumask\") fixes this problem as user_cpus_ptr, once set, will never\nbe cleared in a task's lifetime. However, this bug was re-introduced\nin commit 851a723e45d1 (\"sched: Always clear user_cpus_ptr in\ndo_set_cpus_allowed()\") which allows the clearing of user_cpus_ptr in\ndo_set_cpus_allowed(). This time, it will affect all arches.\n\nFix this bug by always clearing the user_cpus_ptr of the newly\ncloned/forked task before the copying process starts and check the\nuser_cpus_ptr state of the source task under pi_lock.\n\nNote to stable, this patch won't be applicable to stable releases.\nJust copy the new dup_user_cpus_ptr() function over." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: sched/core: corrige el error de use-after-free en dup_user_cpus_ptr() Desde el commit 07ec77a1d4e8 (\"sched: permitir que la afinidad de la CPU de la tarea se restrinja en sistemas asim\u00e9tricos\"), la configuraci\u00f3n y La limpieza de user_cpus_ptr se realiza en pi_lock para la arquitectura arm64. Sin embargo, dup_user_cpus_ptr() accede a user_cpus_ptr sin ninguna protecci\u00f3n de bloqueo. Dado que sched_setaffinity() puede invocarse desde otro proceso, el proceso que se est\u00e1 modificando puede estar pasando por fork() al mismo tiempo. Cuando se corre con la limpieza de user_cpus_ptr en __set_cpus_allowed_ptr_locked(), puede llevar a una liberaci\u00f3n posterior del usuario y posiblemente a una liberaci\u00f3n doble en el kernel arm64. El commit 8f9ea86fdf99 (\"programaci\u00f3n: conservar siempre la m\u00e1scara de CPU solicitada por el usuario\") soluciona este problema ya que user_cpus_ptr, una vez configurado, nunca se borrar\u00e1 durante la vida de una tarea. Sin embargo, este error se reintrodujo en el commit 851a723e45d1 (\"sched: borrar siempre user_cpus_ptr en do_set_cpus_allowed()\") que permite borrar user_cpus_ptr en do_set_cpus_allowed(). Esta vez afectar\u00e1 a todos los arcos. Corrija este error borrando siempre el user_cpus_ptr de la tarea reci\u00e9n clonada/bifurcada antes de que comience el proceso de copia y verifique el estado de user_cpus_ptr de la tarea fuente en pi_lock. Nota para las versiones estables: este parche no se aplicar\u00e1 a las versiones estables. Simplemente copie la nueva funci\u00f3n dup_user_cpus_ptr()." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48893.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48893.json index 992abd635cd..0bf1dade5a2 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48893.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48893.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48893", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.477", - "lastModified": "2024-08-21T07:15:05.477", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Cleanup partial engine discovery failures\n\nIf we abort driver initialisation in the middle of gt/engine discovery,\nsome engines will be fully setup and some not. Those incompletely setup\nengines only have 'engine->release == NULL' and so will leak any of the\ncommon objects allocated.\n\nv2:\n - Drop the destroy_pinned_context() helper for now. It's not really\n worth it with just a single callsite at the moment. (Janusz)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/gt: Limpieza de fallas parciales en el descubrimiento del motor Si abortamos la inicializaci\u00f3n del controlador en medio del descubrimiento de gt/engine, algunos motores estar\u00e1n completamente configurados y otros no. Esos motores configurados de forma incompleta solo tienen 'motor->liberaci\u00f3n == NULL' y, por lo tanto, filtrar\u00e1n cualquiera de los objetos comunes asignados. v2: - Suelta el ayudante destroy_pinned_context() por ahora. Realmente no vale la pena con un solo sitio de llamada en este momento. (Janusz)" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48894.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48894.json index 6c92838d32b..1b3772354bb 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48894.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48894.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.527", - "lastModified": "2024-08-21T07:15:05.527", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: Don't unregister on shutdown\n\nSimilar to SMMUv2, this driver calls iommu_device_unregister() from the\nshutdown path, which removes the IOMMU groups with no coordination\nwhatsoever with their users - shutdown methods are optional in device\ndrivers. This can lead to NULL pointer dereferences in those drivers'\nDMA API calls, or worse.\n\nInstead of calling the full arm_smmu_device_remove() from\narm_smmu_device_shutdown(), let's pick only the relevant function call -\narm_smmu_device_disable() - more or less the reverse of\narm_smmu_device_reset() - and call just that from the shutdown path." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/arm-smmu-v3: no cancelar el registro al apagar. Similar a SMMUv2, este controlador llama a iommu_device_unregister() desde la ruta de apagado, lo que elimina los grupos IOMMU sin coordinaci\u00f3n alguna. con sus usuarios: los m\u00e9todos de apagado son opcionales en los controladores de dispositivos. Esto puede provocar desreferencias de puntero NULL en las llamadas API DMA de esos controladores, o algo peor. En lugar de llamar al arm_smmu_device_remove() completo desde arm_smmu_device_shutdown(), seleccionemos solo la llamada a la funci\u00f3n relevante - arm_smmu_device_disable() - m\u00e1s o menos lo inverso de arm_smmu_device_reset() - y llamemos solo eso desde la ruta de apagado." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json index 53e9a471784..dac15230183 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.580", - "lastModified": "2024-08-21T07:15:05.580", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Don't unregister on shutdown\n\nMichael Walle says he noticed the following stack trace while performing\na shutdown with \"reboot -f\". He suggests he got \"lucky\" and just hit the\ncorrect spot for the reboot while there was a packet transmission in\nflight.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000098\nCPU: 0 PID: 23 Comm: kworker/0:1 Not tainted 6.1.0-rc5-00088-gf3600ff8e322 #1930\nHardware name: Kontron KBox A-230-LS (DT)\npc : iommu_get_dma_domain+0x14/0x20\nlr : iommu_dma_map_page+0x9c/0x254\nCall trace:\n iommu_get_dma_domain+0x14/0x20\n dma_map_page_attrs+0x1ec/0x250\n enetc_start_xmit+0x14c/0x10b0\n enetc_xmit+0x60/0xdc\n dev_hard_start_xmit+0xb8/0x210\n sch_direct_xmit+0x11c/0x420\n __dev_queue_xmit+0x354/0xb20\n ip6_finish_output2+0x280/0x5b0\n __ip6_finish_output+0x15c/0x270\n ip6_output+0x78/0x15c\n NF_HOOK.constprop.0+0x50/0xd0\n mld_sendpack+0x1bc/0x320\n mld_ifc_work+0x1d8/0x4dc\n process_one_work+0x1e8/0x460\n worker_thread+0x178/0x534\n kthread+0xe0/0xe4\n ret_from_fork+0x10/0x20\nCode: d503201f f9416800 d503233f d50323bf (f9404c00)\n---[ end trace 0000000000000000 ]---\nKernel panic - not syncing: Oops: Fatal exception in interrupt\n\nThis appears to be reproducible when the board has a fixed IP address,\nis ping flooded from another host, and \"reboot -f\" is used.\n\nThe following is one more manifestation of the issue:\n\n$ reboot -f\nkvm: exiting hardware virtualization\ncfg80211: failed to load regulatory.db\narm-smmu 5000000.iommu: disabling translation\nsdhci-esdhc 2140000.mmc: Removing from iommu group 11\nsdhci-esdhc 2150000.mmc: Removing from iommu group 12\nfsl-edma 22c0000.dma-controller: Removing from iommu group 17\ndwc3 3100000.usb: Removing from iommu group 9\ndwc3 3110000.usb: Removing from iommu group 10\nahci-qoriq 3200000.sata: Removing from iommu group 2\nfsl-qdma 8380000.dma-controller: Removing from iommu group 20\nplatform f080000.display: Removing from iommu group 0\netnaviv-gpu f0c0000.gpu: Removing from iommu group 1\netnaviv etnaviv: Removing from iommu group 1\ncaam_jr 8010000.jr: Removing from iommu group 13\ncaam_jr 8020000.jr: Removing from iommu group 14\ncaam_jr 8030000.jr: Removing from iommu group 15\ncaam_jr 8040000.jr: Removing from iommu group 16\nfsl_enetc 0000:00:00.0: Removing from iommu group 4\narm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with \"arm-smmu.disable_bypass=0\" to allow, but this may have security implications\narm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000\nfsl_enetc 0000:00:00.1: Removing from iommu group 5\narm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with \"arm-smmu.disable_bypass=0\" to allow, but this may have security implications\narm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000\narm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with \"arm-smmu.disable_bypass=0\" to allow, but this may have security implications\narm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000\nfsl_enetc 0000:00:00.2: Removing from iommu group 6\nfsl_enetc_mdio 0000:00:00.3: Removing from iommu group 8\nmscc_felix 0000:00:00.5: Removing from iommu group 3\nfsl_enetc 0000:00:00.6: Removing from iommu group 7\npcieport 0001:00:00.0: Removing from iommu group 18\narm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with \"arm-smmu.disable_bypass=0\" to allow, but this may have security implications\narm-smmu 5000000.iommu: GFSR 0x00000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000\npcieport 0002:00:00.0: Removing from iommu group 19\nUnable to handle kernel NULL pointer dereference at virtual address 00000000000000a8\npc : iommu_get_dma_domain+0x14/0x20\nlr : iommu_dma_unmap_page+0x38/0xe0\nCall trace:\n iommu_get_dma_domain+0x14/0x20\n dma_unmap_page_attrs+0x38/0x1d0\n en\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/arm-smmu: no cancelar el registro al apagar Michael Walle dice que not\u00f3 el siguiente seguimiento de pila mientras realizaba un apagado con \"reboot -f\". Sugiere que tuvo \"suerte\" y dio en el lugar correcto para el reinicio mientras hab\u00eda una transmisi\u00f3n de paquetes en vuelo. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000098 CPU: 0 PID: 23 Comm: kworker/0:1 Not tainted 6.1.0-rc5-00088-gf3600ff8e322 #1930 Nombre de hardware: Kontron KBox A-230-LS (DT) pc: iommu_get_dma_domain+0x14/0x20 lr: iommu_dma_map_page+0x9c/0x254 Rastreo de llamadas: iommu_get_dma_domain+0x14/0x20 dma_map_page_attrs+0x1ec/0x250 enetc_start_xmit+0x14c/0x10b0 enetc_xmit+0x 60/0xdc dev_hard_start_xmit+0xb8/0x210 sch_direct_xmit+0x11c/0x420 __dev_queue_xmit+0x354 /0xb20 ip6_finish_output2+0x280/0x5b0 __ip6_finish_output+0x15c/0x270 ip6_output+0x78/0x15c NF_HOOK.constprop.0+0x50/0xd0 mld_sendpack+0x1bc/0x320 mld_ifc_work+0x1d8/0x4d c proceso_one_work+0x1e8/0x460 trabajador_thread+0x178/0x534 kthread+0xe0/ 0xe4 ret_from_fork+0x10/0x20 C\u00f3digo: d503201f f9416800 d503233f d50323bf (f9404c00) ---[ end trace 00000000000000000 ]--- P\u00e1nico del kernel - no se sincroniza: Ups: excepci\u00f3n fatal en la interrupci\u00f3n Esto parece ser reproducible cuando la placa tiene una IP direcci\u00f3n, se inunda el ping desde otro host y se utiliza \"reboot -f\". La siguiente es una manifestaci\u00f3n m\u00e1s del problema: $ reboot -f kvm: saliendo de la virtualizaci\u00f3n de hardware cfg80211: no se pudo cargar regulator.db arm-smmu 5000000.iommu: deshabilitando la traducci\u00f3n sdhci-esdhc 2140000.mmc: eliminando del grupo iommu 11 sdhci- esdhc 2150000.mmc: Eliminaci\u00f3n del grupo iommu 12 fsl-edma 22c0000.dma-controller: Eliminaci\u00f3n del grupo iommu 17 dwc3 3100000.usb: Eliminaci\u00f3n del grupo iommu 9 dwc3 3110000.usb: Eliminaci\u00f3n del grupo iommu 10 ahci-qoriq 3200000.sata : Eliminaci\u00f3n de iommu grupo 2 fsl-qdma 8380000.dma-controller: Eliminaci\u00f3n de iommu grupo 20 plataforma f080000.display: Eliminaci\u00f3n de iommu grupo 0 etnaviv-gpu f0c0000.gpu: Eliminaci\u00f3n de iommu grupo 1 etnaviv etnaviv: Eliminaci\u00f3n de iommu grupo 1 caam_jr 8010000.jr: Eliminando del grupo iommu 13 caam_jr 8020000.jr: Eliminando del grupo iommu 14 caam_jr 8030000.jr: Eliminando del grupo iommu 15 caam_jr 8040000.jr: Eliminando del grupo iommu 16 fsl_enetc 0000:00:00.0: Eliminando de iommu grupo 4 arm-smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000 fsl_enetc 0000:00 :00.1: Eliminaci\u00f3n del grupo 5 de Iommu arm-smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000 arm-smmu 5000000. iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429 ; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000 fsl_enetc 0000:00 :00.2: Eliminaci\u00f3n del grupo 6 de Iommu fsl_enetc_mdio 0000:00:00.3: Eliminaci\u00f3n del grupo iommu 8 mscc_felix 0000:00:00.5: Eliminaci\u00f3n del grupo iommu 3 fsl_enetc 0000:00:00.6: Eliminaci\u00f3n del grupo iommu 7 pcieport 0001:00:00.0: Eliminaci\u00f3n del grupo iommu 1 8 brazos- smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x00000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000 pcieport 0002:00:00 .0: ---truncado---" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json index 30d7f65544c..d42c9af20a1 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.640", - "lastModified": "2024-08-21T07:15:05.640", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix pci device refcount leak\n\nAs the comment of pci_get_domain_bus_and_slot() says, it\nreturns a PCI device with refcount incremented, when finish\nusing it, the caller must decrement the reference count by\ncalling pci_dev_put().\n\nIn ixgbe_get_first_secondary_devfn() and ixgbe_x550em_a_has_mii(),\npci_dev_put() is called to avoid leak." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ixgbe: repara la fuga de recuento de dispositivos pci Como dice el comentario de pci_get_domain_bus_and_slot(), devuelve un dispositivo PCI con el recuento de referencia incrementado, cuando termine de usarlo, la persona que llama debe disminuir el recuento de referencias en llamando a pci_dev_put(). En ixgbe_get_first_secondary_devfn() y ixgbe_x550em_a_has_mii(), se llama a pci_dev_put() para evitar fugas." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json index d61066aeebd..994ec719cfe 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.693", - "lastModified": "2024-08-21T07:15:05.693", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/mm: fix incorrect file_map_count for invalid pmd\n\nThe page table check trigger BUG_ON() unexpectedly when split hugepage:\n\n ------------[ cut here ]------------\n kernel BUG at mm/page_table_check.c:119!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n Dumping ftrace buffer:\n (ftrace buffer empty)\n Modules linked in:\n CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748\n Hardware name: linux,dummy-virt (DT)\n pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : page_table_check_set.isra.0+0x398/0x468\n lr : page_table_check_set.isra.0+0x1c0/0x468\n[...]\n Call trace:\n page_table_check_set.isra.0+0x398/0x468\n __page_table_check_pte_set+0x160/0x1c0\n __split_huge_pmd_locked+0x900/0x1648\n __split_huge_pmd+0x28c/0x3b8\n unmap_page_range+0x428/0x858\n unmap_single_vma+0xf4/0x1c8\n zap_page_range+0x2b0/0x410\n madvise_vma_behavior+0xc44/0xe78\n do_madvise+0x280/0x698\n __arm64_sys_madvise+0x90/0xe8\n invoke_syscall.constprop.0+0xdc/0x1d8\n do_el0_svc+0xf4/0x3f8\n el0_svc+0x58/0x120\n el0t_64_sync_handler+0xb8/0xc0\n el0t_64_sync+0x19c/0x1a0\n[...]\n\nOn arm64, pmd_leaf() will return true even if the pmd is invalid due to\npmd_present_invalid() check. So in pmdp_invalidate() the file_map_count\nwill not only decrease once but also increase once. Then in set_pte_at(),\nthe file_map_count increase again, and so trigger BUG_ON() unexpectedly.\n\nAdd !pmd_present_invalid() check in pmd_user_accessible_page() to fix the\nproblem." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: arm64/mm: corrige file_map_count incorrecto para pmd no v\u00e1lido. La verificaci\u00f3n de la tabla de p\u00e1ginas activa BUG_ON() inesperadamente cuando se divide una p\u00e1gina enorme: ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en mm/page_table_check.c:119! Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP Dumping ftrace buffer: (ftrace buffer vac\u00edo) M\u00f3dulos vinculados en: CPU: 7 PID: 210 Comm: transhuge-stres No contaminado 6.1.0-rc3+ #748 Nombre de hardware: linux ,dummy-virt (DT) pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: page_table_check_set.isra.0+0x398/0x468 lr: page_table_check_set.isra.0+0x1c0/0x468 [...] Rastreo de llamadas: page_table_check_set.isra.0+0x398/0x468 __page_table_check_pte_set+0x160/0x1c0 __split_huge_pmd_locked+0x900/0x1648 __split_huge_pmd+0x28c/0x3b8 unmap_page_range+0x428/0x858 single_vma+0xf4/0x1c8 zap_page_range+0x2b0/0x410 madvise_vma_behavior+0xc44 /0xe78 do_madvise+0x280/0x698 __arm64_sys_madvise+0x90/0xe8 invoke_syscall.constprop.0+0xdc/0x1d8 do_el0_svc+0xf4/0x3f8 el0_svc+0x58/0x120 el0t_64_sync_handler+0x b8/0xc0 el0t_64_sync+0x19c/0x1a0 [...] En arm64, pmd_leaf () devolver\u00e1 verdadero incluso si el pmd no es v\u00e1lido debido a la verificaci\u00f3n pmd_present_invalid(). Entonces, en pmdp_invalidate() file_map_count no solo disminuir\u00e1 una vez sino que tambi\u00e9n aumentar\u00e1 una vez. Luego, en set_pte_at(), file_map_count aumenta nuevamente y, por lo tanto, activa BUG_ON() inesperadamente. Agregue !pmd_present_invalid() check in pmd_user_accessible_page() para solucionar el problema." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json index 05966fe5971..4ed6b58db03 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.750", - "lastModified": "2024-08-21T07:15:05.750", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux transfer\n\nThere are 3 possible interrupt sources are handled by DP controller,\nHPDstatus, Controller state changes and Aux read/write transaction.\nAt every irq, DP controller have to check isr status of every interrupt\nsources and service the interrupt if its isr status bits shows interrupts\nare pending. There is potential race condition may happen at current aux\nisr handler implementation since it is always complete dp_aux_cmd_fifo_tx()\neven irq is not for aux read or write transaction. This may cause aux read\ntransaction return premature if host aux data read is in the middle of\nwaiting for sink to complete transferring data to host while irq happen.\nThis will cause host's receiving buffer contains unexpected data. This\npatch fixes this problem by checking aux isr and return immediately at\naux isr handler if there are no any isr status bits set.\n\nCurrent there is a bug report regrading eDP edid corruption happen during\nsystem booting up. After lengthy debugging to found that VIDEO_READY\ninterrupt was continuously firing during system booting up which cause\ndp_aux_isr() to complete dp_aux_cmd_fifo_tx() prematurely to retrieve data\nfrom aux hardware buffer which is not yet contains complete data transfer\nfrom sink. This cause edid corruption.\n\nFollows are the signature at kernel logs when problem happen,\nEDID has corrupt header\npanel-simple-dp-aux aux-aea0000.edp: Couldn't identify panel via EDID\n\nChanges in v2:\n-- do complete if (ret == IRQ_HANDLED) ay dp-aux_isr()\n-- add more commit text\n\nChanges in v3:\n-- add Stephen suggested\n-- dp_aux_isr() return IRQ_XXX back to caller\n-- dp_ctrl_isr() return IRQ_XXX back to caller\n\nChanges in v4:\n-- split into two patches\n\nChanges in v5:\n-- delete empty line between tags\n\nChanges in v6:\n-- remove extra \"that\" and fixed line more than 75 char at commit text\n\nPatchwork: https://patchwork.freedesktop.org/patch/516121/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dp: no complete dp_aux_cmd_fifo_tx() si irq no es para transferencia auxiliar. Hay 3 posibles fuentes de interrupci\u00f3n que son manejadas por el controlador DP, HPDstatus, los cambios de estado del controlador y Aux. transacci\u00f3n de lectura/escritura. En cada irq, el controlador DP debe verificar el estado isr de cada fuente de interrupci\u00f3n y atender la interrupci\u00f3n si sus bits de estado isr muestran que hay interrupciones pendientes. Existe una posible condici\u00f3n de ejecuci\u00f3n que puede ocurrir en la implementaci\u00f3n actual del controlador aux isr, ya que siempre est\u00e1 completo dp_aux_cmd_fifo_tx(), incluso irq no es para transacciones de lectura o escritura auxiliar. Esto puede causar que la transacci\u00f3n de lectura auxiliar regrese prematuramente si la lectura de datos auxiliares del host est\u00e1 en medio de la espera de que el receptor complete la transferencia de datos al host mientras ocurre la irq. Esto har\u00e1 que el b\u00fafer de recepci\u00f3n del host contenga datos inesperados. Este parche soluciona este problema verificando aux isr y regresa inmediatamente al controlador aux isr si no hay ning\u00fan bit de estado isr establecido. Actualmente hay un informe de error que indica que la corrupci\u00f3n de eDP edid ocurre durante el inicio del sistema. Despu\u00e9s de una larga depuraci\u00f3n, descubr\u00ed que la interrupci\u00f3n VIDEO_READY se activaba continuamente durante el inicio del sistema, lo que provocaba que dp_aux_isr() completara dp_aux_cmd_fifo_tx() prematuramente para recuperar datos del b\u00fafer de hardware auxiliar que a\u00fan no contiene la transferencia completa de datos desde el receptor. Esto provoc\u00f3 corrupci\u00f3n. A continuaci\u00f3n se muestra la firma en los registros del kernel cuando ocurre un problema, EDID tiene el panel de encabezado corrupto-simple-dp-aux aux-aea0000.edp: No se pudo identificar el panel a trav\u00e9s de EDID Cambios en v2: - complete si (ret == IRQ_HANDLED) ay dp-aux_isr() - agregar m\u00e1s texto de confirmaci\u00f3n Cambios en v3: - agregar Stephen sugerido - dp_aux_isr() devolver IRQ_XXX a la persona que llama - dp_ctrl_isr() devolver IRQ_XXX a la persona que llama Cambios en v4: - dividir en dos parches Cambios en v5: - eliminar l\u00ednea vac\u00eda entre etiquetas Cambios en v6: - eliminar \"eso\" adicional y l\u00ednea fija de m\u00e1s de 75 caracteres en el texto de confirmaci\u00f3n Patchwork: https://patchwork.freedesktop.org/patch/516121/" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json index 12458b4ae3b..fd195cd9f7c 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json @@ -2,13 +2,17 @@ "id": "CVE-2022-48899", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.810", - "lastModified": "2024-08-21T07:15:05.810", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/virtio: Fix GEM handle creation UAF\n\nUserspace can guess the handle value and try to race GEM object creation\nwith handle close, resulting in a use-after-free if we dereference the\nobject after dropping the handle's reference. For that reason, dropping\nthe handle's reference must be done *after* we are done dereferencing\nthe object." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/virtio: corrige la creaci\u00f3n del identificador GEM. El espacio de usuario UAF puede adivinar el valor del identificador e intentar acelerar la creaci\u00f3n de objetos GEM con el cierre del identificador, lo que resulta en un use-after-free si desreferenciamos el objeto despu\u00e9s de soltar la referencia del identificador. Por esa raz\u00f3n, la eliminaci\u00f3n de la referencia del identificador debe realizarse *despu\u00e9s* de que hayamos terminado de desreferenciar el objeto." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json index a17d35c5ce8..ada9f8b9f82 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22576.json @@ -2,13 +2,17 @@ "id": "CVE-2023-22576", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-21T10:15:04.173", - "lastModified": "2024-08-21T10:15:04.173", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Repository Manager version 3.4.2 and earlier, contain a Local Privilege Escalation Vulnerability in Installation module. A local low privileged attacker may potentially exploit this vulnerability leading to the execution of arbitrary executable on the operating system with high privileges using the existing vulnerability in operating system. Exploitation may lead to unavailability of the service." + }, + { + "lang": "es", + "value": "Dell Repository Manager versi\u00f3n 3.4.2 y anteriores contienen una vulnerabilidad de escalada de privilegios locales en el m\u00f3dulo de instalaci\u00f3n. Un atacante local con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad y ejecutar un ejecutable arbitrario en el sistema operativo con privilegios elevados utilizando la vulnerabilidad existente en el sistema operativo. La explotaci\u00f3n puede provocar la falta de disponibilidad del servicio." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json index 61868362341..d5063438e59 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49198.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49198", "sourceIdentifier": "security@apache.org", "published": "2024-08-21T10:15:04.903", - "lastModified": "2024-08-21T10:15:04.903", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mysql security vulnerability in Apache SeaTunnel.\n\nAttackers can read files on the MySQL server by modifying the information in the MySQL URL\n\n allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360\nThis issue affects Apache SeaTunnel: 1.0.0.\n\nUsers are recommended to upgrade to version [1.0.1], which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de seguridad de MySQL en Apache SeaTunnel. Los atacantes pueden leer archivos en el servidor MySQL modificando la informaci\u00f3n en la URL de MySQL allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360 Este problema afecta a Apache SeaTunnel: 1.0.0. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.0.1], que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json index 6ca4dd15c61..ea553392c6d 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52893", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.880", - "lastModified": "2024-08-21T07:15:05.880", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngsmi: fix null-deref in gsmi_get_variable\n\nWe can get EFI variables without fetching the attribute, so we must\nallow for that in gsmi.\n\ncommit 859748255b43 (\"efi: pstore: Omit efivars caching EFI varstore\naccess layer\") added a new get_variable call with attr=NULL, which\ntriggers panic in gsmi." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gsmi: corrige null-deref en gsmi_get_variable Podemos obtener variables EFI sin recuperar el atributo, por lo que debemos permitir eso en gsmi. commit 859748255b43 (\"efi: pstore: Omit efivars caching EFI varstore access Layer\") agreg\u00f3 una nueva llamada get_variable con attr=NULL, lo que desencadena p\u00e1nico en gsmi." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json index bdcc89ac0d8..2c0db65bb14 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.943", - "lastModified": "2024-08-21T07:15:05.943", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()\n\nIn Google internal bug 265639009 we've received an (as yet) unreproducible\ncrash report from an aarch64 GKI 5.10.149-android13 running device.\n\nAFAICT the source code is at:\n https://android.googlesource.com/kernel/common/+/refs/tags/ASB-2022-12-05_13-5.10\n\nThe call stack is:\n ncm_close() -> ncm_notify() -> ncm_do_notify()\nwith the crash at:\n ncm_do_notify+0x98/0x270\nCode: 79000d0b b9000a6c f940012a f9400269 (b9405d4b)\n\nWhich I believe disassembles to (I don't know ARM assembly, but it looks sane enough to me...):\n\n // halfword (16-bit) store presumably to event->wLength (at offset 6 of struct usb_cdc_notification)\n 0B 0D 00 79 strh w11, [x8, #6]\n\n // word (32-bit) store presumably to req->Length (at offset 8 of struct usb_request)\n 6C 0A 00 B9 str w12, [x19, #8]\n\n // x10 (NULL) was read here from offset 0 of valid pointer x9\n // IMHO we're reading 'cdev->gadget' and getting NULL\n // gadget is indeed at offset 0 of struct usb_composite_dev\n 2A 01 40 F9 ldr x10, [x9]\n\n // loading req->buf pointer, which is at offset 0 of struct usb_request\n 69 02 40 F9 ldr x9, [x19]\n\n // x10 is null, crash, appears to be attempt to read cdev->gadget->max_speed\n 4B 5D 40 B9 ldr w11, [x10, #0x5c]\n\nwhich seems to line up with ncm_do_notify() case NCM_NOTIFY_SPEED code fragment:\n\n event->wLength = cpu_to_le16(8);\n req->length = NCM_STATUS_BYTECOUNT;\n\n /* SPEED_CHANGE data is up/down speeds in bits/sec */\n data = req->buf + sizeof *event;\n data[0] = cpu_to_le32(ncm_bitrate(cdev->gadget));\n\nMy analysis of registers and NULL ptr deref crash offset\n (Unable to handle kernel NULL pointer dereference at virtual address 000000000000005c)\nheavily suggests that the crash is due to 'cdev->gadget' being NULL when executing:\n data[0] = cpu_to_le32(ncm_bitrate(cdev->gadget));\nwhich calls:\n ncm_bitrate(NULL)\nwhich then calls:\n gadget_is_superspeed(NULL)\nwhich reads\n ((struct usb_gadget *)NULL)->max_speed\nand hits a panic.\n\nAFAICT, if I'm counting right, the offset of max_speed is indeed 0x5C.\n(remember there's a GKI KABI reservation of 16 bytes in struct work_struct)\n\nIt's not at all clear to me how this is all supposed to work...\nbut returning 0 seems much better than panic-ing..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_ncm: corrige potencial NULL ptr deref en ncm_bitrate() En el error interno de Google 265639009 hemos recibido un informe de fallo (hasta ahora) irreproducible de un aarch64 GKI 5.10. Dispositivo en ejecuci\u00f3n 149-android13. AFAICT, el c\u00f3digo fuente est\u00e1 en: https://android.googlesource.com/kernel/common/+/refs/tags/ASB-2022-12-05_13-5.10 La pila de llamadas es: ncm_close() -> ncm_notify() - > ncm_do_notify() con el bloqueo en: ncm_do_notify+0x98/0x270 C\u00f3digo: 79000d0b b9000a6c f940012a f9400269 (b9405d4b) El cual creo que se desmonta (no conozco el ensamblaje de ARM, pero me parece bastante sensato...): / / almac\u00e9n de media palabra (16 bits) presumiblemente en evento->wLength (en el desplazamiento 6 de la estructura usb_cdc_notification) 0B 0D 00 79 strh w11, [x8, #6] // almac\u00e9n de palabra (32 bits) presumiblemente en req->Longitud (en el desplazamiento 8 de la estructura usb_request) 6C 0A 00 B9 str w12, [x19, #8] // aqu\u00ed se ley\u00f3 x10 (NULL) desde el desplazamiento 0 del puntero v\u00e1lido x9 // En mi humilde opini\u00f3n, estamos leyendo 'cdev->gadget' y obtener NULL // el gadget est\u00e1 de hecho en el desplazamiento 0 de la estructura usb_composite_dev 2A 01 40 F9 ldr x10, [x9] // cargando el puntero req->buf, que est\u00e1 en el desplazamiento 0 de la estructura usb_request 69 02 40 F9 ldr x9, [x19 ] // x10 es nulo, falla, parece ser un intento de leer cdev->gadget->max_speed 4B 5D 40 B9 ldr w11, [x10, #0x5c] que parece alinearse con ncm_do_notify() caso NCM_NOTIFY_SPEED fragmento de c\u00f3digo: evento ->wLongitud = cpu_to_le16(8); solicitud->longitud = NCM_STATUS_BYTECOUNT; /* Los datos SPEED_CHANGE son velocidades de subida/bajada en bits/seg. */ data = req->buf + sizeof *event; datos[0] = cpu_to_le32(ncm_bitrate(cdev->gadget)); Mi an\u00e1lisis de los registros y la compensaci\u00f3n de fallas de NULL ptr deref (no se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 000000000000005c) sugiere en gran medida que la falla se debe a que 'cdev->gadget' es NULL al ejecutar: datos[0] = cpu_to_le32(ncm_bitrate (cdev->gadget)); que llama: ncm_bitrate(NULL) que luego llama: gadget_is_superspeed(NULL) que lee ((struct usb_gadget *)NULL)->max_speed y entra en p\u00e1nico. AFAICT, si estoy contando bien, el desplazamiento de max_speed es de hecho 0x5C. (recuerde que hay una reserva GKI KABI de 16 bytes en la estructura work_struct) No me queda del todo claro c\u00f3mo se supone que funciona todo esto... pero devolver 0 parece mucho mejor que entrar en p\u00e1nico..." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json index 1ae16c25d93..a481ad44bde 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.007", - "lastModified": "2024-08-21T07:15:06.007", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: don't reissue in case of poll race on multishot request\n\nA previous commit fixed a poll race that can occur, but it's only\napplicable for multishot requests. For a multishot request, we can safely\nignore a spurious wakeup, as we never leave the waitqueue to begin with.\n\nA blunt reissue of a multishot armed request can cause us to leak a\nbuffer, if they are ring provided. While this seems like a bug in itself,\nit's not really defined behavior to reissue a multishot request directly.\nIt's less efficient to do so as well, and not required to rearm anything\nlike it is for singleshot poll requests." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring/poll: no volver a emitir en caso de ejecuci\u00f3n de sondeo en solicitud de m\u00faltiples disparos. Una confirmaci\u00f3n anterior solucion\u00f3 una ejecuci\u00f3n de sondeo que puede ocurrir, pero solo se aplica a solicitudes de m\u00faltiples disparos. Para una solicitud de disparo m\u00faltiple, podemos ignorar con seguridad una activaci\u00f3n espuria, ya que, para empezar, nunca salimos de la cola de espera. Una reemisi\u00f3n contundente de una solicitud de armado de m\u00faltiples disparos puede hacer que perdamos un b\u00fafer, si se proporciona en anillo. Si bien esto parece un error en s\u00ed mismo, en realidad no es un comportamiento definido volver a emitir una solicitud multidisparo directamente. Tambi\u00e9n es menos eficiente hacerlo y no es necesario rearmar nada como lo es para solicitudes de sondeo de un solo disparo." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json index 4f5243d63e9..32c848d6f35 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.060", - "lastModified": "2024-08-21T07:15:06.060", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between quota rescan and disable leading to NULL pointer deref\n\nIf we have one task trying to start the quota rescan worker while another\none is trying to disable quotas, we can end up hitting a race that results\nin the quota rescan worker doing a NULL pointer dereference. The steps for\nthis are the following:\n\n1) Quotas are enabled;\n\n2) Task A calls the quota rescan ioctl and enters btrfs_qgroup_rescan().\n It calls qgroup_rescan_init() which returns 0 (success) and then joins a\n transaction and commits it;\n\n3) Task B calls the quota disable ioctl and enters btrfs_quota_disable().\n It clears the bit BTRFS_FS_QUOTA_ENABLED from fs_info->flags and calls\n btrfs_qgroup_wait_for_completion(), which returns immediately since the\n rescan worker is not yet running.\n Then it starts a transaction and locks fs_info->qgroup_ioctl_lock;\n\n4) Task A queues the rescan worker, by calling btrfs_queue_work();\n\n5) The rescan worker starts, and calls rescan_should_stop() at the start\n of its while loop, which results in 0 iterations of the loop, since\n the flag BTRFS_FS_QUOTA_ENABLED was cleared from fs_info->flags by\n task B at step 3);\n\n6) Task B sets fs_info->quota_root to NULL;\n\n7) The rescan worker tries to start a transaction and uses\n fs_info->quota_root as the root argument for btrfs_start_transaction().\n This results in a NULL pointer dereference down the call chain of\n btrfs_start_transaction(). The stack trace is something like the one\n reported in Link tag below:\n\n general protection fault, probably for non-canonical address 0xdffffc0000000041: 0000 [#1] PREEMPT SMP KASAN\n KASAN: null-ptr-deref in range [0x0000000000000208-0x000000000000020f]\n CPU: 1 PID: 34 Comm: kworker/u4:2 Not tainted 6.1.0-syzkaller-13872-gb6bb9676f216 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\n Workqueue: btrfs-qgroup-rescan btrfs_work_helper\n RIP: 0010:start_transaction+0x48/0x10f0 fs/btrfs/transaction.c:564\n Code: 48 89 fb 48 (...)\n RSP: 0018:ffffc90000ab7ab0 EFLAGS: 00010206\n RAX: 0000000000000041 RBX: 0000000000000208 RCX: ffff88801779ba80\n RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\n RBP: dffffc0000000000 R08: 0000000000000001 R09: fffff52000156f5d\n R10: fffff52000156f5d R11: 1ffff92000156f5c R12: 0000000000000000\n R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000003\n FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f2bea75b718 CR3: 000000001d0cc000 CR4: 00000000003506e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n btrfs_qgroup_rescan_worker+0x3bb/0x6a0 fs/btrfs/qgroup.c:3402\n btrfs_work_helper+0x312/0x850 fs/btrfs/async-thread.c:280\n process_one_work+0x877/0xdb0 kernel/workqueue.c:2289\n worker_thread+0xb14/0x1330 kernel/workqueue.c:2436\n kthread+0x266/0x300 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n \n Modules linked in:\n\nSo fix this by having the rescan worker function not attempt to start a\ntransaction if it didn't do any rescan work." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre el rescaneo de cuotas y la deshabilitaci\u00f3n que conduce a un puntero NULL deref. Si tenemos una tarea que intenta iniciar el trabajador de rescaneo de cuotas mientras otra intenta deshabilitar las cuotas, podemos finalizar hasta llegar a una ejecuci\u00f3n que resulta en que el trabajador de rescaneo de cuotas realice una desreferencia del puntero NULL. Los pasos para esto son los siguientes: 1) Se habilitan las cuotas; 2) La tarea A llama al ioctl de rescaneo de cuotas e ingresa btrfs_qgroup_rescan(). Llama a qgroup_rescan_init() que devuelve 0 (\u00e9xito) y luego se une a una transacci\u00f3n y la confirma; 3) La tarea B llama a ioctl de desactivaci\u00f3n de cuota e ingresa btrfs_quota_disable(). Borra el bit BTRFS_FS_QUOTA_ENABLED de fs_info->flags y llama a btrfs_qgroup_wait_for_completion(), que regresa inmediatamente ya que el trabajador de rescaneo a\u00fan no se est\u00e1 ejecutando. Luego inicia una transacci\u00f3n y bloquea fs_info->qgroup_ioctl_lock; 4) La tarea A pone en cola al trabajador que vuelve a escanear, llamando a btrfs_queue_work(); 5) El trabajador de rescaneo inicia y llama a rescan_should_stop() al inicio de su ciclo while, lo que resulta en 0 iteraciones del ciclo, ya que la bandera BTRFS_FS_QUOTA_ENABLED fue borrada de fs_info->flags por la tarea B en el paso 3); 6) La tarea B establece fs_info->quota_root en NULL; 7) El trabajador de rescaneo intenta iniciar una transacci\u00f3n y usa fs_info->quota_root como argumento ra\u00edz para btrfs_start_transaction(). Esto da como resultado una desreferencia del puntero NULL en la cadena de llamadas de btrfs_start_transaction(). El seguimiento de la pila es similar al que se informa en la etiqueta de enlace a continuaci\u00f3n: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000041: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000208-0x0000000000000020f] CPU: 1 PID: 34 Comm: kworker/u4:2 No contaminado 6.1.0-syzkaller-13872-gb6bb9676f216 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Cola de trabajo: btrfs-qgroup-rescan btrfs_work_helper RIP: 0010:start_transaction+0x48/0x10f0 fs/btrfs/transaction.c:564 C\u00f3digo: 48 89 fb 48 (...) RSP: 0018:ffffc90000ab7ab0 EFLAGS: 00010206 RAX: 0000000000000041 X: 0000000000000208 RCX: ffff88801779ba80 RDX: 00000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: dffffc0000000000 R08: 0000000000000001 R09: fffff52000156f5d R10: fffff52000156f5d R11: 2000156f5c R12: 0000000000000000 R13: 0000000000000001 R14: 0000000000000001 R15: 00000000000000003 FS: 0000000000000000(0000) 8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2bea75b718 CR3: 000000001d0cc000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 00000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: / btrfs/qgroup.c:3402 btrfs_work_helper+0x312/0x850 fs/btrfs/async-thread.c:280 Process_one_work+0x877/0xdb0 kernel/workqueue.c:2289 trabajador_thread+0xb14/0x1330 kernel/workqueue.c:2436 kthread+0x266 /0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 M\u00f3dulos vinculados en: Solucione este problema haciendo que la funci\u00f3n de trabajo de rescaneo no intente iniciar una transacci\u00f3n si No hice ning\u00fan trabajo de reexploraci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52897.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52897.json index ce05904b88a..efa00dadba2 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52897.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52897.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.120", - "lastModified": "2024-08-21T07:15:06.120", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: do not warn on record without old_roots populated\n\n[BUG]\nThere are some reports from the mailing list that since v6.1 kernel, the\nWARN_ON() inside btrfs_qgroup_account_extent() gets triggered during\nrescan:\n\n WARNING: CPU: 3 PID: 6424 at fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs]\n CPU: 3 PID: 6424 Comm: snapperd Tainted: P OE 6.1.2-1-default #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7\n RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs]\n Call Trace:\n \n btrfs_commit_transaction+0x30c/0xb40 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]\n ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]\n btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]\n btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]\n ? __rseq_handle_notify_resume+0xa9/0x4a0\n ? mntput_no_expire+0x4a/0x240\n ? __seccomp_filter+0x319/0x4d0\n __x64_sys_ioctl+0x90/0xd0\n do_syscall_64+0x5b/0x80\n ? syscall_exit_to_user_mode+0x17/0x40\n ? do_syscall_64+0x67/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x7fd9b790d9bf\n \n\n[CAUSE]\nSince commit e15e9f43c7ca (\"btrfs: introduce\nBTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING to skip qgroup accounting\"), if\nour qgroup is already in inconsistent state, we will no longer do the\ntime-consuming backref walk.\n\nThis can leave some qgroup records without a valid old_roots ulist.\nNormally this is fine, as btrfs_qgroup_account_extents() would also skip\nthose records if we have NO_ACCOUNTING flag set.\n\nBut there is a small window, if we have NO_ACCOUNTING flag set, and\ninserted some qgroup_record without a old_roots ulist, but then the user\ntriggered a qgroup rescan.\n\nDuring btrfs_qgroup_rescan(), we firstly clear NO_ACCOUNTING flag, then\ncommit current transaction.\n\nAnd since we have a qgroup_record with old_roots = NULL, we trigger the\nWARN_ON() during btrfs_qgroup_account_extents().\n\n[FIX]\nUnfortunately due to the introduction of NO_ACCOUNTING flag, the\nassumption that every qgroup_record would have its old_roots populated\nis no longer correct.\n\nFix the false alerts and drop the WARN_ON()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: qgroup: no advertir en el registro sin old_roots poblado [ERROR] Hay algunos informes de la lista de correo que desde el kernel v6.1, WARN_ON() dentro de btrfs_qgroup_account_extent() se activa durante la nueva exploraci\u00f3n: ADVERTENCIA: CPU: 3 PID: 6424 en fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] CPU: 3 PID: 6424 Comm: snapperd Contaminado: P OE 6.1.2-1- predeterminado #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7 RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] Seguimiento de llamadas: btrfs_commit_transaction+0x30c/0xb40 c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f 6]btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]? __rseq_handle_notify_resume+0xa9/0x4a0 ? mntput_no_expire+0x4a/0x240? __seccomp_filter+0x319/0x4d0 __x64_sys_ioctl+0x90/0xd0 do_syscall_64+0x5b/0x80 ? syscall_exit_to_user_mode+0x17/0x40? do_syscall_64+0x67/0x80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd9b790d9bf [CAUSA] Desde el commit e15e9f43c7ca (\"btrfs: introduzca BTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING para omitir la contabilidad de qgroup\"), si qgroup ya est\u00e1 en estado inconsistente, no lo haremos Ya no hagas la larga caminata hacia atr\u00e1s. Esto puede dejar algunos registros de qgroup sin una lista old_roots v\u00e1lida. Normalmente, esto est\u00e1 bien, ya que btrfs_qgroup_account_extents() tambi\u00e9n omitir\u00eda esos registros si tenemos configurado el indicador NO_ACCOUNTING. Pero hay una peque\u00f1a ventana, si tenemos el indicador NO_ACCOUNTING configurado e insertamos alg\u00fan qgroup_record sin una lista old_roots, pero luego el usuario activ\u00f3 una nueva exploraci\u00f3n de qgroup. Durante btrfs_qgroup_rescan(), primero borramos el indicador NO_ACCOUNTING y luego confirmamos la transacci\u00f3n actual. Y como tenemos un qgroup_record con old_roots = NULL, activamos WARN_ON() durante btrfs_qgroup_account_extents(). [FIX] Desafortunadamente, debido a la introducci\u00f3n del indicador NO_ACCOUNTING, la suposici\u00f3n de que cada qgroup_record tendr\u00eda sus old_roots completadas ya no es correcta. Corrija las alertas falsas y elimine WARN_ON()." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52898.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52898.json index c6ead43b1a6..86870e6bbcc 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52898.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52898.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.180", - "lastModified": "2024-08-21T07:15:06.180", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix null pointer dereference when host dies\n\nMake sure xhci_free_dev() and xhci_kill_endpoint_urbs() do not race\nand cause null pointer dereference when host suddenly dies.\n\nUsb core may call xhci_free_dev() which frees the xhci->devs[slot_id]\nvirt device at the same time that xhci_kill_endpoint_urbs() tries to\nloop through all the device's endpoints, checking if there are any\ncancelled urbs left to give back.\n\nhold the xhci spinlock while freeing the virt device" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xhci: corrige la desreferencia del puntero nulo cuando el host muere. Aseg\u00farese de que xhci_free_dev() y xhci_kill_endpoint_urbs() no corran y provoquen una desreferencia del puntero nulo cuando el host muere repentinamente. El n\u00facleo USB puede llamar a xhci_free_dev(), lo que libera el dispositivo virt xhci->devs[slot_id] al mismo tiempo que xhci_kill_endpoint_urbs() intenta recorrer todos los endpoints del dispositivo, verificando si quedan urbs canceladas para devolver. mantenga presionado el xhci spinlock mientras libera el dispositivo virt" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52899.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52899.json index dd74da20e0e..7b057765d2b 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52899.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52899.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52899", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.237", - "lastModified": "2024-08-21T07:15:06.237", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nAdd exception protection processing for vd in axi_chan_handle_err function\n\nSince there is no protection for vd, a kernel panic will be\ntriggered here in exceptional cases.\n\nYou can refer to the processing of axi_chan_block_xfer_complete function\n\nThe triggered kernel panic is as follows:\n\n[ 67.848444] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060\n[ 67.848447] Mem abort info:\n[ 67.848449] ESR = 0x96000004\n[ 67.848451] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 67.848454] SET = 0, FnV = 0\n[ 67.848456] EA = 0, S1PTW = 0\n[ 67.848458] Data abort info:\n[ 67.848460] ISV = 0, ISS = 0x00000004\n[ 67.848462] CM = 0, WnR = 0\n[ 67.848465] user pgtable: 4k pages, 48-bit VAs, pgdp=00000800c4c0b000\n[ 67.848468] [0000000000000060] pgd=0000000000000000, p4d=0000000000000000\n[ 67.848472] Internal error: Oops: 96000004 [#1] SMP\n[ 67.848475] Modules linked in: dmatest\n[ 67.848479] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.100-emu_x2rc+ #11\n[ 67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE=--)\n[ 67.848487] pc : axi_chan_handle_err+0xc4/0x230\n[ 67.848491] lr : axi_chan_handle_err+0x30/0x230\n[ 67.848493] sp : ffff0803fe55ae50\n[ 67.848495] x29: ffff0803fe55ae50 x28: ffff800011212200\n[ 67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080\n[ 67.848504] x25: ffff800010d33880 x24: ffff80001139d850\n[ 67.848508] x23: ffff0800c097c168 x22: 0000000000000000\n[ 67.848512] x21: 0000000000000080 x20: 0000000000002000\n[ 67.848517] x19: ffff0800c097c080 x18: 0000000000000000\n[ 67.848521] x17: 0000000000000000 x16: 0000000000000000\n[ 67.848525] x15: 0000000000000000 x14: 0000000000000000\n[ 67.848529] x13: 0000000000000000 x12: 0000000000000040\n[ 67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a\n[ 67.848538] x9 : ffff800010576cd4 x8 : ffff0800c0400270\n[ 67.848542] x7 : 0000000000000000 x6 : ffff0800c04003e0\n[ 67.848546] x5 : ffff0800c0400248 x4 : ffff0800c4294480\n[ 67.848550] x3 : dead000000000100 x2 : dead000000000122\n[ 67.848555] x1 : 0000000000000100 x0 : ffff0800c097c168\n[ 67.848559] Call trace:\n[ 67.848562] axi_chan_handle_err+0xc4/0x230\n[ 67.848566] dw_axi_dma_interrupt+0xf4/0x590\n[ 67.848569] __handle_irq_event_percpu+0x60/0x220\n[ 67.848573] handle_irq_event+0x64/0x120\n[ 67.848576] handle_fasteoi_irq+0xc4/0x220\n[ 67.848580] __handle_domain_irq+0x80/0xe0\n[ 67.848583] gic_handle_irq+0xc0/0x138\n[ 67.848585] el1_irq+0xc8/0x180\n[ 67.848588] arch_cpu_idle+0x14/0x2c\n[ 67.848591] default_idle_call+0x40/0x16c\n[ 67.848594] do_idle+0x1f0/0x250\n[ 67.848597] cpu_startup_entry+0x2c/0x60\n[ 67.848600] rest_init+0xc0/0xcc\n[ 67.848603] arch_call_rest_init+0x14/0x1c\n[ 67.848606] start_kernel+0x4cc/0x500\n[ 67.848610] Code: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 (a94602c1)\n[ 67.848613] ---[ end trace 585a97036f88203a ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Agregar procesamiento de protecci\u00f3n de excepci\u00f3n para vd en la funci\u00f3n axi_chan_handle_err Dado que no hay protecci\u00f3n para vd, aqu\u00ed se activar\u00e1 un p\u00e1nico del kernel en casos excepcionales. Puede consultar el procesamiento de la funci\u00f3n axi_chan_block_xfer_complete. El p\u00e1nico del kernel desencadenado es el siguiente: [67.848444] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000060 [67.848447] Informaci\u00f3n de cancelaci\u00f3n de memoria: [67.848449] ESR = 0x96000004 [67.8 48451] CE = 0x25 : DABT (EL actual), IL = 32 bits [ 67.848454] SET = 0, FnV = 0 [ 67.848456] EA = 0, S1PTW = 0 [ 67.848458] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 67.848460] ISV = 0, ISS = 0x00000004 [ 67.848462 ] CM = 0, WnR = 0 [ 67.848465] tabla de p\u00e1ginas de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=00000800c4c0b000 [ 67.848468] [0000000000000060] pgd=0000000000000000, 000000000000 [67.848472] Error interno: Ups: 96000004 [#1 ] SMP [67.848475] M\u00f3dulos vinculados en: dmatest [67.848479] CPU: 0 PID: 0 Comm: swapper/0 No contaminado 5.10.100-emu_x2rc+ #11 [67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE= --) [67.848487] pc: axi_chan_handle_err+0xc4/0x230 [67.848491] lr: axi_chan_handle_err+0x30/0x230 [67.848493] sp: ffff0803fe55ae50 [67.848495] x29: fe55ae50 x28: ffff800011212200 [ 67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080 [ 67.848504] x25: ffff800010d33880 x24: ffff80001139d850 [ 67.848508] x23: ffff0800c097c168 x22: 0000000000000000 [ 67.848512] x21: 0000000000000080 x20: 0000000000002000 [ 67.848517] x19: ffff0800c097c080 x18: 0000000000000000 [ 67.848521] x17: 0000000000000000 x16: 0000000000000 000 [67.848525] x15: 0000000000000000 x14: 0000000000000000 [ 67.848529] x13: 0000000000000000 x12: 0000000000000040 [ 67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a [ 67.848538] x9: ffff800010576cd4 x8: ffff0800c0400270 [67.848542] x7: 0000000000000000 x6: ffff0800c04003e0 [67.848546] x5: 8x4: ffff0800c4294480 [67.848550] x3 : dead000000000100 x2 : dead000000000122 [ 67.848555 ] x1 : 0000000000000100 x0 : ffff0800c097c168 [ 67.848559 ] Rastreo de llamadas: [ 67.848562] 0x230 [ 67.848566] dw_axi_dma_interrupt+0xf4/0x590 [ 67.848569] __handle_irq_event_percpu+0x60/0x220 [ 67.848573] handle_irq_event+0x64 /0x120 [ 67.848576] handle_fasteoi_irq+0xc4/0x220 [ 67.848580] __handle_domain_irq+0x80/0xe0 [ 67.848583] gic_handle_irq+0xc0/0x138 [ 67.848585] 0x180 [67.848588] arch_cpu_idle+0x14/0x2c [67.848591] default_idle_call+0x40/0x16c [ 67.848594] do_idle+0x1f0/0x250 [ 67.848597] cpu_startup_entry+0x2c/0x60 [ 67.848600] rest_init+0xc0/0xcc [ 67.848603] arch_call_rest_init+0x14/0x1c [ 67.84860 6] start_kernel+0x4cc/0x500 [ 67.848610] C\u00f3digo: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 ( a94602c1) [67.848613] ---[ final de seguimiento 585a97036f88203a ]---" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52900.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52900.json index 38b2fa78bf5..9c1909a3576 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52900.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52900.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52900", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.297", - "lastModified": "2024-08-21T07:15:06.297", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix general protection fault in nilfs_btree_insert()\n\nIf nilfs2 reads a corrupted disk image and tries to reads a b-tree node\nblock by calling __nilfs_btree_get_block() against an invalid virtual\nblock address, it returns -ENOENT because conversion of the virtual block\naddress to a disk block address fails. However, this return value is the\nsame as the internal code that b-tree lookup routines return to indicate\nthat the block being searched does not exist, so functions that operate on\nthat b-tree may misbehave.\n\nWhen nilfs_btree_insert() receives this spurious 'not found' code from\nnilfs_btree_do_lookup(), it misunderstands that the 'not found' check was\nsuccessful and continues the insert operation using incomplete lookup path\ndata, causing the following crash:\n\n general protection fault, probably for non-canonical address\n 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN\n KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\n ...\n RIP: 0010:nilfs_btree_get_nonroot_node fs/nilfs2/btree.c:418 [inline]\n RIP: 0010:nilfs_btree_prepare_insert fs/nilfs2/btree.c:1077 [inline]\n RIP: 0010:nilfs_btree_insert+0x6d3/0x1c10 fs/nilfs2/btree.c:1238\n Code: bc 24 80 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89\n ff e8 4b 02 92 fe 4d 8b 3f 49 83 c7 28 4c 89 f8 48 c1 e8 03 <42> 80 3c\n 28 00 74 08 4c 89 ff e8 2e 02 92 fe 4d 8b 3f 49 83 c7 02\n ...\n Call Trace:\n \n nilfs_bmap_do_insert fs/nilfs2/bmap.c:121 [inline]\n nilfs_bmap_insert+0x20d/0x360 fs/nilfs2/bmap.c:147\n nilfs_get_block+0x414/0x8d0 fs/nilfs2/inode.c:101\n __block_write_begin_int+0x54c/0x1a80 fs/buffer.c:1991\n __block_write_begin fs/buffer.c:2041 [inline]\n block_write_begin+0x93/0x1e0 fs/buffer.c:2102\n nilfs_write_begin+0x9c/0x110 fs/nilfs2/inode.c:261\n generic_perform_write+0x2e4/0x5e0 mm/filemap.c:3772\n __generic_file_write_iter+0x176/0x400 mm/filemap.c:3900\n generic_file_write_iter+0xab/0x310 mm/filemap.c:3932\n call_write_iter include/linux/fs.h:2186 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x7dc/0xc50 fs/read_write.c:584\n ksys_write+0x177/0x2a0 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n ...\n \n\nThis patch fixes the root cause of this problem by replacing the error\ncode that __nilfs_btree_get_block() returns on block address conversion\nfailure from -ENOENT to another internal code -EINVAL which means that the\nb-tree metadata is corrupted.\n\nBy returning -EINVAL, it propagates without glitches, and for all relevant\nb-tree operations, functions in the upper bmap layer output an error\nmessage indicating corrupted b-tree metadata via\nnilfs_bmap_convert_error(), and code -EIO will be eventually returned as\nit should be." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: soluciona el fallo de protecci\u00f3n general en nilfs_btree_insert() Si nilfs2 lee una imagen de disco corrupta e intenta leer un bloque de nodo de \u00e1rbol b llamando a __nilfs_btree_get_block() contra una direcci\u00f3n de bloque virtual no v\u00e1lida, devuelve -ENOENT porque falla la conversi\u00f3n de la direcci\u00f3n del bloque virtual a una direcci\u00f3n de bloque de disco. Sin embargo, este valor de retorno es el mismo que el c\u00f3digo interno que devuelven las rutinas de b\u00fasqueda del \u00e1rbol b para indicar que el bloque que se busca no existe, por lo que las funciones que operan en ese \u00e1rbol b pueden comportarse mal. Cuando nilfs_btree_insert() recibe este c\u00f3digo falso 'no encontrado' de nilfs_btree_do_lookup(), malinterpreta que la verificaci\u00f3n 'no encontrado' fue exitosa y contin\u00faa la operaci\u00f3n de inserci\u00f3n utilizando datos de ruta de b\u00fasqueda incompletos, lo que provoca el siguiente bloqueo: falla de protecci\u00f3n general, probablemente por direcci\u00f3n no can\u00f3nica 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en el rango [0x0000000000000028-0x000000000000002f] ... RIP: 0010:nilfs_btree_get_nonroot_node fs/nilfs 2/btree.c:418 [en l\u00ednea] RIP: 0010:nilfs_btree_prepare_insert fs/nilfs2/btree.c:1077 [en l\u00ednea] RIP: 0010:nilfs_btree_insert+0x6d3/0x1c10 fs/nilfs2/btree.c:1238 C\u00f3digo: bc 24 80 00 00 00 4c 89 f8 48 c1 e8 3 42 80 3c 28 00 74 08 4c 89 ff e8 4b 02 92 fe 4d 8b 3f 49 83 c7 28 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 2e 02 92 fe 4d 8b f 49 83 c7 02... Seguimiento de llamadas: nilfs_bmap_do_insert fs/nilfs2/bmap.c:121 [en l\u00ednea] nilfs_bmap_insert+0x20d/0x360 fs/nilfs2/bmap.c:147 nilfs_get_block+0x414/0x8d0 fs/nilfs2/inode.c: 101 __block_write_begin_int+0x54c/0x1a80 fs/buffer.c:1991 __block_write_begin fs/buffer.c:2041 [en l\u00ednea] block_write_begin+0x93/0x1e0 fs/buffer.c:2102 nilfs_write_begin+0x9c/0x110 fs/nilfs2/inode.c :261 generic_perform_write+0x2e4/0x5e0 mm/filemap.c:3772 __generic_file_write_iter+0x176/0x400 mm/filemap.c:3900 generic_file_write_iter+0xab/0x310 mm/filemap.c:3932 call_write_iter include/linux/fs.h:2186 [en l\u00ednea] new_sync_write fs/read_write.c:491 [en l\u00ednea] vfs_write+0x7dc/0xc50 fs/read_write.c:584 ksys_write+0x177/0x2a0 fs/read_write.c:637 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64 +0x3d/0xb0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd ... Este parche soluciona la causa ra\u00edz de este problema reemplazando el c\u00f3digo de error que devuelve __nilfs_btree_get_block() en la conversi\u00f3n de direcciones de bloque falla de -ENOENT a otro c\u00f3digo interno -EINVAL, lo que significa que los metadatos del \u00e1rbol b est\u00e1n da\u00f1ados. Al devolver -EINVAL, se propaga sin fallos y, para todas las operaciones relevantes del \u00e1rbol b, las funciones en la capa superior del mapa b generan un mensaje de error que indica metadatos del \u00e1rbol b corruptos a trav\u00e9s de nilfs_bmap_convert_error(), y el c\u00f3digo -EIO se devolver\u00e1 eventualmente cuando deber\u00eda ser." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52901.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52901.json index a52cdd9eb6e..28141b5cc89 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52901.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52901.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52901", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.363", - "lastModified": "2024-08-21T07:15:06.363", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Check endpoint is valid before dereferencing it\n\nWhen the host controller is not responding, all URBs queued to all\nendpoints need to be killed. This can cause a kernel panic if we\ndereference an invalid endpoint.\n\nFix this by using xhci_get_virt_ep() helper to find the endpoint and\nchecking if the endpoint is valid before dereferencing it.\n\n[233311.853271] xhci-hcd xhci-hcd.1.auto: xHCI host controller not responding, assume dead\n[233311.853393] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000e8\n\n[233311.853964] pc : xhci_hc_died+0x10c/0x270\n[233311.853971] lr : xhci_hc_died+0x1ac/0x270\n\n[233311.854077] Call trace:\n[233311.854085] xhci_hc_died+0x10c/0x270\n[233311.854093] xhci_stop_endpoint_command_watchdog+0x100/0x1a4\n[233311.854105] call_timer_fn+0x50/0x2d4\n[233311.854112] expire_timers+0xac/0x2e4\n[233311.854118] run_timer_softirq+0x300/0xabc\n[233311.854127] __do_softirq+0x148/0x528\n[233311.854135] irq_exit+0x194/0x1a8\n[233311.854143] __handle_domain_irq+0x164/0x1d0\n[233311.854149] gic_handle_irq.22273+0x10c/0x188\n[233311.854156] el1_irq+0xfc/0x1a8\n[233311.854175] lpm_cpuidle_enter+0x25c/0x418 [msm_pm]\n[233311.854185] cpuidle_enter_state+0x1f0/0x764\n[233311.854194] do_idle+0x594/0x6ac\n[233311.854201] cpu_startup_entry+0x7c/0x80\n[233311.854209] secondary_start_kernel+0x170/0x198" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: xhci: verifique que el endpoint sea v\u00e1lido antes de desreferenciarlo. Cuando el controlador de host no responde, se deben eliminar todas las URB en cola para todos los endpoints. Esto puede provocar un p\u00e1nico en el kernel si eliminamos la referencia a un endpoint no v\u00e1lido. Solucione este problema utilizando el asistente xhci_get_virt_ep() para encontrar el endpoint y comprobar si es v\u00e1lido antes de desreferenciarlo. [233311.853271] xhci-hcd xhci-hcd.1.auto: El controlador de host xHCI no responde, se supone muerto [233311.853393] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000000000e8 [233311.853964] pc: xhci_hc_died+0x10c/ 0x270 [233311.853971] lr : xhci_hc_died+0x1ac/0x270 [233311.854077] Rastreo de llamadas: [233311.854085] xhci_hc_died+0x10c/0x270 [233311.854093] xhci_stop_endpoint_command_watchdog+0x100/0x1a4 11.854105] call_timer_fn+0x50/0x2d4 [233311.854112] expire_timers+0xac/0x2e4 [233311.854118] run_timer_softirq+0x300 /0xabc [233311.854127] __do_softirq+0x148/0x528 [233311.854135] irq_exit+0x194/0x1a8 [233311.854143] __handle_domain_irq+0x164/0x1d0 [233311.854149] gic_handle_irq.22273+0x10c/0x188 [233311.854156] el1_irq+0xfc/0x1a8 [233311.854175] lpm_cpuidle_enter+0x25c /0x418 [msm_pm] [233311.854185] cpuidle_enter_state+0x1f0/0x764 [233311.854194] do_idle+0x594/0x6ac [233311.854201] cpu_startup_entry+0x7c/0x80 [233311.8542 09] kernel_inicio_secundario+0x170/0x198" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52902.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52902.json index b9587f88c61..9349d77645c 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52902.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52902.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52902", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.427", - "lastModified": "2024-08-21T07:15:06.427", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnommu: fix memory leak in do_mmap() error path\n\nThe preallocation of the maple tree nodes may leak if the error path to\n\"error_just_free\" is taken. Fix this by moving the freeing of the maple\ntree nodes to a shared location for all error paths." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nommu: corrige la p\u00e9rdida de memoria en la ruta de error do_mmap() La preasignaci\u00f3n de los nodos del \u00e1rbol de arce puede perderse si se toma la ruta de error a \"error_just_free\". Solucione este problema moviendo la liberaci\u00f3n de los nodos del \u00e1rbol de arce a una ubicaci\u00f3n compartida para todas las rutas de error." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52903.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52903.json index 05ec87e5fe4..0148b02134f 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52903.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52903.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52903", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.480", - "lastModified": "2024-08-21T07:15:06.480", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: lock overflowing for IOPOLL\n\nsyzbot reports an issue with overflow filling for IOPOLL:\n\nWARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734\nCPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0\nWorkqueue: events_unbound io_ring_exit_work\nCall trace:\n\u00a0io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734\n\u00a0io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773\n\u00a0io_fill_cqe_req io_uring/io_uring.h:168 [inline]\n\u00a0io_do_iopoll+0x474/0x62c io_uring/rw.c:1065\n\u00a0io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513\n\u00a0io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056\n\u00a0io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869\n\u00a0process_one_work+0x2d8/0x504 kernel/workqueue.c:2289\n\u00a0worker_thread+0x340/0x610 kernel/workqueue.c:2436\n\u00a0kthread+0x12c/0x158 kernel/kthread.c:376\n\u00a0ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863\n\nThere is no real problem for normal IOPOLL as flush is also called with\nuring_lock taken, but it's getting more complicated for IOPOLL|SQPOLL,\nfor which __io_cqring_overflow_flush() happens from the CQ waiting path." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring: bloqueo desbordado para IOPOLL syzbot informa un problema con el desbordamiento de llenado para IOPOLL: ADVERTENCIA: CPU: 0 PID: 28 en io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring /io_uring.c:734 CPU: 0 PID: 28 Comm: kworker/u4:1 No contaminado 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 Cola de trabajo: events_unbound io_ring_exit_work Seguimiento de llamadas: io_cqring_event_overflow+0x1c0/0x230 durante. c:734 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 io_fill_cqe_req io_uring/io_uring.h:168 [en l\u00ednea] io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 io_iopoll_try_reap_events+0x6c /0x108 io_uring/io_uring.c:1513 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 Process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 trabajador_thread+0x340/0x610 ue.c:2436 khilo+ 0x12c/0x158 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 No hay ning\u00fan problema real para IOPOLL normal ya que tambi\u00e9n se llama a descarga con uring_lock tomado, pero se est\u00e1 volviendo m\u00e1s complicado para IOPOLL |SQPOLL, para el cual __io_cqring_overflow_flush() ocurre desde la ruta de espera de CQ." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52904.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52904.json index 661b900d503..a92431e635a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52904.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52904.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52904", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.540", - "lastModified": "2024-08-21T07:15:06.540", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate()\n\nThe subs function argument may be NULL, so do not use it before the NULL check." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: corrige la posible desreferencia del puntero NULL en snd_usb_pcm_has_fixed_rate() El argumento de la funci\u00f3n subs puede ser NULL, as\u00ed que no lo use antes de la verificaci\u00f3n NULL." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52905.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52905.json index 981011fae2e..6d99422e921 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52905.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52905.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52905", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.597", - "lastModified": "2024-08-21T07:15:06.597", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix resource leakage in VF driver unbind\n\nresources allocated like mcam entries to support the Ntuple feature\nand hash tables for the tc feature are not getting freed in driver\nunbind. This patch fixes the issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: octeontx2-pf: corrige la p\u00e9rdida de recursos en la desvinculaci\u00f3n del controlador VF, los recursos asignados como entradas mcam para admitir la funci\u00f3n Ntuple y las tablas hash para la funci\u00f3n tc no se liberan en la desvinculaci\u00f3n del controlador. Este parche soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52906.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52906.json index ca95081f6f9..39b95a3b8c8 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52906.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52906.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52906", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.663", - "lastModified": "2024-08-21T07:15:06.663", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mpls: Fix warning during failed attribute validation\n\nThe 'TCA_MPLS_LABEL' attribute is of 'NLA_U32' type, but has a\nvalidation type of 'NLA_VALIDATE_FUNCTION'. This is an invalid\ncombination according to the comment above 'struct nla_policy':\n\n\"\nMeaning of `validate' field, use via NLA_POLICY_VALIDATE_FN:\n NLA_BINARY Validation function called for the attribute.\n All other Unused - but note that it's a union\n\"\n\nThis can trigger the warning [1] in nla_get_range_unsigned() when\nvalidation of the attribute fails. Despite being of 'NLA_U32' type, the\nassociated 'min'/'max' fields in the policy are negative as they are\naliased by the 'validate' field.\n\nFix by changing the attribute type to 'NLA_BINARY' which is consistent\nwith the above comment and all other users of NLA_POLICY_VALIDATE_FN().\nAs a result, move the length validation to the validation function.\n\nNo regressions in MPLS tests:\n\n # ./tdc.py -f tc-tests/actions/mpls.json\n [...]\n # echo $?\n 0\n\n[1]\nWARNING: CPU: 0 PID: 17743 at lib/nlattr.c:118\nnla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117\nModules linked in:\nCPU: 0 PID: 17743 Comm: syz-executor.0 Not tainted 6.1.0-rc8 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014\nRIP: 0010:nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117\n[...]\nCall Trace:\n \n __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310\n netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411\n netlink_ack_tlv_fill net/netlink/af_netlink.c:2454 [inline]\n netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506\n netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546\n rtnetlink_rcv+0x18/0x20 net/core/rtnetlink.c:6109\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg net/socket.c:734 [inline]\n ____sys_sendmsg+0x38f/0x500 net/socket.c:2482\n ___sys_sendmsg net/socket.c:2536 [inline]\n __sys_sendmsg+0x197/0x230 net/socket.c:2565\n __do_sys_sendmsg net/socket.c:2574 [inline]\n __se_sys_sendmsg net/socket.c:2572 [inline]\n __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: act_mpls: Advertencia de correcci\u00f3n durante la validaci\u00f3n fallida del atributo El atributo 'TCA_MPLS_LABEL' es de tipo 'NLA_U32', pero tiene un tipo de validaci\u00f3n de 'NLA_VALIDATE_FUNCTION'. Esta es una combinaci\u00f3n no v\u00e1lida seg\u00fan el comentario anterior 'struct nla_policy': \" Significado del campo `validar', util\u00edcelo a trav\u00e9s de NLA_POLICY_VALIDATE_FN: NLA_BINARY Funci\u00f3n de validaci\u00f3n llamada para el atributo. Todos los dem\u00e1s no utilizados, pero tenga en cuenta que es una uni\u00f3n \" Esto puede desencadenar la advertencia [1] en nla_get_range_unsigned() cuando falla la validaci\u00f3n del atributo. A pesar de ser del tipo 'NLA_U32', los campos 'min'/'max' asociados en la pol\u00edtica son negativos ya que tienen un alias del campo 'validate'. Para solucionarlo, cambie el tipo de atributo a 'NLA_BINARY', que es coherente con el comentario anterior y con todos los dem\u00e1s usuarios de NLA_POLICY_VALIDATE_FN(). Como resultado, mueva la validaci\u00f3n de longitud a la funci\u00f3n de validaci\u00f3n. No hay regresiones en las pruebas MPLS: # ./tdc.py -f tc-tests/actions/mpls.json [...] # echo $? 0 [1] ADVERTENCIA: CPU: 0 PID: 17743 en lib/nlattr.c:118 nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117 M\u00f3dulos vinculados en: CPU: 0 PID: 17743 Comm: syz-executor.0 No tainted 6.1.0-rc8 #3 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 01/04/2014 RIP: 0010:nla_get_range_unsigned+0x1d8 /0x1e0 lib/nlattr.c:117 [...] Seguimiento de llamadas: __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310 netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411 netlink_ack_tlv_fill net /netlink/af_netlink.c:2454 [en l\u00ednea] netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506 netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546 rtnetlink_rcv+0x18/0x20 net/core/rtnetlink. c:6109 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [en l\u00ednea] netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/socket.c :714 [en l\u00ednea] sock_sendmsg net/socket.c:734 [en l\u00ednea] ____sys_sendmsg+0x38f/0x500 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [en l\u00ednea] __sys_sendmsg+0x197/0x230 net/socket.c: 2565 __do_sys_sendmsg net/socket.c:2574 [en l\u00ednea] __se_sys_sendmsg net/socket.c:2572 [en l\u00ednea] __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52907.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52907.json index 85eea2f62ef..bf42bdc4599 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52907.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52907.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52907", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.733", - "lastModified": "2024-08-21T07:15:06.733", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame()\n\nFix a use-after-free that occurs in hcd when in_urb sent from\npn533_usb_send_frame() is completed earlier than out_urb. Its callback\nfrees the skb data in pn533_send_async_complete() that is used as a\ntransfer buffer of out_urb. Wait before sending in_urb until the\ncallback of out_urb is called. To modify the callback of out_urb alone,\nseparate the complete function of out_urb and ack_urb.\n\nFound by a modified version of syzkaller.\n\nBUG: KASAN: use-after-free in dummy_timer\nCall Trace:\n memcpy (mm/kasan/shadow.c:65)\n dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352)\n transfer (drivers/usb/gadget/udc/dummy_hcd.c:1453)\n dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972)\n arch_static_branch (arch/x86/include/asm/jump_label.h:27)\n static_key_false (include/linux/jump_label.h:207)\n timer_expire_exit (include/trace/events/timer.h:127)\n call_timer_fn (kernel/time/timer.c:1475)\n expire_timers (kernel/time/timer.c:1519)\n __run_timers (kernel/time/timer.c:1790)\n run_timer_softirq (kernel/time/timer.c:1803)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nfc: pn533: espere a que se complete out_urb en pn533_usb_send_frame() Se corrige un use-after-free que ocurre en hcd cuando in_urb enviado desde pn533_usb_send_frame() se completa antes que out_urb. Su devoluci\u00f3n de llamada libera los datos de skb en pn533_send_async_complete() que se utilizan como b\u00fafer de transferencia de out_urb. Espere antes de enviar in_urb hasta que se llame a la devoluci\u00f3n de llamada de out_urb. Para modificar la devoluci\u00f3n de llamada de out_urb solo, separe la funci\u00f3n completa de out_urb y ack_urb. Encontrado por una versi\u00f3n modificada de syzkaller. ERROR: KASAN: use-after-free en dummy_timer Rastreo de llamadas: memcpy (mm/kasan/shadow.c:65) dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352) transfer (drivers/usb/gadget/ udc/dummy_hcd.c:1453) dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972) arch_static_branch (arch/x86/include/asm/jump_label.h:27) static_key_false (include/linux/jump_label.h: 207) timer_expire_exit (include/trace/events/timer.h:127) call_timer_fn (kernel/time/timer.c:1475) expire_timers (kernel/time/timer.c:1519) __run_timers (kernel/time/timer.c: 1790) run_timer_softirq (n\u00facleo/hora/timer.c:1803)" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json index fbb7476a348..d730c23d09a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52908", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.800", - "lastModified": "2024-08-21T07:15:06.800", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential NULL dereference\n\nFix potential NULL dereference, in the case when \"man\", the resource manager\nmight be NULL, when/if we print debug information." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corrige una posible desreferencia NULL. Se corrige una posible desreferencia NULL, en el caso de que sea \"man\", el administrador de recursos podr\u00eda ser NULL, cuando/si imprimimos informaci\u00f3n de depuraci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json index ac424930221..c913e8e29e0 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52909", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.857", - "lastModified": "2024-08-21T07:15:06.857", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix handling of cached open files in nfsd4_open codepath\n\nCommit fb70bf124b05 (\"NFSD: Instantiate a struct file when creating a\nregular NFSv4 file\") added the ability to cache an open fd over a\ncompound. There are a couple of problems with the way this currently\nworks:\n\nIt's racy, as a newly-created nfsd_file can end up with its PENDING bit\ncleared while the nf is hashed, and the nf_file pointer is still zeroed\nout. Other tasks can find it in this state and they expect to see a\nvalid nf_file, and can oops if nf_file is NULL.\n\nAlso, there is no guarantee that we'll end up creating a new nfsd_file\nif one is already in the hash. If an extant entry is in the hash with a\nvalid nf_file, nfs4_get_vfs_file will clobber its nf_file pointer with\nthe value of op_file and the old nf_file will leak.\n\nFix both issues by making a new nfsd_file_acquirei_opened variant that\ntakes an optional file pointer. If one is present when this is called,\nwe'll take a new reference to it instead of trying to open the file. If\nthe nfsd_file already has a valid nf_file, we'll just ignore the\noptional file and pass the nfsd_file back as-is.\n\nAlso rework the tracepoints a bit to allow for an \"opened\" variant and\ndon't try to avoid counting acquisitions in the case where we already\nhave a cached open file." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: corrige el manejo de archivos abiertos almacenados en cach\u00e9 en la ruta de c\u00f3digo nfsd4_open el commit fb70bf124b05 (\"NFSD: crear una instancia de un archivo de estructura al crear un archivo NFSv4 normal\") agreg\u00f3 la capacidad de almacenar en cach\u00e9 un fd abierto sobre un compuesto. Hay un par de problemas con la forma en que esto funciona actualmente: Es picante, ya que un nfsd_file reci\u00e9n creado puede terminar con su bit PENDIENTE borrado mientras el nf tiene hash, y el puntero nf_file todav\u00eda est\u00e1 puesto a cero. Otras tareas pueden encontrarlo en este estado y esperan ver un nf_file v\u00e1lido, y pueden ir si nf_file es NULL. Adem\u00e1s, no hay garant\u00eda de que terminemos creando un nuevo nfsd_file si ya hay uno en el hash. Si una entrada existente est\u00e1 en el hash con un nf_file v\u00e1lido, nfs4_get_vfs_file golpear\u00e1 su puntero nf_file con el valor de op_file y el antiguo nf_file se filtrar\u00e1. Solucione ambos problemas creando una nueva variante nfsd_file_acquirei_opened que toma un puntero de archivo opcional. Si hay uno presente cuando se llama, tomaremos una nueva referencia en lugar de intentar abrir el archivo. Si el nfsd_file ya tiene un nf_file v\u00e1lido, simplemente ignoraremos el archivo opcional y devolveremos el nfsd_file tal como est\u00e1. Tambi\u00e9n vuelva a trabajar un poco los puntos de seguimiento para permitir una variante \"abierta\" y no intente evitar contar adquisiciones en el caso de que ya tengamos un archivo abierto en cach\u00e9." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json index 895b185fb64..5f973a3b2e8 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.910", - "lastModified": "2024-08-21T07:15:06.910", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/iova: Fix alloc iova overflows issue\n\nIn __alloc_and_insert_iova_range, there is an issue that retry_pfn\noverflows. The value of iovad->anchor.pfn_hi is ~0UL, then when\niovad->cached_node is iovad->anchor, curr_iova->pfn_hi + 1 will\noverflow. As a result, if the retry logic is executed, low_pfn is\nupdated to 0, and then new_pfn < low_pfn returns false to make the\nallocation successful.\n\nThis issue occurs in the following two situations:\n1. The first iova size exceeds the domain size. When initializing\niova domain, iovad->cached_node is assigned as iovad->anchor. For\nexample, the iova domain size is 10M, start_pfn is 0x1_F000_0000,\nand the iova size allocated for the first time is 11M. The\nfollowing is the log information, new->pfn_lo is smaller than\niovad->cached_node.\n\nExample log as follows:\n[ 223.798112][T1705487] sh: [name:iova&]__alloc_and_insert_iova_range\nstart_pfn:0x1f0000,retry_pfn:0x0,size:0xb00,limit_pfn:0x1f0a00\n[ 223.799590][T1705487] sh: [name:iova&]__alloc_and_insert_iova_range\nsuccess start_pfn:0x1f0000,new->pfn_lo:0x1efe00,new->pfn_hi:0x1f08ff\n\n2. The node with the largest iova->pfn_lo value in the iova domain\nis deleted, iovad->cached_node will be updated to iovad->anchor,\nand then the alloc iova size exceeds the maximum iova size that can\nbe allocated in the domain.\n\nAfter judging that retry_pfn is less than limit_pfn, call retry_pfn+1\nto fix the overflow issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/iova: soluciona el problema de desbordamiento de alloc iova. En __alloc_and_insert_iova_range, hay un problema que retry_pfn se desborda. El valor de iovad->anchor.pfn_hi es ~0UL, luego, cuando iovad->cached_node es iovad->anchor, curr_iova->pfn_hi + 1 se desbordar\u00e1. Como resultado, si se ejecuta la l\u00f3gica de reintento, low_pfn se actualiza a 0 y luego new_pfn < low_pfn devuelve falso para que la asignaci\u00f3n sea exitosa. Este problema ocurre en las dos situaciones siguientes: 1. El tama\u00f1o del primer iova excede el tama\u00f1o del dominio. Al inicializar el dominio iova, iovad->cached_node se asigna como iovad->anchor. Por ejemplo, el tama\u00f1o del dominio iova es 10 M, start_pfn es 0x1_F000_0000 y el tama\u00f1o de iova asignado por primera vez es 11 M. La siguiente es la informaci\u00f3n de registro, new->pfn_lo es m\u00e1s peque\u00f1o que iovad->cached_node. Registro de ejemplo como sigue: [ 223.798112][T1705487] sh: [name:iova&]__alloc_and_insert_iova_range start_pfn:0x1f0000,retry_pfn:0x0,size:0xb00,limit_pfn:0x1f0a00 [ 223.799590][T1705487] [nombre:iova&]__alloc_and_insert_iova_range \u00e9xito start_pfn :0x1f0000,new->pfn_lo:0x1efe00,new->pfn_hi:0x1f08ff 2. El nodo con el valor iova->pfn_lo m\u00e1s grande en el dominio iova se elimina, iovad->cached_node se actualizar\u00e1 a iovad->anchor y luego el tama\u00f1o de alloc iova excede el tama\u00f1o m\u00e1ximo de iova que se puede asignar en el dominio. Despu\u00e9s de juzgar que retry_pfn es menor que limit_pfn, llame a retry_pfn+1 para solucionar el problema de desbordamiento." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json index 9530cd05268..a4c457a419b 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52911", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.967", - "lastModified": "2024-08-21T07:15:06.967", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: another fix for the headless Adreno GPU\n\nFix another oops reproducible when rebooting the board with the Adreno\nGPU working in the headless mode (e.g. iMX platforms).\n\nUnable to handle kernel NULL pointer dereference at virtual address 00000000 when read\n[00000000] *pgd=74936831, *pte=00000000, *ppte=00000000\nInternal error: Oops: 17 [#1] ARM\nCPU: 0 PID: 51 Comm: reboot Not tainted 6.2.0-rc1-dirty #11\nHardware name: Freescale i.MX53 (Device Tree Support)\nPC is at msm_atomic_commit_tail+0x50/0x970\nLR is at commit_tail+0x9c/0x188\npc : [] lr : [] psr: 600e0013\nsp : e0851d30 ip : ee4eb7eb fp : 00090acc\nr10: 00000058 r9 : c2193014 r8 : c4310000\nr7 : c4759380 r6 : 07bef61d r5 : 00000000 r4 : 00000000\nr3 : c44cc440 r2 : 00000000 r1 : 00000000 r0 : 00000000\nFlags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none\nControl: 10c5387d Table: 74910019 DAC: 00000051\nRegister r0 information: NULL pointer\nRegister r1 information: NULL pointer\nRegister r2 information: NULL pointer\nRegister r3 information: slab kmalloc-1k start c44cc400 pointer offset 64 size 1024\nRegister r4 information: NULL pointer\nRegister r5 information: NULL pointer\nRegister r6 information: non-paged memory\nRegister r7 information: slab kmalloc-128 start c4759380 pointer offset 0 size 128\nRegister r8 information: slab kmalloc-2k start c4310000 pointer offset 0 size 2048\nRegister r9 information: non-slab/vmalloc memory\nRegister r10 information: non-paged memory\nRegister r11 information: non-paged memory\nRegister r12 information: non-paged memory\nProcess reboot (pid: 51, stack limit = 0xc80046d9)\nStack: (0xe0851d30 to 0xe0852000)\n1d20: c4759380 fbd77200 000005ff 002b9c70\n1d40: c4759380 c4759380 00000000 07bef61d 00000600 c0d6fe7c c2193014 00000058\n1d60: 00090acc c067a214 00000000 c4759380 c4310000 00000000 c44cc854 c067a89c\n1d80: 00000000 00000000 00000000 c4310468 00000000 c4759380 c4310000 c4310468\n1da0: c4310470 c0643258 c4759380 00000000 00000000 c0c4ee24 00000000 c44cc810\n1dc0: 00000000 c0c4ee24 00000000 c44cc810 00000000 0347d2a8 e0851e00 e0851e00\n1de0: c4759380 c067ad20 c4310000 00000000 c44cc810 c27f8718 c44cc854 c067adb8\n1e00: c4933000 00000002 00000001 00000000 00000000 c2130850 00000000 c2130854\n1e20: c25fc488 00000000 c0ff162c 00000000 00000001 00000002 00000000 00000000\n1e40: c43102c0 c43102c0 00000000 0347d2a8 c44cc810 c44cc814 c2133da8 c06d1a60\n1e60: 00000000 00000000 00079028 c2012f24 fee1dead c4933000 00000058 c01431e4\n1e80: 01234567 c0143a20 00000000 00000000 00000000 00000000 00000000 00000000\n1ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1f20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\n1f80: 00000000 00000000 00000000 0347d2a8 00000002 00000004 00000078 00000058\n1fa0: c010028c c0100060 00000002 00000004 fee1dead 28121969 01234567 00079028\n1fc0: 00000002 00000004 00000078 00000058 0002fdc5 00000000 00000000 00090acc\n1fe0: 00000058 becc9c64 b6e97e05 b6e0e5f6 600e0030 fee1dead 00000000 00000000\n msm_atomic_commit_tail from commit_tail+0x9c/0x188\n commit_tail from drm_atomic_helper_commit+0x160/0x188\n drm_atomic_helper_commit from drm_atomic_commit+0xac/0xe0\n drm_atomic_commit from drm_atomic_helper_disable_all+0x1b0/0x1c0\n drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x88/0x140\n drm_atomic_helper_shutdown from device_shutdown+0x16c/0x240\n device_shutdown from kernel_restart+0x38/0x90\n kernel_restart from __do_sys_reboot+0x\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm: otra soluci\u00f3n para la GPU Adreno sin cabeza. Se corrigi\u00f3 otro error reproducible al reiniciar la placa con la GPU Adreno funcionando en modo sin cabeza (por ejemplo, plataformas iMX). No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se lee [00000000] *pgd=74936831, *pte=00000000, *ppte=00000000 Error interno: Ups: 17 [#1] ARM CPU: 0 PID: 51 Comm: reiniciar Not tainted 6.2.0-rc1-dirty #11 Nombre del hardware: Freescale i.MX53 (soporte de \u00e1rbol de dispositivos) La PC est\u00e1 en msm_atomic_commit_tail+0x50/0x970 LR est\u00e1 en commit_tail+0x9c/0x188 pc: [] lr: [< c067a214>] psr: 600e0013 sp: e0851d30 ip: ee4eb7eb fp: 00090acc r10: 00000058 r9: c2193014 r8: c4310000 r7: c4759380 r6: 07bef61d r5: 00000 r4: 00000000 r3: c44cc440 r2: 00000000 r1: 00000000 r0: 00000000 Banderas: nZCv IRQ en FIQ en Modo SVC_32 ISA ARM Segmento ninguno Control: 10c5387d Tabla: 74910019 DAC: 00000051 Informaci\u00f3n del registro r0: puntero NULL Informaci\u00f3n del registro r1: puntero NULL Informaci\u00f3n del registro r2: puntero NULL Informaci\u00f3n del registro r3: slab kmalloc-1k inicio c44cc400 desplazamiento del puntero 64 tama\u00f1o 1024 Informaci\u00f3n del registro r4: puntero NULL Informaci\u00f3n del registro r5: puntero NULL Informaci\u00f3n del registro r6: memoria no paginada Informaci\u00f3n del registro r7: slab kmalloc-128 inicio c4759380 desplazamiento del puntero 0 tama\u00f1o 128 Informaci\u00f3n del registro r8: slab kmalloc-2k inicio c4310000 desplazamiento del puntero 0 tama\u00f1o 2048 Informaci\u00f3n del registro r9: memoria no slab/vmalloc Informaci\u00f3n del registro r10: memoria no paginada Informaci\u00f3n del registro r11: memoria no paginada Informaci\u00f3n del registro r12: memoria no paginada Reinicio del proceso (pid: 51, l\u00edmite de pila = 0xc80046d9) Pila : (0xe0851d30 a 0xe0852000) 1d20: c4759380 fbd77200 000005ff 002b9c70 1d40: c4759380 c4759380 00000000 07bef61d 00000600 c0d6fe7c 3014 00000058 1d60: 00090acc c067a214 00000000 c4759380 c4310000 00000000 c44cc854 c067a89c 1d80: 00000000 00000000 00000000 c431046 8 00000000 c4759380 c4310000 c4310468 1da0: c4310470 c0643258 c4759380 00000000 00000000 c0c4ee24 00000000 c44cc810 1dc0: 00000000 c0c4ee24 00000000 c44cc810 00000000 0347d2a8 e0851e00 e0851e00 1de0: c4759380 c067ad20 c4310000 00 c44cc810 c27f8718 c44cc854 c067adb8 1e00: c4933000 00000002 00000001 00000000 00000000 c2130850 00000000 c2130854 1e20: c25fc488 00000 c0ff162c 00000000 00000001 00000002 00000000 00000000 1e40: c43102c0 c43102c0 00000000 0347d2a8 c44cc810 c44cc814 c2133da8 c06d1a60 1e60: 00000000 00000000 00079028 c2012f24 fee1dead c4933000 00000058 c01431e4 1e80: 01234567 c0143a20 00000000 000 00000000 00000000 00000000 00000000 1ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1ec0: 000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1ee0: 00000000 00000000 00000000 00000000 00000000 0000 00000000 00000000 1f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1f20: 00000000 00000000 000000 00000000 00000000 00000000 00000000 00000000 1f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000 1f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1f80: 00000000 00000000 00000000 0347d2a 8 00000002 00000004 00000078 00000058 1fa0: c010028c c0100060 00000002 00000004 fee1dead 28121969 01234567 00079028 1fc0: 00000002 00000004 00000078 0000058 0002fdc5 00000000 00000000 00090acc 1fe0: 00000058 becc9c64 b6e97e05 b6e0e5f6 600e0030 fee1dead 00000000 00000000 msm_atomic_commit_tail de commit_tail+ 0x9c/0x188 commit_tail de drm_atomic_helper_commit+0x160/0x188 drm_atomic_helper_commit de drm_atomic_commit+ 0xac/0xe0 drm_atomic_commit de drm_atomic_helper_disable_all+0x1b0/0x1c0 drm_atomic_helper_disable_all de drm_atomic_helper_shutdown+0x88/0x140 drm_atomic_helper_shutdown de device_shutdown+0x16c/0x240 device_shutdown de kernel_restart+0x 38/0x90 kernel_restart desde __do_sys_reboot+0x ---truncado---" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json index 34e0e920fe2..3c4bf1ff221 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52912", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.020", - "lastModified": "2024-08-21T07:15:07.020", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fixed bug on error when unloading amdgpu\n\nFixed bug on error when unloading amdgpu.\n\nThe error message is as follows:\n[ 377.706202] kernel BUG at drivers/gpu/drm/drm_buddy.c:278!\n[ 377.706215] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 377.706222] CPU: 4 PID: 8610 Comm: modprobe Tainted: G IOE 6.0.0-thomas #1\n[ 377.706231] Hardware name: ASUS System Product Name/PRIME Z390-A, BIOS 2004 11/02/2021\n[ 377.706238] RIP: 0010:drm_buddy_free_block+0x26/0x30 [drm_buddy]\n[ 377.706264] Code: 00 00 00 90 0f 1f 44 00 00 48 8b 0e 89 c8 25 00 0c 00 00 3d 00 04 00 00 75 10 48 8b 47 18 48 d3 e0 48 01 47 28 e9 fa fe ff ff <0f> 0b 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41 54 55 48 89 f5 53\n[ 377.706282] RSP: 0018:ffffad2dc4683cb8 EFLAGS: 00010287\n[ 377.706289] RAX: 0000000000000000 RBX: ffff8b1743bd5138 RCX: 0000000000000000\n[ 377.706297] RDX: ffff8b1743bd5160 RSI: ffff8b1743bd5c78 RDI: ffff8b16d1b25f70\n[ 377.706304] RBP: ffff8b1743bd59e0 R08: 0000000000000001 R09: 0000000000000001\n[ 377.706311] R10: ffff8b16c8572400 R11: ffffad2dc4683cf0 R12: ffff8b16d1b25f70\n[ 377.706318] R13: ffff8b16d1b25fd0 R14: ffff8b1743bd59c0 R15: ffff8b16d1b25f70\n[ 377.706325] FS: 00007fec56c72c40(0000) GS:ffff8b1836500000(0000) knlGS:0000000000000000\n[ 377.706334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 377.706340] CR2: 00007f9b88c1ba50 CR3: 0000000110450004 CR4: 00000000003706e0\n[ 377.706347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 377.706354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 377.706361] Call Trace:\n[ 377.706365] \n[ 377.706369] drm_buddy_free_list+0x2a/0x60 [drm_buddy]\n[ 377.706376] amdgpu_vram_mgr_fini+0xea/0x180 [amdgpu]\n[ 377.706572] amdgpu_ttm_fini+0x12e/0x1a0 [amdgpu]\n[ 377.706650] amdgpu_bo_fini+0x22/0x90 [amdgpu]\n[ 377.706727] gmc_v11_0_sw_fini+0x26/0x30 [amdgpu]\n[ 377.706821] amdgpu_device_fini_sw+0xa1/0x3c0 [amdgpu]\n[ 377.706897] amdgpu_driver_release_kms+0x12/0x30 [amdgpu]\n[ 377.706975] drm_dev_release+0x20/0x40 [drm]\n[ 377.707006] release_nodes+0x35/0xb0\n[ 377.707014] devres_release_all+0x8b/0xc0\n[ 377.707020] device_unbind_cleanup+0xe/0x70\n[ 377.707027] device_release_driver_internal+0xee/0x160\n[ 377.707033] driver_detach+0x44/0x90\n[ 377.707039] bus_remove_driver+0x55/0xe0\n[ 377.707045] pci_unregister_driver+0x3b/0x90\n[ 377.707052] amdgpu_exit+0x11/0x6c [amdgpu]\n[ 377.707194] __x64_sys_delete_module+0x142/0x2b0\n[ 377.707201] ? fpregs_assert_state_consistent+0x22/0x50\n[ 377.707208] ? exit_to_user_mode_prepare+0x3e/0x190\n[ 377.707215] do_syscall_64+0x38/0x90\n[ 377.707221] entry_SYSCALL_64_after_hwframe+0x63/0xcd" + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Se corrigi\u00f3 el error al descargar amdgpu. Se corrigi\u00f3 el error al descargar amdgpu. El mensaje de error es el siguiente: [377.706202] ERROR del kernel en drivers/gpu/drm/drm_buddy.c:278. [ 377.706215] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI [ 377.706222] CPU: 4 PID: 8610 Comm: modprobe Contaminado: G IOE 6.0.0-thomas #1 [ 377.706231] Nombre de hardware: Nombre del producto del sistema ASUS/PRIME Z390 -A, BIOS 2004 02/11/2021 [377.706238] RIP: 0010:drm_buddy_free_block+0x26/0x30 [drm_buddy] [377.706264] C\u00f3digo: 00 00 00 90 0f 1f 44 00 00 48 8b 0e 89 8 25 00 0c 00 00 3d 00 04 00 00 75 10 48 8b 47 18 48 d3 e0 48 01 47 28 e9 fa fe ff ff <0f> 0b 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41 54 55 48 89 f5 [ 377.706282] RSP : 0018:ffffad2dc4683cb8 EFLAGS: 00010287 [ 377.706289] RAX: 0000000000000000 RBX: ffff8b1743bd5138 RCX: 0000000000000000 [ 377.706297] RDX: ffff8b1743bd5160 RSI: ffff8b1743bd5c78 RDI: ffff8b16d1b25f70 [ 377.706304] RBP: ffff8b1743bd59e0 R08: 0000000000000001 R09: 00000000000000001 [ 377.706311] R10: ffff8b16c8572400 R11 : ffffad2dc4683cf0 R12: ffff8b16d1b25f70 [ 377.706318] R13: ffff8b16d1b25fd0 R14: ffff8b1743bd59c0 R15: ffff8b16d1b25f70 [ 377.706325] FS: 07fec56c72c40(0000) GS:ffff8b1836500000(0000) knlGS:0000000000000000 [ 377.706334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.706340] CR2: 00007f9b88c1ba50 CR3: 0000000110450004 CR4: 00000000003706e0 [ 377.706347] DR0: 0000000000000000 DR1: 00000000000000 00 DR2: 0000000000000000 [ 377.706354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 377.706361] Seguimiento de llamadas: [ 377.706365] > [ 377.706369 ] drm_buddy_free_list+0x2a/0x60 [drm_buddy] [ 377.706376] amdgpu_vram_mgr_fini+0xea/0x180 [amdgpu] [ 377.706572] amdgpu_ttm_fini+0x12e/0x1a0 [amdgpu] [ 377.706650] dgpu_bo_fini+0x22/0x90 [amdgpu] [ 377.706727] gmc_v11_0_sw_fini+0x26/0x30 [amdgpu] [ 377.706821] amdgpu_device_fini_sw+0xa1/0x3c0 [amdgpu] [ 377.706897] amdgpu_driver_release_kms+0x12/0x30 [amdgpu] [ 377.706975] drm_dev_release+0x20/0x40 [drm] 377.707006] release_nodes+0x35/0xb0 [ 377.707014] devres_release_all+0x8b /0xc0 [ 377.707020] dispositivo_unbind_cleanup+0xe/0x70 [ 377.707027] dispositivo_release_driver_internal+0xee/0x160 [ 377.707033] driver_detach+0x44/0x90 [ 377.707039] bus_remove_driver+0x55/0x e0 [377.707045] pci_unregister_driver+0x3b/0x90 [377.707052] amdgpu_exit+0x11/0x6c [amdgpu] [377.707194] __x64_sys_delete_module+0x142/0x2b0 [377.707201]? fpregs_assert_state_consistent+0x22/0x50 [377.707208]? exit_to_user_mode_prepare+0x3e/0x190 [ 377.707215] do_syscall_64+0x38/0x90 [ 377.707221] entrada_SYSCALL_64_after_hwframe+0x63/0xcd" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json index e620d7549f1..798d0e045ee 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.087", - "lastModified": "2024-08-21T07:15:07.087", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix potential context UAFs\n\ngem_context_register() makes the context visible to userspace, and which\npoint a separate thread can trigger the I915_GEM_CONTEXT_DESTROY ioctl.\nSo we need to ensure that nothing uses the ctx ptr after this. And we\nneed to ensure that adding the ctx to the xarray is the *last* thing\nthat gem_context_register() does with the ctx pointer.\n\n[tursulin: Stable and fixes tags add/tidy.]\n(cherry picked from commit bed4b455cf5374e68879be56971c1da563bcd90c)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/i915: corrige posibles UAF de contexto gem_context_register() hace que el contexto sea visible para el espacio de usuario, y en qu\u00e9 punto un hilo separado puede activar el ioctl I915_GEM_CONTEXT_DESTROY. Por lo tanto, debemos asegurarnos de que nada use ctx ptr despu\u00e9s de esto. Y debemos asegurarnos de que agregar ctx al xarray sea lo *\u00faltimo* que hace gem_context_register() con el puntero ctx. [tursulin: etiquetas estables y corregidas agregadas/ordenadas.] (seleccionado de el commit bed4b455cf5374e68879be56971c1da563bcd90c)" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json index 776f334da90..93049119240 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52914", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.143", - "lastModified": "2024-08-21T07:15:07.143", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: add hash if ready poll request can't complete inline\n\nIf we don't, then we may lose access to it completely, leading to a\nrequest leak. This will eventually stall the ring exit process as\nwell." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring/poll: agregue hash si la solicitud de sondeo lista no se puede completar en l\u00ednea. Si no lo hacemos, podemos perder el acceso a ella por completo, lo que provocar\u00e1 una fuga de solicitud. Esto eventualmente tambi\u00e9n detendr\u00e1 el proceso de salida del anillo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json index 41cd17c3f3a..90e1d1aacab 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1062", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T13:15:09.210", - "lastModified": "2024-07-18T16:15:06.337", + "lastModified": "2024-08-21T13:15:04.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4633", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5690", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1062", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2199.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2199.json index 7e74e039b08..a8100a1aa3f 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2199.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2199.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2199", "sourceIdentifier": "secalert@redhat.com", "published": "2024-05-28T12:15:08.950", - "lastModified": "2024-07-18T16:15:06.620", + "lastModified": "2024-08-21T13:15:04.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4633", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5690", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-2199", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22281.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22281.json index 96a704d66d8..42a80a26094 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22281.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22281.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22281", "sourceIdentifier": "security@apache.org", "published": "2024-08-20T23:15:03.347", - "lastModified": "2024-08-20T23:15:03.347", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "security@apache.org", @@ -16,6 +16,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** The Apache Helix Front (UI) component contained a hard-coded secret, allowing an attacker to spoof sessions by generating their own fake cookies.\n\nThis issue affects Apache Helix Front (UI): all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO COMPATIBLE CUANDO SE ASIGN\u00d3 ** El componente Apache Helix Front (UI) conten\u00eda un secreto codificado que permit\u00eda a un atacante falsificar sesiones generando sus propias cookies falsas. Este problema afecta a Apache Helix Front (UI): todas las versiones. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json index bb7270a6204..ac82158fbef 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27184", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.733", - "lastModified": "2024-08-20T16:15:10.733", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n inadecuada de las URL podr\u00eda dar lugar a una verificaci\u00f3n no v\u00e1lida de si una URL de redireccionamiento es interna o no." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json index 63905785513..f1fa0e16e69 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27185", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.840", - "lastModified": "2024-08-20T20:35:21.323", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The pagination class includes arbitrary parameters in links, leading to cache poisoning attack vectors." + }, + { + "lang": "es", + "value": "La clase de paginaci\u00f3n incluye par\u00e1metros arbitrarios en los enlaces, lo que genera vectores de ataque de envenenamiento de cach\u00e9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27186.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27186.json index 2862b8e97b3..805b91a1e62 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27186.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27186.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27186", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.893", - "lastModified": "2024-08-20T16:15:10.893", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mail template feature lacks an escaping mechanism, causing XSS vectors in multiple extensions." + }, + { + "lang": "es", + "value": "La funci\u00f3n de plantilla de correo carece de un mecanismo de escape, lo que genera vectores XSS en m\u00faltiples extensiones." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27187.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27187.json index 9a982c710d4..5e2204e7f46 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27187.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27187.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27187", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.983", - "lastModified": "2024-08-20T20:35:22.107", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Controls allows backend users to overwrite their username when disallowed." + }, + { + "lang": "es", + "value": "Los controles de acceso inadecuados permiten a los usuarios de backend sobrescribir su nombre de usuario cuando no est\u00e1n permitidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31842.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31842.json index 8d2f5ecdd53..4afbbe7be01 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31842.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31842.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31842", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T20:15:08.090", - "lastModified": "2024-08-20T20:15:08.090", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Italtel Embrace 1.6.4. The web application inserts the access token of an authenticated user inside GET requests. The query string for the URL could be saved in the browser's history, passed through Referers to other web sites, stored in web logs, or otherwise recorded in other sources. If the query string contains sensitive information such as session identifiers, then attackers can use this information to launch further attacks. Because the access token in sent in GET requests, this vulnerability could lead to complete account takeover." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. La aplicaci\u00f3n web inserta el token de acceso de un usuario autenticado dentro de las solicitudes GET. La cadena de consulta para la URL podr\u00eda guardarse en el historial del navegador, pasarse a trav\u00e9s de Referers a otros sitios web, almacenarse en registros web o registrarse de otro modo en otras fuentes. Si la cadena de consulta contiene informaci\u00f3n confidencial, como identificadores de sesi\u00f3n, los atacantes pueden usar esta informaci\u00f3n para lanzar m\u00e1s ataques. Debido a que el token de acceso se env\u00eda en solicitudes GET, esta vulnerabilidad podr\u00eda provocar la apropiaci\u00f3n completa de la cuenta." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json index b5baf9c7419..88495e211e8 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34458.json @@ -2,20 +2,84 @@ "id": "CVE-2024-34458", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T14:15:08.873", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:31:38.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Keyfactor Command 10.5.x before 10.5.1 and 11.5.x before 11.5.1 allows SQL Injection which could result in information disclosure." + }, + { + "lang": "es", + "value": "Keyfactor Command 10.5.x anterior a 10.5.1 y 11.5.x anterior a 11.5.1 permite la inyecci\u00f3n SQL, lo que podr\u00eda resultar en la divulgaci\u00f3n de informaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keyfactor:command:10.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "24F747AE-03A5-4036-A12C-9296A4324B43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keyfactor:command:11.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7D465AC2-3EDB-4338-85C3-FF7F074CE585" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35214.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35214.json index 9c67804f55a..9173bcce726 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35214.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35214.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35214", "sourceIdentifier": "secure@blackberry.com", "published": "2024-08-20T18:15:08.497", - "lastModified": "2024-08-20T18:15:08.497", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A tampering vulnerability in the CylanceOPTICS Windows Installer Package of CylanceOPTICS for Windows version 3.2 and 3.3 could allow an attacker to potentially uninstall CylanceOPTICS from a system thereby leaving it with only the protection of CylancePROTECT." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de manipulaci\u00f3n en el paquete CylanceOPTICS Windows Installer de CylanceOPTICS para Windows versi\u00f3n 3.2 y 3.3 podr\u00eda permitir a un atacante desinstalar CylanceOPTICS de un sistema, dej\u00e1ndolo as\u00ed solo con la protecci\u00f3n de CylancePROTECT." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3657.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3657.json index b577bfec891..cb4eb5cec5e 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3657.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3657", "sourceIdentifier": "secalert@redhat.com", "published": "2024-05-28T13:15:11.057", - "lastModified": "2024-07-18T16:15:07.693", + "lastModified": "2024-08-21T13:15:04.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4633", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5690", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3657", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json index 1678e041f65..36b0a3e1835 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37008.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37008", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-08-21T10:15:05.037", - "lastModified": "2024-08-21T10:15:05.037", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWG creado con fines malintencionados, al analizarse en Revit, puede provocar un desbordamiento del b\u00fafer basado en la pila. Un actor malintencionado puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json index 74877e0cb37..c773762fe84 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37109", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-24T13:15:10.483", - "lastModified": "2024-06-28T13:15:02.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:49:47.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wishlistmember:wishlist_member:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.26.7", + "matchCriteriaId": "04F823C9-F802-4D6F-AC26-DEF76ABC56CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-authenticated-arbitrary-php-code-execution-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json index 5abed3c2927..0653fe54387 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38175", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-20T19:15:09.950", - "lastModified": "2024-08-20T19:15:09.950", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An improper access control vulnerability in the Azure Managed Instance for Apache Cassandra allows an authenticated attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado en Instancia administrada de Azure para Apache Cassandra permite a un atacante autenticado elevar privilegios en una red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38305.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38305.json index 32e104234fb..64420f136e1 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38305.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38305.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38305", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-21T03:15:05.020", - "lastModified": "2024-08-21T03:15:05.020", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell SupportAssist for Home PCs Installer exe version 4.0.3 contains a privilege escalation vulnerability in the installer. A local low-privileged authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary executables on the operating system with elevated privileges." + }, + { + "lang": "es", + "value": "Dell SupportAssist for Home PCs Installer exe versi\u00f3n 4.0.3 contiene una vulnerabilidad de escalada de privilegios en el instalador. Un atacante local autenticado con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ejecutables arbitrarios en el sistema operativo con privilegios elevados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json index 7c208bf6651..2f229d775ff 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39094.json @@ -2,28 +2,94 @@ "id": "CVE-2024-39094", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T14:15:09.330", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:31:04.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Friendica 2024.03 is vulnerable to Cross Site Scripting (XSS) in settings/profile via the homepage, xmpp, and matrix parameters." + }, + { + "lang": "es", + "value": "Friendica 2024.03 es vulnerable a Cross Site Scripting (XSS) en la configuraci\u00f3n/perfil a trav\u00e9s de la p\u00e1gina de inicio, xmpp y los par\u00e1metros de matriz." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:friendica:friendica:2024.03:*:*:*:*:*:*:*", + "matchCriteriaId": "2F8639D6-03C8-4E15-BB2D-4217078E983E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://friendi.ca/2024/08/17/friendica-2024-08-released/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/friendica/friendica/issues/14220", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/friendica/friendica/releases/tag/2024.08", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json index 2c404539d33..c37300c4a18 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40743", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:11.457", - "lastModified": "2024-08-20T16:15:11.457", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The stripImages and stripIframes methods didn't properly process inputs, leading to XSS vectors." + }, + { + "lang": "es", + "value": "Los m\u00e9todos stripImages y stripIframes no procesaron correctamente las entradas, lo que gener\u00f3 vectores XSS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json index ce93fb07512..5f44e0db129 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41657", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:13.687", - "lastModified": "2024-08-20T21:15:13.687", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the logged in user. Due to the a logic error in checking only for a prefix when authenticating the Origin header, any domain can create a valid subdomain with a valid subdomain prefix (Ex: localhost.example.com), allowing the website to make requests to Casdoor as the current signed-in user." + }, + { + "lang": "es", + "value": "Casdoor es una plataforma de gesti\u00f3n de acceso e identidad (IAM)/inicio de sesi\u00f3n \u00fanico (SSO) basada en la interfaz de usuario. En Casdoor 1.577.0 y versiones anteriores, existe una vulnerabilidad l\u00f3gica en el filtro beego CorsFilter que permite que cualquier sitio web realice solicitudes entre dominios a Casdoor como usuario conectado. Debido a un error l\u00f3gico al verificar solo un prefijo al autenticar el encabezado de Origen, cualquier dominio puede crear un subdominio v\u00e1lido con un prefijo de subdominio v\u00e1lido (Ej.: localhost.example.com), permitiendo que el sitio web realice solicitudes a Casdoor como usuario que ha iniciado sesi\u00f3n actualmente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json index 72a62f3742a..2a03ef62760 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41658", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:13.910", - "lastModified": "2024-08-20T21:15:13.910", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, he purchase URL that is created to generate a WechatPay QR code is vulnerable to reflected XSS. When purchasing an item through casdoor, the product page allows you to pay via wechat pay. When using wechat pay, a QR code with the wechat pay link is displayed on the payment page, hosted on the domain of casdoor. This page takes a query parameter from the url successUrl, and redirects the user to that url after a successful purchase. Because the user has no reason to think that the payment page contains sensitive information, they may share it with other or can be social engineered into sending it to others. An attacker can then craft the casdoor link with a special url and send it back to the user, and once payment has gone though an XSS attack occurs." + }, + { + "lang": "es", + "value": "Casdoor es una plataforma de gesti\u00f3n de acceso e identidad (IAM)/inicio de sesi\u00f3n \u00fanico (SSO) basada en la interfaz de usuario. En Casdoor 1.577.0 y versiones anteriores, la URL de compra creada para generar un c\u00f3digo QR de WechatPay es vulnerable al XSS reflejado. Al comprar un art\u00edculo a trav\u00e9s de casdoor, la p\u00e1gina del producto le permite pagar mediante wechat pay. Cuando se utiliza wechat pay, se muestra un c\u00f3digo QR con el enlace de wechat pay en la p\u00e1gina de pago, alojada en el dominio de casdoor. Esta p\u00e1gina toma un par\u00e1metro de consulta de la URL SuccessUrl y redirige al usuario a esa URL despu\u00e9s de una compra exitosa. Debido a que el usuario no tiene motivos para pensar que la p\u00e1gina de pago contiene informaci\u00f3n confidencial, puede compartirla con otros o puede sufrir ingenier\u00eda social para enviarla a otros. Luego, un atacante puede crear el enlace casdoor con una URL especial y envi\u00e1rselo de vuelta al usuario, y una vez que se haya realizado el pago, se produce un ataque XSS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41659.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41659.json index 1fe11f3bca1..f1f2cd0b914 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41659.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41659", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T20:15:08.207", - "lastModified": "2024-08-20T20:15:08.207", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account." + }, + { + "lang": "es", + "value": "Memos es un servicio de toma de notas liviano y que prioriza la privacidad. Existe una configuraci\u00f3n incorrecta de CORS en memos 0.20.1 y versiones anteriores donde se refleja un origen arbitrario con Access-Control-Allow-Credentials establecido en verdadero. Esto puede permitir que un sitio web atacante realice una solicitud de origen cruzado, lo que le permite leer informaci\u00f3n privada o realizar cambios privilegiados en el sistema como cuenta de usuario vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41773.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41773.json index ef4f18f832f..0839c2518e0 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41773.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41773.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41773", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-20T20:15:08.423", - "lastModified": "2024-08-20T20:15:08.423", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Global Configuration Management 7.0.2 and 7.0.3 could allow an authenticated user to archive a global baseline due to improper access controls." + }, + { + "lang": "es", + "value": "IBM Global Configuration Management 7.0.2 y 7.0.3 podr\u00eda permitir que un usuario autenticado archive una l\u00ednea base global debido a controles de acceso inadecuados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json index 4ddaf807307..0d91b04da1f 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json @@ -2,20 +2,80 @@ "id": "CVE-2024-42006", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T14:15:09.540", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:26:54.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Keyfactor AWS Orchestrator through 2.0 allows Information Disclosure." + }, + { + "lang": "es", + "value": "Keyfactor AWS Orchestrator hasta 2.0 permite la divulgaci\u00f3n de informaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keyfactor:aws_orchestrator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.01", + "matchCriteriaId": "CEB8148F-5A42-4500-9781-DCBB7E9A32F3" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json index 82e43c339ff..c877f7bf8da 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42335.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42335", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T13:15:05.317", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:49:19.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "7Twenty - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + }, + { + "lang": "es", + "value": "7Twenty - CWE-79: Neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\"Cross-site Scripting\")" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -47,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:7-twenty:bot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17379E5F-4B89-4197-ACF8-BED7023CBAAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42361.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42361.json index 36471a603b6..d47fddf783c 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42361.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42361.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42361", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:14.120", - "lastModified": "2024-08-20T21:15:14.120", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hertzbeat is an open source, real-time monitoring system. Hertzbeat 1.6.0 and earlier declares a /api/monitor/{monitorId}/metric/{metricFull} endpoint to download job metrics. In the process, it executes a SQL query with user-controlled data, allowing for SQL injection." + }, + { + "lang": "es", + "value": "Hertzbeat es un sistema de monitoreo en tiempo real de c\u00f3digo abierto. Hertzbeat 1.6.0 y versiones anteriores declaran un endpoint /api/monitor/{monitorId}/metric/{metricFull} para descargar m\u00e9tricas de trabajo. En el proceso, ejecuta una consulta SQL con datos controlados por el usuario, lo que permite la inyecci\u00f3n de SQL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42362.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42362.json index 476e4e61bdc..9385f36f233 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42362.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42362.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42362", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:14.333", - "lastModified": "2024-08-20T21:15:14.333", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0." + }, + { + "lang": "es", + "value": "Hertzbeat es un sistema de monitoreo en tiempo real de c\u00f3digo abierto. Hertzbeat tiene un RCE autenticado (rol de usuario) mediante una deserializaci\u00f3n insegura en /api/monitors/import. Esta vulnerabilidad se solucion\u00f3 en 1.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42363.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42363.json index 07ff65c9671..c25b3f4a284 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42363.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42363.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42363", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:14.543", - "lastModified": "2024-08-20T21:15:14.543", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385." + }, + { + "lang": "es", + "value": "Antes de 3385, el par\u00e1metro de rol controlado por el usuario ingresa a la aplicaci\u00f3n en Kubernetes::RoleVerificationsController. El par\u00e1metro de rol fluye hacia el inicializador RoleConfigFile y luego hacia el m\u00e9todo Kubernetes::Util.parse_file donde se deserializa de forma insegura mediante el m\u00e9todo YAML.load_stream. Este problema puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE). Esta vulnerabilidad se soluciona en 3385." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json index 90c27c8c0e2..b6480abd7f2 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42566.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42566", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.443", - "lastModified": "2024-08-20T18:35:08.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:47:05.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the password parameter at login.php" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de contrase\u00f1a en login.php" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/95a8f0d24f1d409a14df4c04e0a8c547", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json index 0d48f52c239..9756ce202c4 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42567.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42567", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.540", - "lastModified": "2024-08-20T18:35:09.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:46:48.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the sid parameter at /search.php?action=2." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sid en /search.php?action=2." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json index 4d8e613c8ed..84f77b14227 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json @@ -2,20 +2,81 @@ "id": "CVE-2024-42568", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.643", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:46:29.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the transport parameter at vehicle.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de transporte en vehicle.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json index 0f403d68a3c..cf1938d144d 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42570.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42570", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.830", - "lastModified": "2024-08-20T18:35:10.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:46:00.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at admininsert.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit bae5aa de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro medio en admininsert.php." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/1d9ebca101fc5e30040436d70e522102", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json index 5224710b406..82c4cf9d9d2 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42572.json @@ -2,20 +2,81 @@ "id": "CVE-2024-42572", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.007", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:44:58.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at unitmarks.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro medio en unitmarks.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/c4c9508b8b3ed11f098f716d46572295", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json index ed734afc66b..c20fe850a79 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json @@ -2,20 +2,81 @@ "id": "CVE-2024-42573", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.097", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:44:48.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at dtmarks.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro medio en dtmarks.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/d44aabca29c1a6a9845fde465b924e79", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json index d261908c7c8..23bced1162c 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42574.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42574", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.193", - "lastModified": "2024-08-20T21:35:05.983", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:44:39.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at attendance.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro medio en attendance.php." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json index 70dff2f1109..8f6355acda1 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42575.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42575", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.283", - "lastModified": "2024-08-20T18:35:11.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:43:06.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at substaff.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de School Management System bae5aa conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro medio en substaff.php." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arajajyothibabu:school_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-06-20", + "matchCriteriaId": "98CEDB6F-0D88-4FA7-8DE0-114F4080633A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json index ff5975b3f50..e092650bb09 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42577.json @@ -2,20 +2,80 @@ "id": "CVE-2024-42577", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.477", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:39:36.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component add_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente add_product.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/20ad7b251f2905db38e7a6566b1d46cc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json index 66e7c2675ca..71c19c80989 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42579.json @@ -2,20 +2,80 @@ "id": "CVE-2024-42579", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.687", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:39:19.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component add_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente add_group.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json index 874b9e05243..0bf5454e7b8 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42580.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42580", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.793", - "lastModified": "2024-08-20T19:35:11.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:39:07.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component edit_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente edit_group.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json index 57cf327bd1e..90161382076 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42581.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42581", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.890", - "lastModified": "2024-08-20T21:35:07.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:38:50.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component delete_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente delete_group.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json index 25cb7d565a1..183e96643b1 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42582.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42582", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.987", - "lastModified": "2024-08-20T18:35:13.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:38:36.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component delete_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente delete_categorie.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json index 99f86f26f1d..e246ed46996 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42583.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42583", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.077", - "lastModified": "2024-08-20T18:35:14.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:38:19.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente delete_user.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json index b0ddd05bc0b..84cb42f5c04 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42584.json @@ -2,20 +2,80 @@ "id": "CVE-2024-42584", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:09.173", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:37:57.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in the component delete_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Una Cross-Site Request Forgery (CSRF) en el componente delete_product.php de Warehouse Inventory System v2.0 permite a los atacantes escalar privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6228DEE1-8E9A-4EC8-9796-41C85AE4F6EA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/6037eaac5749430c29cf15fdd9df0ba5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json index 6705db0420f..f66528cd838 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42598", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T16:15:11.727", - "lastModified": "2024-08-20T16:15:11.727", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_editplayer.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges." + }, + { + "lang": "es", + "value": "SeaCMS 13.0 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. La raz\u00f3n de esta vulnerabilidad es que, aunque admin_editplayer.php impone restricciones a los archivos editados, los atacantes a\u00fan pueden eludir estas restricciones y escribir c\u00f3digo, lo que permite a los atacantes autenticados explotar la vulnerabilidad para ejecutar comandos arbitrarios y obtener privilegios del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json index e9c2484c1f6..3683ad33923 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42603.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42603", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:21.857", - "lastModified": "2024-08-20T19:35:12.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:21:56.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=clearall" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_backup.php?dobackup=clearall" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/10/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json index ebff8038591..dc1de39277a 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42604.json @@ -2,20 +2,79 @@ "id": "CVE-2024-42604", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:21.940", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:12:50.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_group.php?mode=delete&group_id=3" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/1/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json index c95e43cfe8d..61da0c4ccf4 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42605.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42605", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.020", - "lastModified": "2024-08-20T18:35:15.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:12:40.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/edit_page.php?link_id=1" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/edit_page.php?link_id=1" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/3/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json index 052d943b9dd..beea4dc89c1 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42606.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42606", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.100", - "lastModified": "2024-08-20T18:35:16.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:12:27.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_log.php?clear=1" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_log.php?clear=1" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/6/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json index c1c80e0e0a3..7499436121c 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42607.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42607", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.213", - "lastModified": "2024-08-20T18:35:18.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:12:16.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=database" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_backup.php?dobackup=database" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/9/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json index 4d8c33d1e5d..43ed296a585 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42609.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42609", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.357", - "lastModified": "2024-08-20T21:35:08.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:12:03.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=avatars" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_backup.php?dobackup=avatars" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/8/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json index 5aa0d8910ad..733e11fb41e 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42610.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42610", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.437", - "lastModified": "2024-08-20T18:35:19.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:11:37.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=files" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_backup.php?dobackup=files" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/7/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json index 832af770b3f..6c120246a39 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42611.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42611", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.517", - "lastModified": "2024-08-20T16:35:34.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:11:27.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/admin_page.php?link_id=1&mode=delete" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 conten\u00eda una Cross-Site Request Forgery (CSRF) a trav\u00e9s de admin/admin_page.php?link_id=1&mode=delete" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/4/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42612.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42612.json index 71db14f4352..c55643874ff 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42612.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42612.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42612", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T18:15:09.660", - "lastModified": "2024-08-20T18:15:09.660", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/domain_management.php?whitelist_add" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/domain_management.php?whitelist_add" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json index 3a7f6a09399..4bccd836654 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42613.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42613", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.600", - "lastModified": "2024-08-20T18:35:20.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:11:06.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=install&widget=akismet" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_widgets.php?action=install&widget=akismet" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/14/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json index c2b887191ce..6170b9b5d6b 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json @@ -2,20 +2,79 @@ "id": "CVE-2024-42616", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.690", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:10:56.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=remove&widget=Statistics" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_widgets.php?action=remove&widget=Statistics" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json index 321992b5ca7..df23d48d442 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42617.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42617", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.777", - "lastModified": "2024-08-20T16:35:35.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:09:48.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_config.php?action=save&var_id=32" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_config.php?action=save&var_id=32" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json index c5df0780aa4..302c1074630 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42618.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42618", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.853", - "lastModified": "2024-08-20T18:35:22.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T13:09:33.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /module.php?module=karma" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /module.php?module=karma" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/16/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42619.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42619.json index 0b38a18d227..5f5f533318f 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42619.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42619.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42619", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T19:15:11.430", - "lastModified": "2024-08-20T19:35:14.070", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/domain_management.php?id=0&list=whitelist&remove=pligg.com" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/domain_management.php?id=0&list=whitelist&remove=pligg.com" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json index 7f4fb194ad2..e17e1c9053c 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42621.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42621", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.933", - "lastModified": "2024-08-20T18:35:23.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T12:50:32.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_editor.php" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Pligg CMS v2.0.2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/admin_editor.php" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jinwu1234567890/cms2/tree/main/12/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42919.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42919.json index 19ad2719910..cadc9a3638c 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42919.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42919.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42919", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T17:15:19.463", - "lastModified": "2024-08-20T17:15:19.463", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "eScan Management Console 14.0.1400.2281 is vulnerable to Incorrect Access Control via acteScanAVReport." + }, + { + "lang": "es", + "value": "eScan Management Console 14.0.1400.2281 es vulnerable a un control de acceso incorrecto a trav\u00e9s de acteScanAVReport." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42939.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42939.json index 5c34c9f085d..f67a0a561d0 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42939.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42939.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42939", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T05:15:14.920", - "lastModified": "2024-08-21T05:15:14.920", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component /index/index.html of YZNCMS v1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the configured remarks text field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente /index/index.html de YZNCMS v1.4.2 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto de comentarios configurado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json index a7afdfb09da..e5ba27ae95f 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json @@ -2,17 +2,41 @@ "id": "CVE-2024-43379", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T15:15:08.683", - "lastModified": "2024-08-19T18:36:20.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:37:22.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed. The vulnerability has been resolved in TruffleHog v3.81.9 and later versions." + }, + { + "lang": "es", + "value": "TruffleHog es una herramienta de escaneo de secretos. Antes de la versi\u00f3n 3.81.9, esta vulnerabilidad permit\u00eda a un actor malintencionado crear datos de una manera que, cuando los escaneaban detectores espec\u00edficos, pod\u00eda hacer que el detector realizara una solicitud no autorizada a un endpoint elegido por el atacante. Para que un exploit sea efectivo, el endpoint de destino debe ser un endpoint GET no autenticado que produzca efectos secundarios. La v\u00edctima debe escanear los datos creados con fines malintencionados y tener como objetivo un endpoint para que el exploit tenga \u00e9xito. La vulnerabilidad se resolvi\u00f3 en TruffleHog v3.81.9 y versiones posteriores." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trufflesecurity:trufflehog:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.81.9", + "matchCriteriaId": "A8E36EEB-5EF4-4F6D-9BE2-74CB249F0B8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/trufflesecurity/trufflehog/commit/fe5624c70923355128868cffd647b6e2cfe11443", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/trufflesecurity/trufflehog/security/advisories/GHSA-3r74-v83p-f4f4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json index 69999c74102..aceda55e140 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json @@ -2,17 +2,41 @@ "id": "CVE-2024-43380", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T15:15:08.893", - "lastModified": "2024-08-19T18:36:20.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:38:00.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "fugit contains time tools for flor and the floraison group. The fugit \"natural\" parser, that turns \"every wednesday at 5pm\" into \"0 17 * * 3\", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight. Fugit dependents that do not check (user) input length for plausibility are impacted. A fix was released in fugit 1.11.1." + }, + { + "lang": "es", + "value": "fugit contiene herramientas de tiempo para flor y el grupo floraison. El analizador \"natural\" fugit, que convierte \"todos los mi\u00e9rcoles a las 5 p.m.\" en \"0 17 * * 3\", acept\u00f3 cualquier longitud de entrada y continu\u00f3 intentando analizarla, sin regresar r\u00e1pidamente, como se esperaba. La llamada de an\u00e1lisis podr\u00eda mantener el hilo sin un final a la vista. Los dependientes de Fugit que no verifican la plausibilidad de la longitud de entrada (del usuario) se ven afectados. Se public\u00f3 una soluci\u00f3n en fugit 1.11.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:floraison:fugit:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "1.11.1", + "matchCriteriaId": "7FA5151C-7CD2-4FC9-B141-F5BF715E5592" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/floraison/fugit/commit/ad2c1c9c737213d585fff0b51c927d178b2c05a5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/floraison/fugit/issues/104", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/floraison/fugit/security/advisories/GHSA-2m96-52r3-2f3g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json index d0aeeb63b02..9e504b84f08 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43396", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:14.897", - "lastModified": "2024-08-20T21:15:14.897", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Khoj is an application that creates personal AI agents. The Automation feature allows a user to insert arbitrary HTML inside the task instructions, resulting in a Stored XSS. The q parameter for the /api/automation endpoint does not get correctly sanitized when rendered on the page, resulting in the ability of users to inject arbitrary HTML/JS. This vulnerability is fixed in 1.15.0." + }, + { + "lang": "es", + "value": "Khoj es una aplicaci\u00f3n que crea agentes personales de IA. La funci\u00f3n de Automatizaci\u00f3n permite al usuario insertar HTML arbitrario dentro de las instrucciones de la tarea, lo que da como resultado un XSS almacenado. El par\u00e1metro q para el endpoint /api/automation no se desinfecta correctamente cuando se representa en la p\u00e1gina, lo que da como resultado la capacidad de los usuarios de inyectar HTML/JS arbitrario. Esta vulnerabilidad se solucion\u00f3 en 1.15.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43403.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43403.json index b7ec52a6db6..5fc12a9ba19 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43403.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43403.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43403", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T22:15:04.703", - "lastModified": "2024-08-20T22:15:04.703", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kanister is a data protection workflow management tool. The kanister has a deployment called default-kanister-operator, which is bound with a ClusterRole called edit via ClusterRoleBinding. The \"edit\" ClusterRole is one of Kubernetes default-created ClusterRole, and it has the create/patch/udpate verbs of daemonset resources, create verb of serviceaccount/token resources, and impersonate verb of serviceaccounts resources. A malicious user can leverage access the worker node which has this component to make a cluster-level privilege escalation." + }, + { + "lang": "es", + "value": "Kanister es una herramienta de gesti\u00f3n del flujo de trabajo de protecci\u00f3n de datos. El kanister tiene una implementaci\u00f3n llamada default-kanister-operator, que est\u00e1 vinculada con un ClusterRole llamado editar mediante ClusterRoleBinding. El ClusterRole \"editar\" es uno de los ClusterRole creados de forma predeterminada por Kubernetes y tiene los verbos de creaci\u00f3n/parche/actualizaci\u00f3n de recursos de daemonset, el verbo de creaci\u00f3n de recursos de cuenta de servicio/token y el verbo de suplantaci\u00f3n de recursos de cuentas de servicio. Un usuario malintencionado puede aprovechar el acceso al nodo trabajador que tiene este componente para realizar una escalada de privilegios a nivel de cl\u00faster." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43408.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43408.json index c3170e539bc..a7167f41b3b 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43408.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43408.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43408", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T17:15:19.550", - "lastModified": "2024-08-20T17:15:19.550", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse Placeholder Forms will let you build dynamic documentation. Unsanitized and stored user input was injected in the html of the post. The vulnerability is fixed in commit a62f711d5600e4e5d86f342d52932cb6221672e7." + }, + { + "lang": "es", + "value": "Discourse Placeholder Forms le permitir\u00e1n crear documentaci\u00f3n din\u00e1mica. Se inyectaron entradas de usuario almacenadas y no desinfectadas en el html de la publicaci\u00f3n. La vulnerabilidad se soluciona en el commit a62f711d5600e4e5d86f342d52932cb6221672e7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43861.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43861.json index 914810a2baf..42c72afa73a 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43861.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43861.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-20T22:15:04.917", - "lastModified": "2024-08-20T22:15:04.917", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: qmi_wwan: fix memory leak for not ip packets\n\nFree the unused skb when not ip packets arrive." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net:usb:qmi_wwan: repara la p\u00e9rdida de memoria para paquetes que no son ip Libera el skb no utilizado cuando no llegan paquetes ip." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43862.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43862.json index 671c5c55d7b..d1f98d2a7d7 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43862.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43862.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43862", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:04.773", - "lastModified": "2024-08-21T00:15:04.773", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wan: fsl_qmc_hdlc: Convert carrier_lock spinlock to a mutex\n\nThe carrier_lock spinlock protects the carrier detection. While it is\nheld, framer_get_status() is called which in turn takes a mutex.\nThis is not correct and can lead to a deadlock.\n\nA run with PROVE_LOCKING enabled detected the issue:\n [ BUG: Invalid wait context ]\n ...\n c204ddbc (&framer->mutex){+.+.}-{3:3}, at: framer_get_status+0x40/0x78\n other info that might help us debug this:\n context-{4:4}\n 2 locks held by ifconfig/146:\n #0: c0926a38 (rtnl_mutex){+.+.}-{3:3}, at: devinet_ioctl+0x12c/0x664\n #1: c2006a40 (&qmc_hdlc->carrier_lock){....}-{2:2}, at: qmc_hdlc_framer_set_carrier+0x30/0x98\n\nAvoid the spinlock usage and convert carrier_lock to a mutex." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: wan: fsl_qmc_hdlc: convierte el spinlock de Carrier_lock en un mutex El spinlock de Carrier_lock protege la detecci\u00f3n del operador. Mientras se mantiene, se llama a framer_get_status(), que a su vez toma un mutex. Esto no es correcto y puede llevar a un punto muerto. Una ejecuci\u00f3n con PROVE_LOCKING habilitado detect\u00f3 el problema: [ERROR: Contexto de espera no v\u00e1lido] ... c204ddbc (&framer->mutex){+.+.}-{3:3}, en: framer_get_status+0x40/0x78 otra informaci\u00f3n que podr\u00eda ay\u00fadenos a depurar esto: contexto-{4:4} 2 bloqueos retenidos por ifconfig/146: #0: c0926a38 (rtnl_mutex){+.+.}-{3:3}, en: devinet_ioctl+0x12c/0x664 #1: c2006a40 (&qmc_hdlc->carrier_lock){....}-{2:2}, en: qmc_hdlc_framer_set_carrier+0x30/0x98 Evite el uso de spinlock y convierta carrier_lock en un mutex." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43863.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43863.json index 015eb9066f3..64612acf666 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43863.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43863.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43863", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:04.847", - "lastModified": "2024-08-21T00:15:04.847", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\n\nIntroduce a version of the fence ops that on release doesn't remove\nthe fence from the pending list, and thus doesn't require a lock to\nfix poll->fence wait->fence unref deadlocks.\n\nvmwgfx overwrites the wait callback to iterate over the list of all\nfences and update their status, to do that it holds a lock to prevent\nthe list modifcations from other threads. The fence destroy callback\nboth deletes the fence and removes it from the list of pending\nfences, for which it holds a lock.\n\ndma buf polling cb unrefs a fence after it's been signaled: so the poll\ncalls the wait, which signals the fences, which are being destroyed.\nThe destruction tries to acquire the lock on the pending fences list\nwhich it can never get because it's held by the wait from which it\nwas called.\n\nOld bug, but not a lot of userspace apps were using dma-buf polling\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: soluciona un punto muerto en el sondeo de valla de dma buf. Introduce una versi\u00f3n de las operaciones de valla que, al lanzarse, no elimina la valla de la lista de pendientes y, por tanto, no requiere un bloqueo para arreglar los puntos muertos de encuesta->espera de valla->cerca sin referencia. vmwgfx sobrescribe la devoluci\u00f3n de llamada de espera para iterar sobre la lista de todas las barreras y actualizar su estado; para ello, mantiene un bloqueo para evitar que otros subprocesos modifiquen la lista. La devoluci\u00f3n de llamada de destrucci\u00f3n de valla elimina la valla y la elimina de la lista de vallas pendientes, para las cuales mantiene un bloqueo. dma buf polling cb desrefs una valla despu\u00e9s de haber sido se\u00f1alada: entonces la encuesta llama a la espera, lo que se\u00f1ala las vallas que est\u00e1n siendo destruidas. La destrucci\u00f3n intenta adquirir el bloqueo en la lista de vallas pendientes que nunca puede conseguir porque est\u00e1 retenido por la espera desde la que fue llamado. Error antiguo, pero no muchas aplicaciones de espacio de usuario usaban interfaces de sondeo dma-buf. Solucionarlos, en particular esto soluciona los bloqueos/bloqueos de KDE." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43864.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43864.json index 5b923b00316..6d2c69be026 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43864.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43864.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43864", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:04.910", - "lastModified": "2024-08-21T00:15:04.910", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix CT entry update leaks of modify header context\n\nThe cited commit allocates a new modify header to replace the old\none when updating CT entry. But if failed to allocate a new one, eg.\nexceed the max number firmware can support, modify header will be\nan error pointer that will trigger a panic when deallocating it. And\nthe old modify header point is copied to old attr. When the old\nattr is freed, the old modify header is lost.\n\nFix it by restoring the old attr to attr when failed to allocate a\nnew modify header context. So when the CT entry is freed, the right\nmodify header context will be freed. And the panic of accessing\nerror pointer is also fixed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: corrige las fugas de actualizaci\u00f3n de la entrada CT del contexto del encabezado de modificaci\u00f3n. El commit citada asigna un nuevo encabezado de modificaci\u00f3n para reemplazar el anterior al actualizar la entrada CT. Pero si no se pudo asignar uno nuevo, por ejemplo. Si excede el n\u00famero m\u00e1ximo que el firmware puede admitir, modificar el encabezado ser\u00e1 un indicador de error que provocar\u00e1 p\u00e1nico al desasignarlo. Y el punto de encabezado de modificaci\u00f3n anterior se copia al atributo anterior. Cuando se libera el antiguo atributo, el antiguo encabezado de modificaci\u00f3n se pierde. Solucionelo restaurando el antiguo atributo a attr cuando no se pudo asignar un nuevo contexto de encabezado de modificaci\u00f3n. Entonces, cuando se libera la entrada CT, se liberar\u00e1 el contexto del encabezado de modificaci\u00f3n derecho. Y el p\u00e1nico al acceder al puntero de error tambi\u00e9n se soluciona." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43865.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43865.json index 7f8dee13da7..83d56e6e630 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43865.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43865.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43865", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:04.967", - "lastModified": "2024-08-21T00:15:04.967", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/fpu: Re-add exception handling in load_fpu_state()\n\nWith the recent rewrite of the fpu code exception handling for the\nlfpc instruction within load_fpu_state() was erroneously removed.\n\nAdd it again to prevent that loading invalid floating point register\nvalues cause an unhandled specification exception." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/fpu: volver a agregar el manejo de excepciones en load_fpu_state() Con la reciente reescritura del c\u00f3digo fpu, el manejo de excepciones para la instrucci\u00f3n lfpc dentro de load_fpu_state() se elimin\u00f3 err\u00f3neamente. Agr\u00e9guelo nuevamente para evitar que la carga de valores de registro de coma flotante no v\u00e1lidos provoque una excepci\u00f3n de especificaci\u00f3n no controlada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43866.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43866.json index ce92aeb665d..12c80ef0a45 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43866.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43866.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43866", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:05.023", - "lastModified": "2024-08-21T00:15:05.023", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Always drain health in shutdown callback\n\nThere is no point in recovery during device shutdown. if health\nwork started need to wait for it to avoid races and NULL pointer\naccess.\n\nHence, drain health WQ on shutdown callback." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: siempre drena el estado al apagar la devoluci\u00f3n de llamada. No tiene sentido la recuperaci\u00f3n durante el apagado del dispositivo. si comenz\u00f3 el trabajo de salud, debe esperar para evitar ejecuciones y acceso al puntero NULL. Por lo tanto, drene el WQ de salud al cerrar la devoluci\u00f3n de llamada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43867.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43867.json index 38fcf7d8692..fc76dd26cc5 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43867.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43867.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43867", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:05.087", - "lastModified": "2024-08-21T00:15:05.087", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: prime: fix refcount underflow\n\nCalling nouveau_bo_ref() on a nouveau_bo without initializing it (and\nhence the backing ttm_bo) leads to a refcount underflow.\n\nInstead of calling nouveau_bo_ref() in the unwind path of\ndrm_gem_object_init(), clean things up manually.\n\n(cherry picked from commit 1b93f3e89d03cfc576636e195466a0d728ad8de5)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau: prime: corrige el desbordamiento insuficiente de refcount Llamar a nouveau_bo_ref() en un nouveau_bo sin inicializarlo (y por lo tanto el ttm_bo de respaldo) conduce a un desbordamiento insuficiente de refcount. En lugar de llamar a nouveau_bo_ref() en la ruta de desenredado de drm_gem_object_init(), limpie las cosas manualmente. (cereza escogida del commit 1b93f3e89d03cfc576636e195466a0d728ad8de5)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43868.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43868.json index a4165dbbf2f..658071917c7 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43868.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43868.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43868", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T00:15:05.150", - "lastModified": "2024-08-21T00:15:05.150", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/purgatory: align riscv_kernel_entry\n\nWhen alignment handling is delegated to the kernel, everything must be\nword-aligned in purgatory, since the trap handler is then set to the\nkexec one. Without the alignment, hitting the exception would\nultimately crash. On other occasions, the kernel's handler would take\ncare of exceptions.\nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating\nunaligned access exceptions and the kernel configured to handle them." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv/purgatory: align riscv_kernel_entry Cuando el manejo de la alineaci\u00f3n se delega al kernel, todo debe estar alineado por palabras en el purgatorio, ya que el controlador de trampas se establece en kexec. Sin la alineaci\u00f3n, alcanzar la excepci\u00f3n finalmente fallar\u00eda. En otras ocasiones, el controlador del kernel se encargar\u00eda de las excepciones. Esto se prob\u00f3 en un SoC JH7110 con oreboot y su SBI que delegaba excepciones de acceso no alineadas y el kernel configurado para manejarlas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43869.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43869.json index a532d0c3312..92a34575a79 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43869.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43869.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43869", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.550", - "lastModified": "2024-08-21T01:15:11.550", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: Fix event leak upon exec and file release\n\nThe perf pending task work is never waited upon the matching event\nrelease. In the case of a child event, released via free_event()\ndirectly, this can potentially result in a leaked event, such as in the\nfollowing scenario that doesn't even require a weak IRQ work\nimplementation to trigger:\n\nschedule()\n prepare_task_switch()\n=======> \n perf_event_overflow()\n event->pending_sigtrap = ...\n irq_work_queue(&event->pending_irq)\n<======= \n perf_event_task_sched_out()\n event_sched_out()\n event->pending_sigtrap = 0;\n atomic_long_inc_not_zero(&event->refcount)\n task_work_add(&event->pending_task)\n finish_lock_switch()\n=======> \n perf_pending_irq()\n //do nothing, rely on pending task work\n<======= \n\nbegin_new_exec()\n perf_event_exit_task()\n perf_event_exit_event()\n // If is child event\n free_event()\n WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1)\n // event is leaked\n\nSimilar scenarios can also happen with perf_event_remove_on_exec() or\nsimply against concurrent perf_event_release().\n\nFix this with synchonizing against the possibly remaining pending task\nwork while freeing the event, just like is done with remaining pending\nIRQ work. This means that the pending task callback neither need nor\nshould hold a reference to the event, preventing it from ever beeing\nfreed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: perf: corrige la fuga de eventos al liberar el archivo y el ejecutable. El trabajo de la tarea pendiente de rendimiento nunca se espera hasta que se libere el evento correspondiente. En el caso de un evento secundario, publicado directamente a trav\u00e9s de free_event(), esto puede potencialmente resultar en un evento filtrado, como en el siguiente escenario que ni siquiera requiere una implementaci\u00f3n de trabajo IRQ d\u00e9bil para activarse: Schedule() prepare_task_switch() =======> perf_event_overflow() evento->pending_sigtrap = ... irq_work_queue(&event->pending_irq) <======= perf_event_task_sched_out() event_sched_out() evento-> pendiente_sigtrap = 0; atomic_long_inc_not_zero(&event->refcount) task_work_add(&event->pending_task) Finish_lock_switch() =======> perf_pending_irq() //no hacer nada, confiar en el trabajo de la tarea pendiente <======= < /IRQ> comenzar_new_exec() perf_event_exit_task() perf_event_exit_event() // Si es un evento secundario free_event() WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1) // el evento se filtr\u00f3 Tambi\u00e9n pueden ocurrir escenarios similares con perf_event_remove_on_exec () o simplemente contra perf_event_release() concurrente. Solucione este problema sincronizando con el trabajo de tarea pendiente posiblemente restante mientras se libera el evento, tal como se hace con el trabajo de IRQ pendiente restante. Esto significa que la devoluci\u00f3n de llamada de la tarea pendiente no necesita ni debe contener una referencia al evento, lo que impide que se libere." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43870.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43870.json index 62e0a8b1bb3..eb44e75227e 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43870.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43870.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43870", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.620", - "lastModified": "2024-08-21T01:15:11.620", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: Fix event leak upon exit\n\nWhen a task is scheduled out, pending sigtrap deliveries are deferred\nto the target task upon resume to userspace via task_work.\n\nHowever failures while adding an event's callback to the task_work\nengine are ignored. And since the last call for events exit happen\nafter task work is eventually closed, there is a small window during\nwhich pending sigtrap can be queued though ignored, leaking the event\nrefcount addition such as in the following scenario:\n\n TASK A\n -----\n\n do_exit()\n exit_task_work(tsk);\n\n \n perf_event_overflow()\n event->pending_sigtrap = pending_id;\n irq_work_queue(&event->pending_irq);\n \n =========> PREEMPTION: TASK A -> TASK B\n event_sched_out()\n event->pending_sigtrap = 0;\n atomic_long_inc_not_zero(&event->refcount)\n // FAILS: task work has exited\n task_work_add(&event->pending_task)\n [...]\n \n perf_pending_irq()\n // early return: event->oncpu = -1\n \n [...]\n =========> TASK B -> TASK A\n perf_event_exit_task(tsk)\n perf_event_exit_event()\n free_event()\n WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1)\n // leak event due to unexpected refcount == 2\n\nAs a result the event is never released while the task exits.\n\nFix this with appropriate task_work_add()'s error handling." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: perf: corrige la fuga de eventos al salir Cuando se programa una tarea, las entregas de sigtrap pendientes se difieren a la tarea de destino al reanudarse en el espacio de usuario a trav\u00e9s de task_work. Sin embargo, se ignoran los fallos al agregar la devoluci\u00f3n de llamada de un evento al motor task_work. Y dado que la \u00faltima llamada para la salida de eventos ocurre despu\u00e9s de que finalmente se cierra el trabajo de la tarea, hay una peque\u00f1a ventana durante la cual el sigtrap pendiente se puede poner en cola aunque se ignore, lo que filtra la adici\u00f3n del recuento de eventos, como en el siguiente escenario: TAREA A ----- do_exit() salida_task_work(tsk); perf_event_overflow() evento->pending_sigtrap = pendiente_id; irq_work_queue(&event->pending_irq); =========> PREEMPCI\u00d3N: TAREA A -> TAREA B event_sched_out() evento->pending_sigtrap = 0; atomic_long_inc_not_zero(&event->refcount) // FALLA: el trabajo de la tarea ha salido task_work_add(&event->pending_task) [...] perf_pending_irq() // retorno temprano: evento->oncpu = -1 [...] =========> TAREA B -> TAREA A perf_event_exit_task(tsk) perf_event_exit_event() free_event() WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1) / /evento de fuga debido a un recuento inesperado == 2 Como resultado, el evento nunca se libera mientras la tarea finaliza. Solucione este problema con el manejo de errores apropiado de task_work_add()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43871.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43871.json index 3005f75e489..28a71dc784f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43871.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43871.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43871", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.680", - "lastModified": "2024-08-21T01:15:11.680", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevres: Fix memory leakage caused by driver API devm_free_percpu()\n\nIt will cause memory leakage when use driver API devm_free_percpu()\nto free memory allocated by devm_alloc_percpu(), fixed by using\ndevres_release() instead of devres_destroy() within devm_free_percpu()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: devres: corrige la p\u00e9rdida de memoria causada por la API del controlador devm_free_percpu(). Causar\u00e1 una p\u00e9rdida de memoria cuando se usa la API del controlador devm_free_percpu() para liberar la memoria asignada por devm_alloc_percpu(), solucionada usando devres_release( ) en lugar de devres_destroy() dentro de devm_free_percpu()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43872.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43872.json index f1195995a18..697eaa3b13c 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43872.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43872.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43872", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.740", - "lastModified": "2024-08-21T01:15:11.740", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix soft lockup under heavy CEQE load\n\nCEQEs are handled in interrupt handler currently. This may cause the\nCPU core staying in interrupt context too long and lead to soft lockup\nunder heavy load.\n\nHandle CEQEs in BH workqueue and set an upper limit for the number of\nCEQE handled by a single call of work handler." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/hns: corrige el bloqueo suave bajo carga pesada de CEQE. Actualmente, los CEQE se manejan en el controlador de interrupciones. Esto puede hacer que el n\u00facleo de la CPU permanezca en el contexto de interrupci\u00f3n durante demasiado tiempo y provocar un bloqueo suave bajo una carga pesada. Maneje CEQE en la cola de trabajo de BH y establezca un l\u00edmite superior para la cantidad de CEQE manejados por una sola llamada de controlador de trabajo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43873.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43873.json index 247bc9d6780..68ac5af4f28 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43873.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43873.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43873", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.790", - "lastModified": "2024-08-21T01:15:11.790", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost/vsock: always initialize seqpacket_allow\n\nThere are two issues around seqpacket_allow:\n1. seqpacket_allow is not initialized when socket is\n created. Thus if features are never set, it will be\n read uninitialized.\n2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,\n then seqpacket_allow will not be cleared appropriately\n (existing apps I know about don't usually do this but\n it's legal and there's no way to be sure no one relies\n on this).\n\nTo fix:\n\t- initialize seqpacket_allow after allocation\n\t- set it unconditionally in set_features" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vhost/vsock: inicializar siempre seqpacket_allow Hay dos problemas relacionados con seqpacket_allow: 1. seqpacket_allow no se inicializa cuando se crea el socket. Por lo tanto, si las funciones nunca se configuran, se leer\u00e1 sin inicializar. 2. Si VIRTIO_VSOCK_F_SEQPACKET est\u00e1 configurado y luego borrado, entonces seqpacket_allow no se borrar\u00e1 apropiadamente (las aplicaciones existentes que conozco generalmente no hacen esto, pero es legal y no hay forma de estar seguro de que nadie conf\u00ede en esto). Para solucionarlo: - inicializar seqpacket_allow despu\u00e9s de la asignaci\u00f3n - configurarlo incondicionalmente en set_features" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43874.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43874.json index fd7ed737491..6d9bafb3c03 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43874.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43874.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43874", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.843", - "lastModified": "2024-08-21T01:15:11.843", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked\n\nFix a null pointer dereference induced by DEBUG_TEST_DRIVER_REMOVE.\nReturn from __sev_snp_shutdown_locked() if the psp_device or the\nsev_device structs are not initialized. Without the fix, the driver will\nproduce the following splat:\n\n ccp 0000:55:00.5: enabling device (0000 -> 0002)\n ccp 0000:55:00.5: sev enabled\n ccp 0000:55:00.5: psp enabled\n BUG: kernel NULL pointer dereference, address: 00000000000000f0\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI\n CPU: 262 PID: 1 Comm: swapper/0 Not tainted 6.9.0-rc1+ #29\n RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150\n Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83\n RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286\n RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2ea4014b808\n RBP: ffffb2ea4014b7e8 R08: 0000000000000106 R09: 000000000003d9c0\n R10: 0000000000000001 R11: ffffffffa39ff070 R12: ffff9e49d40590c8\n R13: 0000000000000000 R14: ffffb2ea4014b808 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff9e58b1e00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000000f0 CR3: 0000000418a3e001 CR4: 0000000000770ef0\n PKRU: 55555554\n Call Trace:\n \n ? __die_body+0x6f/0xb0\n ? __die+0xcc/0xf0\n ? page_fault_oops+0x330/0x3a0\n ? save_trace+0x2a5/0x360\n ? do_user_addr_fault+0x583/0x630\n ? exc_page_fault+0x81/0x120\n ? asm_exc_page_fault+0x2b/0x30\n ? __sev_snp_shutdown_locked+0x2e/0x150\n __sev_firmware_shutdown+0x349/0x5b0\n ? pm_runtime_barrier+0x66/0xe0\n sev_dev_destroy+0x34/0xb0\n psp_dev_destroy+0x27/0x60\n sp_destroy+0x39/0x90\n sp_pci_remove+0x22/0x60\n pci_device_remove+0x4e/0x110\n really_probe+0x271/0x4e0\n __driver_probe_device+0x8f/0x160\n driver_probe_device+0x24/0x120\n __driver_attach+0xc7/0x280\n ? driver_attach+0x30/0x30\n bus_for_each_dev+0x10d/0x130\n driver_attach+0x22/0x30\n bus_add_driver+0x171/0x2b0\n ? unaccepted_memory_init_kdump+0x20/0x20\n driver_register+0x67/0x100\n __pci_register_driver+0x83/0x90\n sp_pci_init+0x22/0x30\n sp_mod_init+0x13/0x30\n do_one_initcall+0xb8/0x290\n ? sched_clock_noinstr+0xd/0x10\n ? local_clock_noinstr+0x3e/0x100\n ? stack_depot_save_flags+0x21e/0x6a0\n ? local_clock+0x1c/0x60\n ? stack_depot_save_flags+0x21e/0x6a0\n ? sched_clock_noinstr+0xd/0x10\n ? local_clock_noinstr+0x3e/0x100\n ? __lock_acquire+0xd90/0xe30\n ? sched_clock_noinstr+0xd/0x10\n ? local_clock_noinstr+0x3e/0x100\n ? __create_object+0x66/0x100\n ? local_clock+0x1c/0x60\n ? __create_object+0x66/0x100\n ? parameq+0x1b/0x90\n ? parse_one+0x6d/0x1d0\n ? parse_args+0xd7/0x1f0\n ? do_initcall_level+0x180/0x180\n do_initcall_level+0xb0/0x180\n do_initcalls+0x60/0xa0\n ? kernel_init+0x1f/0x1d0\n do_basic_setup+0x41/0x50\n kernel_init_freeable+0x1ac/0x230\n ? rest_init+0x1f0/0x1f0\n kernel_init+0x1f/0x1d0\n ? rest_init+0x1f0/0x1f0\n ret_from_fork+0x3d/0x50\n ? rest_init+0x1f0/0x1f0\n ret_from_fork_asm+0x11/0x20\n \n Modules linked in:\n CR2: 00000000000000f0\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150\n Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83\n RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286\n RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000\n RDX: 0000000\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: ccp - Se corrige la desreferencia del puntero nulo en __sev_snp_shutdown_locked Se corrige la desreferencia del puntero nulo inducida por DEBUG_TEST_DRIVER_REMOVE. Regresa desde __sev_snp_shutdown_locked() si las estructuras psp_device o sev_device no est\u00e1n inicializadas. Sin la soluci\u00f3n, el controlador producir\u00e1 el siguiente s\u00edmbolo: ccp 0000:55:00.5: dispositivo de habilitaci\u00f3n (0000 -> 0002) ccp 0000:55:00.5: sev habilitado ccp 0000:55:00.5: psp habilitado ERROR: puntero NULL del kernel desreferencia, direcci\u00f3n: 00000000000000f0 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI CPU: 262 PID: 1 Comm: swapper /0 No contaminado 6.9.0-rc1+ #29 RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150 C\u00f3digo: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83 RSP: b8 EFLAGS: 00010286 RAX: 0000000000000000 RBX : ffff9e4acd2e0a28 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2ea4014b808 RBP: ffffb2ea4014b7e8 R08: 00000106 R09: 000000000003d9c0 R10: 0000000000000001 R11: ffffffffa39ff070 R12: ffff9e49d40590c8 R13: 0000000000000000 R14: ffffb2ea4014b808 R 15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff9e58b1e00000 (0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000f0 CR3: 0000000418a3e001 CR4: 70ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body+0x6f/0xb0 ? __die+0xcc/0xf0 ? page_fault_oops+0x330/0x3a0? save_trace+0x2a5/0x360? do_user_addr_fault+0x583/0x630? exc_page_fault+0x81/0x120? asm_exc_page_fault+0x2b/0x30? __sev_snp_shutdown_locked+0x2e/0x150 __sev_firmware_shutdown+0x349/0x5b0 ? pm_runtime_barrier+0x66/0xe0 sev_dev_destroy+0x34/0xb0 psp_dev_destroy+0x27/0x60 sp_destroy+0x39/0x90 sp_pci_remove+0x22/0x60 pci_device_remove+0x4e/0x110 Actually_probe+0x271/0x4 e0 __driver_probe_device+0x8f/0x160 driver_probe_device+0x24/0x120 __driver_attach+0xc7/0x280 ? driver_attach+0x30/0x30 bus_for_each_dev+0x10d/0x130 driver_attach+0x22/0x30 bus_add_driver+0x171/0x2b0? unaccepted_memory_init_kdump+0x20/0x20 driver_register+0x67/0x100 __pci_register_driver+0x83/0x90 sp_pci_init+0x22/0x30 sp_mod_init+0x13/0x30 do_one_initcall+0xb8/0x290 ? sched_clock_noinstr+0xd/0x10? local_clock_noinstr+0x3e/0x100? stack_depot_save_flags+0x21e/0x6a0? reloj_local+0x1c/0x60? stack_depot_save_flags+0x21e/0x6a0? sched_clock_noinstr+0xd/0x10? local_clock_noinstr+0x3e/0x100? __lock_acquire+0xd90/0xe30? sched_clock_noinstr+0xd/0x10? local_clock_noinstr+0x3e/0x100? __create_object+0x66/0x100? reloj_local+0x1c/0x60? __create_object+0x66/0x100? parameq+0x1b/0x90 ? parse_one+0x6d/0x1d0? parse_args+0xd7/0x1f0? do_initcall_level+0x180/0x180 do_initcall_level+0xb0/0x180 do_initcalls+0x60/0xa0 ? kernel_init+0x1f/0x1d0 do_basic_setup+0x41/0x50 kernel_init_freeable+0x1ac/0x230 ? rest_init+0x1f0/0x1f0 kernel_init+0x1f/0x1d0? rest_init+0x1f0/0x1f0 ret_from_fork+0x3d/0x50 ? rest_init+0x1f0/0x1f0 ret_from_fork_asm+0x11/0x20 M\u00f3dulos vinculados en: CR2: 00000000000000f0 ---[ seguimiento final 0000000000000000 ]--- RIP:__sev_snp_shutdown_locked+0x2e/0 x150 C\u00f3digo: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83 RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000 : 0000000 ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43875.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43875.json index a5e7db928ce..3e5590b863f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43875.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43875", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.910", - "lastModified": "2024-08-21T01:15:11.910", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Clean up error handling in vpci_scan_bus()\n\nSmatch complains about inconsistent NULL checking in vpci_scan_bus():\n\n drivers/pci/endpoint/functions/pci-epf-vntb.c:1024 vpci_scan_bus() error: we previously assumed 'vpci_bus' could be null (see line 1021)\n\nInstead of printing an error message and then crashing we should return\nan error code and clean up.\n\nAlso the NULL check is reversed so it prints an error for success\ninstead of failure." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: endpoint: limpieza del manejo de errores en vpci_scan_bus() Smatch se queja de una verificaci\u00f3n NULL inconsistente en vpci_scan_bus(): drivers/pci/endpoint/functions/pci-epf-vntb.c :1024 Error de vpci_scan_bus(): anteriormente asumimos que 'vpci_bus' podr\u00eda ser nulo (consulte la l\u00ednea 1021). En lugar de imprimir un mensaje de error y luego fallar, deber\u00edamos devolver un c\u00f3digo de error y limpiar. Adem\u00e1s, la verificaci\u00f3n NULL se invierte, por lo que imprime un error de \u00e9xito en lugar de fracaso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43876.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43876.json index 4b19509cd5f..6930d011a57 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43876.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43876.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43876", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:11.973", - "lastModified": "2024-08-21T01:15:11.973", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()\n\nAvoid large backtrace, it is sufficient to warn the user that there has\nbeen a link problem. Either the link has failed and the system is in need\nof maintenance, or the link continues to work and user has been informed.\nThe message from the warning can be looked up in the sources.\n\nThis makes an actual link issue less verbose.\n\nFirst of all, this controller has a limitation in that the controller\ndriver has to assist the hardware with transition to L1 link state by\nwriting L1IATN to PMCTRL register, the L1 and L0 link state switching\nis not fully automatic on this controller.\n\nIn case of an ASMedia ASM1062 PCIe SATA controller which does not support\nASPM, on entry to suspend or during platform pm_test, the SATA controller\nenters D3hot state and the link enters L1 state. If the SATA controller\nwakes up before rcar_pcie_wakeup() was called and returns to D0, the link\nreturns to L0 before the controller driver even started its transition to\nL1 link state. At this point, the SATA controller did send an PM_ENTER_L1\nDLLP to the PCIe controller and the PCIe controller received it, and the\nPCIe controller did set PMSR PMEL1RX bit.\n\nOnce rcar_pcie_wakeup() is called, if the link is already back in L0 state\nand PMEL1RX bit is set, the controller driver has no way to determine if\nit should perform the link transition to L1 state, or treat the link as if\nit is in L0 state. Currently the driver attempts to perform the transition\nto L1 link state unconditionally, which in this specific case fails with a\nPMSR L1FAEG poll timeout, however the link still works as it is already\nback in L0 state.\n\nReduce this warning verbosity. In case the link is really broken, the\nrcar_pcie_config_access() would fail, otherwise it will succeed and any\nsystem with this controller and ASM1062 can suspend without generating\na backtrace." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: PCI: rcar: Degradar WARN() a dev_warn_ratelimited() en rcar_pcie_wakeup() Evitar un gran backtrace, basta con avisar al usuario que ha habido un problema de enlace. O el enlace fall\u00f3 y el sistema necesita mantenimiento, o el enlace contin\u00faa funcionando y el usuario ha sido informado. El mensaje de la advertencia se puede buscar en las fuentes. Esto hace que un problema de enlace real sea menos detallado. En primer lugar, este controlador tiene una limitaci\u00f3n en el sentido de que el controlador del controlador tiene que ayudar al hardware con la transici\u00f3n al estado de enlace L1 escribiendo L1IATN en el registro PMCTRL; el cambio de estado de enlace L1 y L0 no es completamente autom\u00e1tico en este controlador. En el caso de un controlador ASMedia ASM1062 PCIe SATA que no admite ASPM, al entrar a suspender o durante la plataforma pm_test, el controlador SATA ingresa al estado D3hot y el enlace ingresa al estado L1. Si el controlador SATA se activa antes de que se llamara a rcar_pcie_wakeup() y regresa a D0, el enlace regresa a L0 antes de que el controlador del controlador comenzara su transici\u00f3n al estado de enlace L1. En este punto, el controlador SATA envi\u00f3 un DLLP PM_ENTER_L1 al controlador PCIe y el controlador PCIe lo recibi\u00f3, y el controlador PCIe configur\u00f3 el bit PMSR PMEL1RX. Una vez que se llama a rcar_pcie_wakeup(), si el enlace ya est\u00e1 nuevamente en el estado L0 y el bit PMEL1RX est\u00e1 configurado, el controlador del controlador no tiene forma de determinar si debe realizar la transici\u00f3n del enlace al estado L1 o tratar el enlace como si estuviera en estado L0. Estado L0. Actualmente, el controlador intenta realizar la transici\u00f3n al estado del enlace L1 incondicionalmente, lo que en este caso espec\u00edfico falla con un tiempo de espera de sondeo PMSR L1FAEG; sin embargo, el enlace a\u00fan funciona porque ya est\u00e1 nuevamente en el estado L0. Reduzca la verbosidad de esta advertencia. En caso de que el enlace est\u00e9 realmente roto, rcar_pcie_config_access() fallar\u00e1; de lo contrario, tendr\u00e1 \u00e9xito y cualquier sistema con este controlador y ASM1062 puede suspenderse sin generar un seguimiento." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43877.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43877.json index a9951952640..736cede73a8 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43877.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43877.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.033", - "lastModified": "2024-08-21T01:15:12.033", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pci: ivtv: Add check for DMA map result\n\nIn case DMA fails, 'dma->SG_length' is 0. This value is later used to\naccess 'dma->SGarray[dma->SG_length - 1]', which will cause out of\nbounds access.\n\nAdd check to return early on invalid value. Adjust warnings accordingly.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medios: pci: ivtv: Agregar verificaci\u00f3n para el resultado del mapa DMA En caso de que DMA falle, 'dma->SG_length' es 0. Este valor se usa luego para acceder a 'dma->SGarray [dma->SG_length - 1]', lo que provocar\u00e1 un acceso fuera de los l\u00edmites. Agregue un cheque para devolver anticipadamente un valor no v\u00e1lido. Ajuste las advertencias en consecuencia. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43878.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43878.json index 96eb29ff5de..0fcc98eeb49 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43878.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43878.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43878", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.093", - "lastModified": "2024-08-21T01:15:12.093", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Fix input error path memory access\n\nWhen there is a misconfiguration of input state slow path\nKASAN report error. Fix this error.\nwest login:\n[ 52.987278] eth1: renamed from veth11\n[ 53.078814] eth1: renamed from veth21\n[ 53.181355] eth1: renamed from veth31\n[ 54.921702] ==================================================================\n[ 54.922602] BUG: KASAN: wild-memory-access in xfrmi_rcv_cb+0x2d/0x295\n[ 54.923393] Read of size 8 at addr 6b6b6b6b00000000 by task ping/512\n[ 54.924169]\n[ 54.924386] CPU: 0 PID: 512 Comm: ping Not tainted 6.9.0-08574-gcd29a4313a1b #25\n[ 54.925290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 54.926401] Call Trace:\n[ 54.926731] \n[ 54.927009] dump_stack_lvl+0x2a/0x3b\n[ 54.927478] kasan_report+0x84/0xa6\n[ 54.927930] ? xfrmi_rcv_cb+0x2d/0x295\n[ 54.928410] xfrmi_rcv_cb+0x2d/0x295\n[ 54.928872] ? xfrm4_rcv_cb+0x3d/0x5e\n[ 54.929354] xfrm4_rcv_cb+0x46/0x5e\n[ 54.929804] xfrm_rcv_cb+0x7e/0xa1\n[ 54.930240] xfrm_input+0x1b3a/0x1b96\n[ 54.930715] ? xfrm_offload+0x41/0x41\n[ 54.931182] ? raw_rcv+0x292/0x292\n[ 54.931617] ? nf_conntrack_confirm+0xa2/0xa2\n[ 54.932158] ? skb_sec_path+0xd/0x3f\n[ 54.932610] ? xfrmi_input+0x90/0xce\n[ 54.933066] xfrm4_esp_rcv+0x33/0x54\n[ 54.933521] ip_protocol_deliver_rcu+0xd7/0x1b2\n[ 54.934089] ip_local_deliver_finish+0x110/0x120\n[ 54.934659] ? ip_protocol_deliver_rcu+0x1b2/0x1b2\n[ 54.935248] NF_HOOK.constprop.0+0xf8/0x138\n[ 54.935767] ? ip_sublist_rcv_finish+0x68/0x68\n[ 54.936317] ? secure_tcpv6_ts_off+0x23/0x168\n[ 54.936859] ? ip_protocol_deliver_rcu+0x1b2/0x1b2\n[ 54.937454] ? __xfrm_policy_check2.constprop.0+0x18d/0x18d\n[ 54.938135] NF_HOOK.constprop.0+0xf8/0x138\n[ 54.938663] ? ip_sublist_rcv_finish+0x68/0x68\n[ 54.939220] ? __xfrm_policy_check2.constprop.0+0x18d/0x18d\n[ 54.939904] ? ip_local_deliver_finish+0x120/0x120\n[ 54.940497] __netif_receive_skb_one_core+0xc9/0x107\n[ 54.941121] ? __netif_receive_skb_list_core+0x1c2/0x1c2\n[ 54.941771] ? blk_mq_start_stopped_hw_queues+0xc7/0xf9\n[ 54.942413] ? blk_mq_start_stopped_hw_queue+0x38/0x38\n[ 54.943044] ? virtqueue_get_buf_ctx+0x295/0x46b\n[ 54.943618] process_backlog+0xb3/0x187\n[ 54.944102] __napi_poll.constprop.0+0x57/0x1a7\n[ 54.944669] net_rx_action+0x1cb/0x380\n[ 54.945150] ? __napi_poll.constprop.0+0x1a7/0x1a7\n[ 54.945744] ? vring_new_virtqueue+0x17a/0x17a\n[ 54.946300] ? note_interrupt+0x2cd/0x367\n[ 54.946805] handle_softirqs+0x13c/0x2c9\n[ 54.947300] do_softirq+0x5f/0x7d\n[ 54.947727] \n[ 54.948014] \n[ 54.948300] __local_bh_enable_ip+0x48/0x62\n[ 54.948832] __neigh_event_send+0x3fd/0x4ca\n[ 54.949361] neigh_resolve_output+0x1e/0x210\n[ 54.949896] ip_finish_output2+0x4bf/0x4f0\n[ 54.950410] ? __ip_finish_output+0x171/0x1b8\n[ 54.950956] ip_send_skb+0x25/0x57\n[ 54.951390] raw_sendmsg+0xf95/0x10c0\n[ 54.951850] ? check_new_pages+0x45/0x71\n[ 54.952343] ? raw_hash_sk+0x21b/0x21b\n[ 54.952815] ? kernel_init_pages+0x42/0x51\n[ 54.953337] ? prep_new_page+0x44/0x51\n[ 54.953811] ? get_page_from_freelist+0x72b/0x915\n[ 54.954390] ? signal_pending_state+0x77/0x77\n[ 54.954936] ? preempt_count_sub+0x14/0xb3\n[ 54.955450] ? __might_resched+0x8a/0x240\n[ 54.955951] ? __might_sleep+0x25/0xa0\n[ 54.956424] ? first_zones_zonelist+0x2c/0x43\n[ 54.956977] ? __rcu_read_lock+0x2d/0x3a\n[ 54.957476] ? __pte_offset_map+0x32/0xa4\n[ 54.957980] ? __might_resched+0x8a/0x240\n[ 54.958483] ? __might_sleep+0x25/0xa0\n[ 54.958963] ? inet_send_prepare+0x54/0x54\n[ 54.959478] ? sock_sendmsg_nosec+0x42/0x6c\n[ 54.960000] sock_sendmsg_nosec+0x42/0x6c\n[ 54.960502] __sys_sendto+0x15d/0x1cc\n[ 54.960966] ? __x64_sys_getpeername+0x44/0x44\n[ 54.961522] ? __handle_mm_fault+0x679/0xae4\n[ 54.962068] ? find_vma+0x6b/0x\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm: corrige el error de acceso a la memoria de la ruta de entrada Cuando hay una mala configuraci\u00f3n del estado de entrada, la ruta lenta KASAN informa el error. Corrija este error. inicio de sesi\u00f3n oeste: [52.987278] eth1: renombrado de veth11 [53.078814] eth1: renombrado de veth21 [53.181355] eth1: renombrado de veth31 [54.921702] ===================== =============================================== [ 54.922602] ERROR : KASAN: acceso a memoria salvaje en xfrmi_rcv_cb+0x2d/0x295 [ 54.923393] Lectura de tama\u00f1o 8 en la direcci\u00f3n 6b6b6b6b00000000 mediante tarea ping/512 [ 54.924169] [ 54.924386] CPU: 0 PID: 512 Comm: ping No contaminado 6. 9.0- 08574-gcd29a4313a1b #25 [ 54.925290] Nombre de hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 01/04/2014 [ 54.926401] Seguimiento de llamadas: [ 54.926731] [54.927009] dump_stack_lvl+0x2a/0x3b [54.927478] kasan_report+0x84/0xa6 [54.927930]? xfrmi_rcv_cb+0x2d/0x295 [ 54.928410] xfrmi_rcv_cb+0x2d/0x295 [ 54.928872] ? xfrm4_rcv_cb+0x3d/0x5e [ 54.929354] xfrm4_rcv_cb+0x46/0x5e [ 54.929804] xfrm_rcv_cb+0x7e/0xa1 [ 54.930240] xfrm_input+0x1b3a/0x1b96 [ 54.930715] ? xfrm_offload+0x41/0x41 [54.931182]? raw_rcv+0x292/0x292 [54.931617]? nf_conntrack_confirm+0xa2/0xa2 [54.932158]? skb_sec_path+0xd/0x3f [54.932610]? xfrmi_input+0x90/0xce [ 54.933066] xfrm4_esp_rcv+0x33/0x54 [ 54.933521] ip_protocol_deliver_rcu+0xd7/0x1b2 [ 54.934089] ip_local_deliver_finish+0x110/0x120 [ 54.93 4659] ? ip_protocol_deliver_rcu+0x1b2/0x1b2 [ 54.935248] NF_HOOK.constprop.0+0xf8/0x138 [ 54.935767] ? ip_sublist_rcv_finish+0x68/0x68 [54.936317]? \u00bfsecure_tcpv6_ts_off+0x23/0x168 [54.936859]? ip_protocol_deliver_rcu+0x1b2/0x1b2 [54.937454]? __xfrm_policy_check2.constprop.0+0x18d/0x18d [ 54.938135] NF_HOOK.constprop.0+0xf8/0x138 [ 54.938663] ? ip_sublist_rcv_finish+0x68/0x68 [54.939220]? __xfrm_policy_check2.constprop.0+0x18d/0x18d [54.939904]? ip_local_deliver_finish+0x120/0x120 [ 54.940497] __netif_receive_skb_one_core+0xc9/0x107 [ 54.941121] ? __netif_receive_skb_list_core+0x1c2/0x1c2 [54.941771]? blk_mq_start_stopped_hw_queues+0xc7/0xf9 [54.942413]? blk_mq_start_stopped_hw_queue+0x38/0x38 [54.943044]? virtqueue_get_buf_ctx+0x295/0x46b [ 54.943618] Process_backlog+0xb3/0x187 [ 54.944102] __napi_poll.constprop.0+0x57/0x1a7 [ 54.944669] net_rx_action+0x1cb/0x380 [ 54.94 5150] ? __napi_poll.constprop.0+0x1a7/0x1a7 [54.945744]? vring_new_virtqueue+0x17a/0x17a [54.946300]? note_interrupt+0x2cd/0x367 [ 54.946805] handle_softirqs+0x13c/0x2c9 [ 54.947300] do_softirq+0x5f/0x7d [ 54.947727] [ 54.948014] [ 54.948300] _enable_ip+0x48/0x62 [ 54.948832] __neigh_event_send+0x3fd/0x4ca [ 54.949361] neigh_resolve_output+0x1e/0x210 [ 54.949896] ip_finish_output2+0x4bf/0x4f0 [ 54.950410] ? __ip_finish_output+0x171/0x1b8 [ 54.950956] ip_send_skb+0x25/0x57 [ 54.951390] raw_sendmsg+0xf95/0x10c0 [ 54.951850] ? check_new_pages+0x45/0x71 [ 54.952343] ? raw_hash_sk+0x21b/0x21b [54.952815]? kernel_init_pages+0x42/0x51 [54.953337]? prep_new_page+0x44/0x51 [54.953811]? get_page_from_freelist+0x72b/0x915 [54.954390]? signal_pending_state+0x77/0x77 [54.954936]? preempt_count_sub+0x14/0xb3 [54.955450]? __might_resched+0x8a/0x240 [ 54.955951] ? __might_sleep+0x25/0xa0 [ 54.956424] ? first_zones_zonelist+0x2c/0x43 [ 54.956977] ? __rcu_read_lock+0x2d/0x3a [ 54.957476] ? __pte_offset_map+0x32/0xa4 [54.957980]? __might_resched+0x8a/0x240 [ 54.958483] ? __might_sleep+0x25/0xa0 [ 54.958963] ? inet_send_prepare+0x54/0x54 [54.959478]? sock_sendmsg_nosec+0x42/0x6c [ 54.960000] sock_sendmsg_nosec+0x42/0x6c [ 54.960502] __sys_sendto+0x15d/0x1cc [ 54.960966] ? __x64_sys_getpeername+0x44/0x44 [ 54.961522] ? __handle_mm_fault+0x679/0xae4 [ 54.962068] ? find_vma+0x6b/0x ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43879.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43879.json index 0371f8a102d..4e76a5ac166 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43879.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43879.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43879", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.153", - "lastModified": "2024-08-21T01:15:12.153", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: maneja la asignaci\u00f3n de 2x996 RU en cfg80211_calculate_bitrate_he() Actualmente, NL80211_RATE_INFO_HE_RU_ALLOC_2x996 no se maneja en cfg80211_calculate_bitrate_he(), lo que genera la siguiente advertencia: kernel: invalid HE MCS: bw:6, ru :6 kernel: ADVERTENCIA: CPU: 0 PID: 2312 en net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211] Solucionelo manejando la asignaci\u00f3n de 2x996 RU de la misma manera que el ancho de banda de 160 MHz." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43880.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43880.json index 60a1a8ab2af..4c1ef01fee5 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43880.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43880", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.213", - "lastModified": "2024-08-21T01:15:12.213", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_erp: Fix object nesting warning\n\nACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM\n(A-TCAM) or in the ordinary circuit TCAM (C-TCAM). The former can\ncontain more ACLs (i.e., tc filters), but the number of masks in each\nregion (i.e., tc chain) is limited.\n\nIn order to mitigate the effects of the above limitation, the device\nallows filters to share a single mask if their masks only differ in up\nto 8 consecutive bits. For example, dst_ip/25 can be represented using\ndst_ip/24 with a delta of 1 bit. The C-TCAM does not have a limit on the\nnumber of masks being used (and therefore does not support mask\naggregation), but can contain a limited number of filters.\n\nThe driver uses the \"objagg\" library to perform the mask aggregation by\npassing it objects that consist of the filter's mask and whether the\nfilter is to be inserted into the A-TCAM or the C-TCAM since filters in\ndifferent TCAMs cannot share a mask.\n\nThe set of created objects is dependent on the insertion order of the\nfilters and is not necessarily optimal. Therefore, the driver will\nperiodically ask the library to compute a more optimal set (\"hints\") by\nlooking at all the existing objects.\n\nWhen the library asks the driver whether two objects can be aggregated\nthe driver only compares the provided masks and ignores the A-TCAM /\nC-TCAM indication. This is the right thing to do since the goal is to\nmove as many filters as possible to the A-TCAM. The driver also forbids\ntwo identical masks from being aggregated since this can only happen if\none was intentionally put in the C-TCAM to avoid a conflict in the\nA-TCAM.\n\nThe above can result in the following set of hints:\n\nH1: {mask X, A-TCAM} -> H2: {mask Y, A-TCAM} // X is Y + delta\nH3: {mask Y, C-TCAM} -> H4: {mask Z, A-TCAM} // Y is Z + delta\n\nAfter getting the hints from the library the driver will start migrating\nfilters from one region to another while consulting the computed hints\nand instructing the device to perform a lookup in both regions during\nthe transition.\n\nAssuming a filter with mask X is being migrated into the A-TCAM in the\nnew region, the hints lookup will return H1. Since H2 is the parent of\nH1, the library will try to find the object associated with it and\ncreate it if necessary in which case another hints lookup (recursive)\nwill be performed. This hints lookup for {mask Y, A-TCAM} will either\nreturn H2 or H3 since the driver passes the library an object comparison\nfunction that ignores the A-TCAM / C-TCAM indication.\n\nThis can eventually lead to nested objects which are not supported by\nthe library [1].\n\nFix by removing the object comparison function from both the driver and\nthe library as the driver was the only user. That way the lookup will\nonly return exact matches.\n\nI do not have a reliable reproducer that can reproduce the issue in a\ntimely manner, but before the fix the issue would reproduce in several\nminutes and with the fix it does not reproduce in over an hour.\n\nNote that the current usefulness of the hints is limited because they\ninclude the C-TCAM indication and represent aggregation that cannot\nactually happen. This will be addressed in net-next.\n\n[1]\nWARNING: CPU: 0 PID: 153 at lib/objagg.c:170 objagg_obj_parent_assign+0xb5/0xd0\nModules linked in:\nCPU: 0 PID: 153 Comm: kworker/0:18 Not tainted 6.9.0-rc6-custom-g70fbc2c1c38b #42\nHardware name: Mellanox Technologies Ltd. MSN3700C/VMOD0008, BIOS 5.11 10/10/2018\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:objagg_obj_parent_assign+0xb5/0xd0\n[...]\nCall Trace:\n \n __objagg_obj_get+0x2bb/0x580\n objagg_obj_get+0xe/0x80\n mlxsw_sp_acl_erp_mask_get+0xb5/0xf0\n mlxsw_sp_acl_atcam_entry_add+0xe8/0x3c0\n mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0\n mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270\n mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510\n process_one_work+0x151/0x370" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mlxsw: espectro_acl_erp: corrige la advertencia de anidamiento de objetos. Las ACL en Spectrum-2 y los ASIC m\u00e1s nuevos pueden residir en el TCAM algor\u00edtmico (A-TCAM) o en el TCAM de circuito ordinario (C-TCAM). El primero puede contener m\u00e1s ACL (es decir, filtros tc), pero el n\u00famero de m\u00e1scaras en cada regi\u00f3n (es decir, cadena tc) es limitado. Para mitigar los efectos de la limitaci\u00f3n anterior, el dispositivo permite que los filtros compartan una \u00fanica m\u00e1scara si sus m\u00e1scaras solo difieren en hasta 8 bits consecutivos. Por ejemplo, dst_ip/25 se puede representar usando dst_ip/24 con un delta de 1 bit. C-TCAM no tiene un l\u00edmite en la cantidad de m\u00e1scaras que se utilizan (y por lo tanto no admite la agregaci\u00f3n de m\u00e1scaras), pero puede contener una cantidad limitada de filtros. El controlador utiliza la librer\u00eda \"objagg\" para realizar la agregaci\u00f3n de m\u00e1scaras pas\u00e1ndole objetos que constan de la m\u00e1scara del filtro y si el filtro se insertar\u00e1 en la A-TCAM o en la C-TCAM, ya que los filtros en diferentes TCAM no pueden compartir una m\u00e1scara. El conjunto de objetos creados depende del orden de inserci\u00f3n de los filtros y no es necesariamente \u00f3ptimo. Por lo tanto, el controlador solicitar\u00e1 peri\u00f3dicamente a la librer\u00eda que calcule un conjunto m\u00e1s \u00f3ptimo (\"sugerencias\") observando todos los objetos existentes. Cuando la librer\u00eda pregunta al controlador si se pueden agregar dos objetos, el controlador solo compara las m\u00e1scaras proporcionadas e ignora la indicaci\u00f3n A-TCAM/C-TCAM. Esto es lo correcto ya que el objetivo es mover tantos filtros como sea posible a la A-TCAM. El conductor tambi\u00e9n proh\u00edbe agregar dos m\u00e1scaras id\u00e9nticas, ya que esto solo puede suceder si una se coloc\u00f3 intencionalmente en la C-TCAM para evitar un conflicto en la A-TCAM. Lo anterior puede dar como resultado el siguiente conjunto de sugerencias: H1: {m\u00e1scara X, A-TCAM} -> H2: {m\u00e1scara Y, A-TCAM} // X es Y + delta H3: {m\u00e1scara Y, C-TCAM} -> H4: {m\u00e1scara Z, A-TCAM} // Y es Z + delta Despu\u00e9s de obtener las sugerencias de la librer\u00eda, el controlador comenzar\u00e1 a migrar filtros de una regi\u00f3n a otra mientras consulta las sugerencias calculadas e indica al dispositivo que realice una b\u00fasqueda. en ambas regiones durante la transici\u00f3n. Suponiendo que se est\u00e1 migrando un filtro con m\u00e1scara X a la A-TCAM en la nueva regi\u00f3n, la b\u00fasqueda de sugerencias devolver\u00e1 H1. Dado que H2 es el padre de H1, la librer\u00eda intentar\u00e1 encontrar el objeto asociado con \u00e9l y crearlo si es necesario, en cuyo caso se realizar\u00e1 otra b\u00fasqueda de sugerencias (recursiva). Esta b\u00fasqueda de sugerencias para {m\u00e1scara Y, A-TCAM} devolver\u00e1 H2 o H3 ya que el controlador pasa a la librer\u00eda una funci\u00f3n de comparaci\u00f3n de objetos que ignora la indicaci\u00f3n A-TCAM/C-TCAM. En \u00faltima instancia, esto puede conducir a objetos anidados que no son compatibles con la librer\u00eda [1]. Para solucionarlo, elimine la funci\u00f3n de comparaci\u00f3n de objetos tanto del controlador como de la librer\u00eda, ya que el controlador era el \u00fanico usuario. De esa forma, la b\u00fasqueda solo arrojar\u00e1 coincidencias exactas. No tengo un reproductor confiable que pueda reproducir el problema de manera oportuna, pero antes de solucionarlo, el problema se reproduc\u00eda en varios minutos y con la soluci\u00f3n no se reproduce en m\u00e1s de una hora. Tenga en cuenta que la utilidad actual de las sugerencias es limitada porque incluyen la indicaci\u00f3n C-TCAM y representan una agregaci\u00f3n que en realidad no puede ocurrir. Esto se abordar\u00e1 en net-next. [1] ADVERTENCIA: CPU: 0 PID: 153 en lib/objagg.c:170 objagg_obj_parent_assign+0xb5/0xd0 M\u00f3dulos vinculados en: CPU: 0 PID: 153 Comm: kworker/0:18 No contaminado 6.9.0-rc6-custom -g70fbc2c1c38b #42 Nombre del hardware: Mellanox Technologies Ltd. MSN3700C/VMOD0008, BIOS 5.11 10/10/2018 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:objagg_obj_parent_assign+0xb5/0xd0 [...] Seguimiento de llamadas: < TAREA> ---truncado----" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43881.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43881.json index e898adb507d..5aede11cfe2 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43881.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43881.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43881", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.280", - "lastModified": "2024-08-21T01:15:12.280", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: change DMA direction while mapping reinjected packets\n\nFor fragmented packets, ath12k reassembles each fragment as a normal\npacket and then reinjects it into HW ring. In this case, the DMA\ndirection should be DMA_TO_DEVICE, not DMA_FROM_DEVICE. Otherwise,\nan invalid payload may be reinjected into the HW and\nsubsequently delivered to the host.\n\nGiven that arbitrary memory can be allocated to the skb buffer,\nknowledge about the data contained in the reinjected buffer is lacking.\nConsequently, there\u2019s a risk of private information being leaked.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: wifi: ath12k: cambia la direcci\u00f3n de DMA al mapear paquetes reinyectados. Para paquetes fragmentados, ath12k vuelve a ensamblar cada fragmento como un paquete normal y luego lo reinyecta en el anillo HW. En este caso, la direcci\u00f3n DMA debe ser DMA_TO_DEVICE, no DMA_FROM_DEVICE. De lo contrario, se puede reinyectar una carga \u00fatil no v\u00e1lida en el HW y posteriormente entregarla al host. Dado que se puede asignar memoria arbitraria al b\u00fafer skb, falta conocimiento sobre los datos contenidos en el b\u00fafer reinyectado. En consecuencia, existe el riesgo de que se filtre informaci\u00f3n privada. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43882.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43882.json index cfcf3822e21..a786c35aed1 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43882.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43882.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43882", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T01:15:12.340", - "lastModified": "2024-08-21T01:15:12.340", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexec: Fix ToCToU between perm check and set-uid/gid usage\n\nWhen opening a file for exec via do_filp_open(), permission checking is\ndone against the file's metadata at that moment, and on success, a file\npointer is passed back. Much later in the execve() code path, the file\nmetadata (specifically mode, uid, and gid) is used to determine if/how\nto set the uid and gid. However, those values may have changed since the\npermissions check, meaning the execution may gain unintended privileges.\n\nFor example, if a file could change permissions from executable and not\nset-id:\n\n---------x 1 root root 16048 Aug 7 13:16 target\n\nto set-id and non-executable:\n\n---S------ 1 root root 16048 Aug 7 13:16 target\n\nit is possible to gain root privileges when execution should have been\ndisallowed.\n\nWhile this race condition is rare in real-world scenarios, it has been\nobserved (and proven exploitable) when package managers are updating\nthe setuid bits of installed programs. Such files start with being\nworld-executable but then are adjusted to be group-exec with a set-uid\nbit. For example, \"chmod o-x,u+s target\" makes \"target\" executable only\nby uid \"root\" and gid \"cdrom\", while also becoming setuid-root:\n\n-rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target\n\nbecomes:\n\n-rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target\n\nBut racing the chmod means users without group \"cdrom\" membership can\nget the permission to execute \"target\" just before the chmod, and when\nthe chmod finishes, the exec reaches brpm_fill_uid(), and performs the\nsetuid to root, violating the expressed authorization of \"only cdrom\ngroup members can setuid to root\".\n\nRe-check that we still have execute permissions in case the metadata\nhas changed. It would be better to keep a copy from the perm-check time,\nbut until we can do that refactoring, the least-bad option is to do a\nfull inode_permission() call (under inode lock). It is understood that\nthis is safe against dead-locks, but hardly optimal." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: exec: corrige ToCToU entre la verificaci\u00f3n permanente y el uso de set-uid/gid Al abrir un archivo para exec a trav\u00e9s de do_filp_open(), la verificaci\u00f3n de permisos se realiza con los metadatos del archivo en ese momento, y en caso de \u00e9xito, se devuelve un puntero de archivo. Mucho m\u00e1s adelante en la ruta del c\u00f3digo execve(), los metadatos del archivo (espec\u00edficamente modo, uid y gid) se utilizan para determinar si y c\u00f3mo configurar uid y gid. Sin embargo, es posible que esos valores hayan cambiado desde la verificaci\u00f3n de permisos, lo que significa que la ejecuci\u00f3n puede obtener privilegios no deseados. Por ejemplo, si un archivo pudiera cambiar los permisos de ejecutable y no de set-id: ---------x 1 root root 16048 7 de agosto 13:16 destino a set-id y no ejecutable: ---S ------ 1 root root 16048 7 de agosto 13:16 target es posible obtener privilegios de root cuando la ejecuci\u00f3n no deber\u00eda haberse permitido. Si bien esta condici\u00f3n de ejecuci\u00f3n es poco com\u00fan en escenarios del mundo real, se ha observado (y se ha demostrado que es explotable) cuando los administradores de paquetes actualizan los bits setuid de los programas instalados. Dichos archivos comienzan siendo ejecutables mundialmente, pero luego se ajustan para que sean ejecutables en grupo con un bit set-uid. Por ejemplo, \"chmod ox,u+s target\" hace que \"target\" sea ejecutable s\u00f3lo mediante uid \"root\" y gid \"cdrom\", y al mismo tiempo se convierte en setuid-root: -rwxr-xr-x 1 root cdrom 16048 7 de agosto de 13: 16 objetivo se convierte en: -rwsr-xr-- 1 cdrom ra\u00edz 16048 7 de agosto 13:16 objetivo Pero competir con el chmod significa que los usuarios sin membres\u00eda del grupo \"cdrom\" pueden obtener permiso para ejecutar \"destino\" justo antes del chmod, y cuando el chmod finaliza, el ejecutivo llega a brpm_fill_uid() y realiza el setuid como root, violando la autorizaci\u00f3n expresa de \"s\u00f3lo los miembros del grupo cdrom pueden setuid como root\". Vuelva a verificar que todav\u00eda tengamos permisos de ejecuci\u00f3n en caso de que los metadatos hayan cambiado. Ser\u00eda mejor conservar una copia del momento de verificaci\u00f3n permanente, pero hasta que podamos hacer esa refactorizaci\u00f3n, la opci\u00f3n menos mala es hacer una llamada completa a inode_permission() (bajo bloqueo de inodo). Se entiende que esto es seguro contra bloqueos mutuos, pero no es \u00f3ptimo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44070.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44070.json index f3fbdffe535..d75ea4ce9ab 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44070.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44070", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T02:15:04.643", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:31:47.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se descubri\u00f3 un problema en FRRouting (FRR) hasta 10.1. bgp_attr_encap en bgpd/bgp_attr.c no verifica la longitud real restante del flujo antes de tomar el valor TLV." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.1", + "matchCriteriaId": "D141DD61-3500-41D5-AE1A-01470D247067" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FRRouting/frr/pull/16497", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44073.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44073.json index ad253648b0c..0a32e1e5cee 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44073.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44073", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T03:15:03.790", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:32:44.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,83 @@ "value": "La librer\u00eda Miniscript (tambi\u00e9n conocida como rust-miniscript) anterior a 12.2.0 para Rust permite el consumo de pila porque no realiza un seguimiento adecuado de la profundidad del \u00e1rbol." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rust-bitcoin:miniscript:*:*:*:*:*:rust:*:*", + "versionEndExcluding": "12.2.0", + "matchCriteriaId": "C9827DEF-0B33-46B0-90DE-FFCA748732B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/rust-bitcoin/rust-miniscript/compare/11.2.0...12.2.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/rust-bitcoin/rust-miniscript/pull/704", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/rust-bitcoin/rust-miniscript/pull/712", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44076.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44076.json index 31c30620aec..86de973c954 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44076.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44076", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T03:15:03.883", - "lastModified": "2024-08-19T16:35:28.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T12:33:42.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microcks:microcks:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.10.0", + "matchCriteriaId": "F0B7DBDB-CA72-4351-A85C-47EBEB5D0AE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/microcks/microcks/issues/1212", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/microcks/microcks/releases/tag/1.10.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json index c4af1b85aff..e3441114830 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44083", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T04:15:04.760", - "lastModified": "2024-08-19T16:35:29.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:35:54.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hex-rays:ida_pro:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.4", + "matchCriteriaId": "51AE79D3-556D-4193-9C41-5661258DCE1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Azvanzed/IdaMeme", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5012.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5012.json index f837012ea64..557e16ce43b 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5012.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5012", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:00.320", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:34:41.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5013.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5013.json index 2962c8043f3..ccf5df5a730 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5013.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5013", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:00.510", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:35:28.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5014.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5014.json index 577bc7809ef..3458c3634d9 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5014.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5014", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:00.703", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:36:06.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5015.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5015.json index a52d01c6e44..24bc8984931 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5015.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5015", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:00.890", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:37:02.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5016.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5016.json index 32595104634..dee3ef29d92 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5016.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5016", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:01.163", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:38:32.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.0", + "matchCriteriaId": "5D27D3E3-A9E8-493A-8D4A-51ED537ABC7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3C901164-2DD6-4D8A-997B-DFDB7D68DF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5017.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5017.json index ba6cd2ede86..91809d90019 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5017.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5017", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:01.357", - "lastModified": "2024-06-26T14:15:11.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:40:49.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1932", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5019.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5019.json index 56d93d9829c..476971eb52a 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5019.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5019.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5019", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T21:16:01.743", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:43:03.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5335.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5335.json index 67de5697e48..c37d3337e5c 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5335.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5335.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5335", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T09:15:04.563", - "lastModified": "2024-08-21T09:15:04.563", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_compare_products cookie in versions up to , and including, 1.6.4. This makes it possible for an unauthenticated attacker to inject a PHP Object.\r\n\r\nNo POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table y Woocommerce Slider es vulnerable a la inyecci\u00f3n de objetos PHP a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza a trav\u00e9s de la cookie _ultimate_store_kit_compare_products en versiones hasta 1.6.4 incluida. Esto hace posible que un atacante no autenticado inyecte un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si una cadena POP est\u00e1 presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante o superior eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5880.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5880.json index 173da7ca536..d5a628259ad 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5880.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5880", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:07.633", - "lastModified": "2024-08-21T06:15:07.633", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Hide My Site plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2 due to the plugin not restricting access to the REST API when password protection is enabled. This makes it possible for unauthenticated attackers to gain unauthorized access to the site." + }, + { + "lang": "es", + "value": "El complemento Hide My Site para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.2 incluida debido a que el complemento no restringe el acceso a la API REST cuando la protecci\u00f3n con contrase\u00f1a est\u00e1 habilitada. Esto hace posible que atacantes no autenticados obtengan acceso no autorizado al sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json index 76156d740f0..7abc1d76c8b 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5953", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-18T10:15:11.170", - "lastModified": "2024-08-12T13:38:38.430", + "lastModified": "2024-08-21T13:15:04.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:5192", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5690", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5953", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6322.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6322.json index 1747f46f3d2..281ed580ee3 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6322.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6322.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6322", "sourceIdentifier": "security@grafana.com", "published": "2024-08-20T18:15:09.900", - "lastModified": "2024-08-20T18:15:09.900", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource." + }, + { + "lang": "es", + "value": "El control de acceso a las fuentes de datos de complementos protegidos por el campo json ReqActions de plugin.json se omite si al usuario o a la cuenta de servicio se le concede acceso asociado a cualquier otra fuente de datos, ya que la verificaci\u00f3n de ReqActions no se centr\u00f3 en cada fuente de datos espec\u00edfica. La cuenta debe tener acceso de consulta previo a la fuente de datos afectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6337.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6337.json index 764cdd895bd..b7a02105d32 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6337.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6337.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6337", "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:09.033", - "lastModified": "2024-08-20T20:15:09.033", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a GitHub App with only content: read and pull_request_write: write permissions to read issue content inside a private repository. This was only exploitable via user access token and installation access token was not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14 and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de autorizaci\u00f3n incorrecta en GitHub Enterprise Server que permit\u00eda una aplicaci\u00f3n GitHub con solo contenido: lectura y pull_request_write: permisos de escritura para leer el contenido del problema dentro de un repositorio privado. Esto solo se pod\u00eda explotar mediante el token de acceso del usuario y el token de acceso a la instalaci\u00f3n no se vio afectado. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server anteriores a la 3.14 y se solucion\u00f3 en las versiones 3.13.3, 3.12.8, 3.11.14 y 3.10.16. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa GitHub Bug Bounty." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json index 8b3ceb34420..803541b8a2b 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6339", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T08:15:04.333", - "lastModified": "2024-08-21T08:15:04.333", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Phlox PRO theme for WordPress is vulnerable to Reflected Cross-Site Scripting via search parameters in all versions up to, and including, 5.16.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El tema Phlox PRO para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s de par\u00e1metros de b\u00fasqueda en todas las versiones hasta la 5.16.4 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json index 11b501fee42..bc0de7aa84e 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6508.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6508", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-21T06:15:08.120", - "lastModified": "2024-08-21T06:15:08.120", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim\u2019s current application account using a third-party account without any restrictions." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de entrop\u00eda insuficiente en Openshift Console. En el tipo de c\u00f3digo de autorizaci\u00f3n y el tipo de concesi\u00f3n impl\u00edcita, el protocolo OAuth2 es vulnerable a un ataque de Cross-Site Request Forgery (CSRF) si el par\u00e1metro de estado se utiliza de manera ineficiente. Esta falla permite iniciar sesi\u00f3n en la cuenta de la aplicaci\u00f3n actual de la v\u00edctima utilizando una cuenta de terceros sin ninguna restricci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6568.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6568.json index ba8849e2998..e11bc70a719 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6568.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6568.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6568", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:08.500", - "lastModified": "2024-08-21T06:15:08.500", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Flamix: Bitrix24 and Contact Form 7 integrations plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.0. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Flamix: Bitrix24 and Contact Form 7 integrations para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 3.1.0 incluida. Esto se debe al complemento que utiliza mobiledetect sin impedir el acceso directo a los archivos. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6767.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6767.json index 08e280cee2f..aae51813bad 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6767.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6767.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6767", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:08.877", - "lastModified": "2024-08-21T06:15:08.877", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordSurvey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018sounding_title\u2019 parameter in all versions up to, and including, 3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento WordSurvey para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'sounding_title' en todas las versiones hasta la 3.2 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de administrador, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json index 8e203a3149f..53d4bc72c12 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6800", "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:09.910", - "lastModified": "2024-08-20T20:15:09.910", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when utilizing SAML authentication with specific identity providers. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a\u00a0SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication.\u00a0This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program." + }, + { + "lang": "es", + "value": "Hab\u00eda una vulnerabilidad de ajuste de firma XML en GitHub Enterprise Server (GHES) al utilizar la autenticaci\u00f3n SAML con proveedores de identidad espec\u00edficos. Esta vulnerabilidad permiti\u00f3 a un atacante con acceso directo a la red de GitHub Enterprise Server falsificar una respuesta SAML para aprovisionar y/u obtener acceso a un usuario con privilegios de administrador del sitio. La explotaci\u00f3n de esta vulnerabilidad permitir\u00eda el acceso no autorizado a la instancia sin requerir autenticaci\u00f3n previa. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server anteriores a la 3.14 y se solucion\u00f3 en las versiones 3.13.3, 3.12.8, 3.11.14 y 3.10.16. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa GitHub Bug Bounty." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6883.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6883.json index c5a2c022517..7611b90721f 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6883.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6883.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6883", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:09.433", - "lastModified": "2024-08-21T06:15:09.433", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Event Espresso 4 Decaf \u2013 Event Registration Event Ticketing plugin for WordPress is vulnerable to limited unauthorized plugin settings modification due to a missing capability check on the saveTimezoneString and some other functions in all versions up to, and including, 5.0.22.decaf. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify some of the plugin settings." + }, + { + "lang": "es", + "value": "El complemento Event Espresso 4 Decaf \u2013 Event Registration Event Ticketing para WordPress es vulnerable a modificaciones limitadas y no autorizadas de la configuraci\u00f3n del complemento debido a una falta de verificaci\u00f3n de capacidad en saveTimezoneString y algunas otras funciones en todas las versiones hasta 5.0.22.decaf incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, modifiquen algunas de las configuraciones del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7013.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7013.json index 614c20e3828..3ce47395524 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7013.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7013.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7013", "sourceIdentifier": "product-security@gg.jp.panasonic.com", "published": "2024-08-21T06:15:09.753", - "lastModified": "2024-08-21T06:15:09.753", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Control FPWIN Pro version 7.7.2.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en pila en Control FPWIN Pro versi\u00f3n 7.7.2.0 y todas las versiones anteriores puede permitir a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo de proyecto especialmente manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7030.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7030.json index 8e58855e6e8..3cee339bd6d 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7030.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7030.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7030", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:10.053", - "lastModified": "2024-08-21T06:15:10.053", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Smart Online Order for Clover plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.5.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update product and category descriptions, category titles and images, and sort order." + }, + { + "lang": "es", + "value": "El complemento Smart Online Order for Clover para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.5.6 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen las descripciones de productos y categor\u00edas, los t\u00edtulos e im\u00e1genes de las categor\u00edas, y el orden de clasificaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7032.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7032.json index e89f946c7bc..78e5da39395 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7032.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7032.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7032", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:10.453", - "lastModified": "2024-08-21T06:15:10.453", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Smart Online Order for Clover plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'moo_deactivateAndClean' function in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to deactivate the plugin and drop all plugin tables from the database." + }, + { + "lang": "es", + "value": "El complemento Smart Online Order for Clover para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'moo_deactivateAndClean' en todas las versiones hasta la 1.5.6 incluida. Esto hace posible que atacantes no autenticados desactiven el complemento y eliminen todas las tablas de complementos de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7090.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7090.json index 90260ca71e6..c8306b3e7fe 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7090.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7090.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7090", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:10.800", - "lastModified": "2024-08-21T06:15:10.800", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LH Add Media From Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018lh_add_media_from_url-file_url\u2019 parameter in all versions up to, and including, 1.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento LH Add Media From Url para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'lh_add_media_from_url-file_url' en todas las versiones hasta la 1.23 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7134.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7134.json index f19f9d2e87b..3106affd88f 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7134.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7134.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7134", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:11.200", - "lastModified": "2024-08-21T06:15:11.200", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018form_data\u2019 parameter in all versions up to, and including, 3.3.78 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'form_data' en todas las versiones hasta la 3.3.78 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7390.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7390.json index 05410a1644a..04624dc4c2a 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7390.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7390.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7390", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:11.577", - "lastModified": "2024-08-21T06:15:11.577", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Testimonial Widget plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnSaveTestimonailOrder function in all versions up to, and including, 3.0. This makes it possible for unauthenticated attackers to change the order of testimonials." + }, + { + "lang": "es", + "value": "El complemento WP Testimonial Widget para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n fnSaveTestimonailOrder en todas las versiones hasta la 3.0 incluida. Esto hace posible que atacantes no autenticados cambien el orden de los testimonios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7629.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7629.json index a0a725089fe..2b6a3f6ad50 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7629.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7629.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7629", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:12.090", - "lastModified": "2024-08-21T06:15:12.090", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Responsive video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's video settings function in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This requires responsive videos to be enabled for posts." + }, + { + "lang": "es", + "value": "El complemento Responsive video para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funci\u00f3n de configuraci\u00f3n de video del complemento en todas las versiones hasta la 1.0 incluida debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto requiere que los videos responsivos est\u00e9n habilitados para las publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7647.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7647.json index 23ca42e25a6..a1f5ffbc3b3 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7647.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7647.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7647", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:12.413", - "lastModified": "2024-08-21T06:15:12.413", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OTA Sync Booking Engine Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.7. This is due to missing or incorrect nonce validation on the otasync_widget_settings_fnc() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento OTA Sync Booking Engine Widget para WordPress es vulnerable a la Cross-Site Request Forgery en todas las versiones hasta la 1.2.7 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n otasync_widget_settings_fnc(). Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento e inyecten scripts maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7651.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7651.json index cf7a10ef3a3..100e534e974 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7651.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7651.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7651", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:12.830", - "lastModified": "2024-08-21T06:15:12.830", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The App Builder \u2013 Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to limited SQL Injection via the \u2018app-builder-search\u2019 parameter in all versions up to, and including, 4.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento App Builder \u2013 Create Native Android & iOS Apps On The Flight para WordPress es vulnerable a una inyecci\u00f3n SQL limitada a trav\u00e9s del par\u00e1metro 'app-builder-search' en todas las versiones hasta la 4.2.6 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7711.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7711.json index 56f04e46a53..0b56b032b87 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7711.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7711.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7711", "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:10.173", - "lastModified": "2024-08-20T20:15:10.173", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server, allowing an attacker to update the title, assignees, and labels of any issue inside a public repository. This was only exploitable inside a public repository. This vulnerability affected GitHub Enterprise Server versions before 3.14 and was fixed in versions 3.13.3, 3.12.8, and 3.11.14. Versions 3.10 of GitHub Enterprise Server are not affected. This vulnerability was reported via the GitHub Bug Bounty program." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de autorizaci\u00f3n incorrecta en GitHub Enterprise Server, lo que permite a un atacante actualizar el t\u00edtulo, los asignatarios y las etiquetas de cualquier problema dentro de un repositorio p\u00fablico. Esto s\u00f3lo era explotable dentro de un repositorio p\u00fablico. Esta vulnerabilidad afect\u00f3 a las versiones de GitHub Enterprise Server anteriores a la 3.14 y se solucion\u00f3 en las versiones 3.13.3, 3.12.8 y 3.11.14. Las versiones 3.10 de GitHub Enterprise Server no se ven afectadas. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa GitHub Bug Bounty." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7854.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7854.json index cd192e3d256..24c1c0cb97c 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7854.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7854.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7854", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T06:15:13.423", - "lastModified": "2024-08-21T06:15:13.423", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 0.1 due to insufficient escaping on the user supplied parameter 'dbid' and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Woo Inquiry para WordPress es vulnerable a la inyecci\u00f3n SQL en todas las versiones hasta la 0.1 incluida debido a un escape insuficiente en el par\u00e1metro 'dbid' proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json index b19e9330d1f..678e3af0456 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7917", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T23:15:04.047", - "lastModified": "2024-08-20T19:38:43.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-21T12:30:34.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:douco:douphp:1.6:20220822:*:*:*:*:*:*", - "matchCriteriaId": "6910CD8A-B738-487A-8B27-43F16D258FAB" + "criteria": "cpe:2.3:a:douco:douphp:1.7:20220822:*:*:*:*:*:*", + "matchCriteriaId": "A1495489-E0C8-4342-987D-A5F66F367ED1" } ] } diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7919.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7919.json index 39f48c3d022..d7307036790 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7919.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7919", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T00:15:04.310", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:30:01.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jielink\\+_jsotc2016_project:jielink\\+_jsotc2016:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20240805", + "matchCriteriaId": "AF0475AC-605D-43D4-9FCB-BD9A4DBCB73C" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.275069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.387124", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/fd390bd7-2d60-4ffb-87da-f72cc900f61c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7920.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7920.json index f8f093d45f9..ce9a56001d4 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7920.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7920.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7920", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T00:15:04.570", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:31:20.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jielink\\+_jsotc2016_project:jielink\\+_jsotc2016:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20240805", + "matchCriteriaId": "AF0475AC-605D-43D4-9FCB-BD9A4DBCB73C" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.275070", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275070", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.387125", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/123687c4-ff4b-48e8-8299-6f4950a75af5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7921.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7921.json index 780ced9515c..d107fb73956 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7921.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7921", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T03:15:03.967", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T12:34:04.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jielink\\+_jsotc2016_project:jielink\\+_jsotc2016:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20240805", + "matchCriteriaId": "AF0475AC-605D-43D4-9FCB-BD9A4DBCB73C" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.275071", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275071", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.387126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wiki.shikangsi.com/post/share/7d5eb025-1c30-44b4-b609-61938f6d6c05", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json index fceee857791..7262d900885 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7946", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.097", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:55:24.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/a1175165157/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.275138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.393382", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json index cb58dd08709..43bc8fb402e 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7947", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.337", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:53:38.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4CAA5E-2FA9-4FCB-A2C2-B4D4E4D73896" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/60", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.275139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.393525", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json index d210699d031..f7cc86ee036 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7948", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.573", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:52:38.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:account_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "256FF2A0-0D90-40C8-BD52-60DB1D5B9BCC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_Accounts_Manager_App_update_account_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description" + ] }, { "url": "https://vuldb.com/?ctiid.275140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.393921", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json index e1360d8c07b..4288ed34773 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7949", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.817", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-21T13:51:13.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Pingxy/cve/blob/main/sql4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.275142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.394046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json index 6dbe8486f78..232eb03c15d 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7998", "sourceIdentifier": "security@octopus.com", "published": "2024-08-21T06:15:13.830", - "lastModified": "2024-08-21T06:15:13.830", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan." + }, + { + "lang": "es", + "value": "En las versiones afectadas de Octopus Server, las cookies OIDC utilizaban un tiempo de caducidad incorrecto, lo que podr\u00eda provocar que utilizaran la vida \u00fatil m\u00e1xima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8022.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8022.json index c1cba99671d..dfd1e613539 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8022.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8022", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-21T00:15:05.227", - "lastModified": "2024-08-21T00:15:05.227", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Genexis Tilgin Home Gateway 322_AS0500-03_05_13_05. It has been rated as problematic. This issue affects some unknown processing of the file /vood/cgi-bin/vood_view.cgi?lang=EN&act=user/spec_conf&sessionId=86213915328111654515&user=A&message2user=Account%20updated. The manipulation of the argument Phone Number leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Genexis Tilgin Home Gateway 322_AS0500-03_05_13_05. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /vood/cgi-bin/vood_view.cgi?lang=EN&act=user/spec_conf&sessionId=86213915328111654515&user=A&message2user=Account%20updated. La manipulaci\u00f3n del argumento N\u00famero de tel\u00e9fono conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8023.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8023.json index 214a3ae11d2..8419943125e 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8023.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8023", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-21T00:15:05.527", - "lastModified": "2024-08-21T00:15:05.527", - "vulnStatus": "Received", + "lastModified": "2024-08-21T12:30:33.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in chillzhuang SpringBlade 4.1.0. Affected is an unknown function of the file /api/blade-system/menu/list?updatexml. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en chillzhuang SpringBlade 4.1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /api/blade-system/menu/list?updatexml es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/README.md b/README.md index 5bdf2eb66d7..fc85e7373a5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-21T12:00:17.118739+00:00 +2024-08-21T14:00:19.156033+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-21T11:06:24.627000+00:00 +2024-08-21T13:55:24.780000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260777 +260778 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -- [CVE-2023-22576](CVE-2023/CVE-2023-225xx/CVE-2023-22576.json) (`2024-08-21T10:15:04.173`) -- [CVE-2023-49198](CVE-2023/CVE-2023-491xx/CVE-2023-49198.json) (`2024-08-21T10:15:04.903`) -- [CVE-2024-37008](CVE-2024/CVE-2024-370xx/CVE-2024-37008.json) (`2024-08-21T10:15:05.037`) +- [CVE-2020-11850](CVE-2020/CVE-2020-118xx/CVE-2020-11850.json) (`2024-08-21T13:15:04.027`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `187` -- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-21T11:06:24.627`) -- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-21T11:06:00.887`) +- [CVE-2024-6767](CVE-2024/CVE-2024-67xx/CVE-2024-6767.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-6883](CVE-2024/CVE-2024-68xx/CVE-2024-6883.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7013](CVE-2024/CVE-2024-70xx/CVE-2024-7013.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7030](CVE-2024/CVE-2024-70xx/CVE-2024-7030.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7032](CVE-2024/CVE-2024-70xx/CVE-2024-7032.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7090](CVE-2024/CVE-2024-70xx/CVE-2024-7090.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7134](CVE-2024/CVE-2024-71xx/CVE-2024-7134.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7390](CVE-2024/CVE-2024-73xx/CVE-2024-7390.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7629](CVE-2024/CVE-2024-76xx/CVE-2024-7629.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7647](CVE-2024/CVE-2024-76xx/CVE-2024-7647.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7651](CVE-2024/CVE-2024-76xx/CVE-2024-7651.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7711](CVE-2024/CVE-2024-77xx/CVE-2024-7711.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7854](CVE-2024/CVE-2024-78xx/CVE-2024-7854.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-7917](CVE-2024/CVE-2024-79xx/CVE-2024-7917.json) (`2024-08-21T12:30:34.283`) +- [CVE-2024-7919](CVE-2024/CVE-2024-79xx/CVE-2024-7919.json) (`2024-08-21T12:30:01.187`) +- [CVE-2024-7920](CVE-2024/CVE-2024-79xx/CVE-2024-7920.json) (`2024-08-21T12:31:20.663`) +- [CVE-2024-7921](CVE-2024/CVE-2024-79xx/CVE-2024-7921.json) (`2024-08-21T12:34:04.490`) +- [CVE-2024-7946](CVE-2024/CVE-2024-79xx/CVE-2024-7946.json) (`2024-08-21T13:55:24.780`) +- [CVE-2024-7947](CVE-2024/CVE-2024-79xx/CVE-2024-7947.json) (`2024-08-21T13:53:38.750`) +- [CVE-2024-7948](CVE-2024/CVE-2024-79xx/CVE-2024-7948.json) (`2024-08-21T13:52:38.057`) +- [CVE-2024-7949](CVE-2024/CVE-2024-79xx/CVE-2024-7949.json) (`2024-08-21T13:51:13.580`) +- [CVE-2024-7998](CVE-2024/CVE-2024-79xx/CVE-2024-7998.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-8022](CVE-2024/CVE-2024-80xx/CVE-2024-8022.json) (`2024-08-21T12:30:33.697`) +- [CVE-2024-8023](CVE-2024/CVE-2024-80xx/CVE-2024-8023.json) (`2024-08-21T12:30:33.697`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5305c8c17b9..7158a99aad5 100644 --- a/_state.csv +++ b/_state.csv @@ -146822,6 +146822,7 @@ CVE-2020-11845,0,0,7e08b7d4c78c56795d5b38717a7a0c67d123b244dfcc98521773ca6a4bf5f CVE-2020-11848,0,0,8b23a9eceff9959ab288670219d1f6006701c7021ce0c312a1ae7c487d5ba6ee,2023-11-07T03:15:11.227000 CVE-2020-11849,0,0,09295df17fa5dd8adaff1580dbfce546c6c9c519a1569b4961ddc2c9383ed8fb,2023-11-07T03:15:11.503000 CVE-2020-1185,0,0,3316dc17683cc6cc502a5a61a4139663716df73cc9e5aeb1b7b86cd4d9551321,2021-07-21T11:39:23.747000 +CVE-2020-11850,1,1,cebbf51f1c45b548786aeef921a738c81de5b4cc50f4c3e4bde845b14248debc,2024-08-21T13:15:04.027000 CVE-2020-11851,0,0,4ee7500b04ed49333edaab0460360ee6e3c1c64822d3fd6fa5fe961906315d49,2023-11-07T03:15:11.767000 CVE-2020-11852,0,0,112bc0d3fcb0af2373f487930f6d85a8825e32e1638612dc8b7461f6b5afad16,2023-11-07T03:15:12.037000 CVE-2020-11853,0,0,32b8f066baea30ce3a5502342cf34ba35e924476d7f149d54fcc4651ef73cd28,2023-11-07T03:15:12.290000 @@ -212367,41 +212368,41 @@ CVE-2022-48863,0,0,0b99b60ca586a6da4e957e9e6764f579d04f3de517666b5d23308eb74a032 CVE-2022-48864,0,0,20a93d8c717514ed3619da6525932e50b688bd0d476c290094d596cb506d7b10,2024-07-23T14:44:00.093000 CVE-2022-48865,0,0,131f2466a64b0e56f3543f09aa08c5ba9a2688ed851b0bd16452f38d0b32c199,2024-07-23T14:42:20.300000 CVE-2022-48866,0,0,dd9632abea944a27af10a71970d4f3466ac4d00c77d7597d39b4974e89d54588,2024-07-23T14:36:54.493000 -CVE-2022-48867,0,0,cdd047098e7521891c64deaa6d25be49842462ad499b251cb71897e970e14bee,2024-08-21T07:15:03.860000 -CVE-2022-48868,0,0,d1c9f109ad55e8fa7ebd6611ad85522572861fa6a96af40a1451028039bedde0,2024-08-21T07:15:04.020000 -CVE-2022-48869,0,0,fe2b46dcde73a065aaef6bbb2d64a2a6019a5844d9c9a779546ccd065327c86d,2024-08-21T07:15:04.080000 -CVE-2022-48870,0,0,f103a70546b0fea7da1c9b26e866e130156eeb50cb671bad4018602f257f6ec6,2024-08-21T07:15:04.143000 -CVE-2022-48871,0,0,3b9cddd5780de08b555fc27072967febc10ce2fd574e7bacf345c4b605723334,2024-08-21T07:15:04.207000 -CVE-2022-48872,0,0,75918a455a4bfa3a2688bbffc3eb8e9e314d3535e8115c003d60b7dd1d5e0961,2024-08-21T07:15:04.267000 -CVE-2022-48873,0,0,ea092bb358b9c94909bcde1559b32c04a00f1ab1699c941a1463fd380899b857,2024-08-21T07:15:04.323000 -CVE-2022-48874,0,0,468e09a2a5eeaa2755a7d415e567d3eff2867962b69d211104afeaca8ab92fc0,2024-08-21T07:15:04.383000 -CVE-2022-48875,0,0,a0141b16291e68f99cfcb9f169a9bda342d0633563073a84652c0e457c47362b,2024-08-21T07:15:04.440000 -CVE-2022-48876,0,0,47f94c9f4b42488d0aa7a60b502db5a11d6a5df1238c6b6ede4bbc43a797f636,2024-08-21T07:15:04.500000 -CVE-2022-48877,0,0,ddfa915241190e684d3e8bfb0eca8764585da3e9f0aa003fa991adc8cc0e9249,2024-08-21T07:15:04.563000 -CVE-2022-48878,0,0,8b02d6b36d19bd2a3aaaf66743daf8592ac5b9adbdd3c022a77e24cf7c7ecd8d,2024-08-21T07:15:04.627000 -CVE-2022-48879,0,0,aeabd97414625836a8f9298ca40977fe0b1fa6d5eda686cfcf07901afb6f43a9,2024-08-21T07:15:04.690000 +CVE-2022-48867,0,1,a4f32af44cbc4258e942225eff9e702a5fd636e6c07338494bb2e4310cec1387,2024-08-21T12:30:33.697000 +CVE-2022-48868,0,1,57dbbf329a75678d54bc1c2833e9c06e9b992acc06784373365efa1004b48d3a,2024-08-21T12:30:33.697000 +CVE-2022-48869,0,1,ad6f58d1951d054b1a35918d79412efbbe5e5edb9f424ef9c37655d9265c328d,2024-08-21T12:30:33.697000 +CVE-2022-48870,0,1,05677a54a122a9e95530f7859032c9158eca3dd913e225466479610394eb0450,2024-08-21T12:30:33.697000 +CVE-2022-48871,0,1,a7ab0efb32cb12de0391c14350b9234df7cac9b75c62f09ce0060789923d9ab9,2024-08-21T12:30:33.697000 +CVE-2022-48872,0,1,ee4d8f8a3991e2bec8ac24188bd97f88a4a2a81debc8e8a87273c1aa8e4f4952,2024-08-21T12:30:33.697000 +CVE-2022-48873,0,1,126f5bc7205e96dcf9533a79fc89b99529bbfd5ccd8d6cb5c8905ec1069b380b,2024-08-21T12:30:33.697000 +CVE-2022-48874,0,1,a6c864c3a92516d0f0aec87426fd60c34bfb2796aa1e1f5548ea107880d9c953,2024-08-21T12:30:33.697000 +CVE-2022-48875,0,1,b8b4945dc7e975ae01eb8606b6b723bbebceb0d02e800c7c0a97715f500043a1,2024-08-21T12:30:33.697000 +CVE-2022-48876,0,1,4e20104dff67df344572af6b7288abfddb9e0e4cfd9f3c36cd38234f6921db0b,2024-08-21T12:30:33.697000 +CVE-2022-48877,0,1,d0140bada1488aff185a55a8ff5dbe996bed08880b8d163988e4a2d24f486b98,2024-08-21T12:30:33.697000 +CVE-2022-48878,0,1,0f00aa6217987ed4eacef1c03b9327912fb4639289278480001b0467c41b439b,2024-08-21T12:30:33.697000 +CVE-2022-48879,0,1,f37b5323b0e913a9a8f4aa1b41b00c37ed416d2d901dfb6236ff6a06762073b7,2024-08-21T12:30:33.697000 CVE-2022-4888,0,0,b679e23092f1369239dc0dfe1d4aeef981e952b9db5ffb43ed815e206bd3f53d,2023-11-07T03:59:13.600000 -CVE-2022-48880,0,0,5cf0a5254b2a947c94fb61e1c868c4197288be4f4f8f0053252bc15eadd334ec,2024-08-21T07:15:04.753000 -CVE-2022-48881,0,0,8cbfc7d20f8001ea8199ceb8ed2872608bcad56c807318ae864b8fd8b1658f65,2024-08-21T07:15:04.810000 -CVE-2022-48882,0,0,238125e63160f60623a1c2fa126c76674397d24bea5bc79b1945f3e5286c944f,2024-08-21T07:15:04.863000 -CVE-2022-48883,0,0,4f39d6d888cdd491e67f5fafb9b9666cc2a1eb0d9cd32d9a6c82fe6fc5cd0837,2024-08-21T07:15:04.933000 -CVE-2022-48884,0,0,507012b2bd470cfd5f12ce4fad926e3fa8901cd647767819473748f4f1222c0d,2024-08-21T07:15:04.987000 -CVE-2022-48885,0,0,c15f371ac126a03cb4cbbe72245c013dad5271763579159135ac1b29934ad7d6,2024-08-21T07:15:05.037000 -CVE-2022-48886,0,0,9051b99851828ec2d8ddb8676510a648d92a2a1b0a908aec1bb251e85260871f,2024-08-21T07:15:05.090000 -CVE-2022-48887,0,0,68e6e8becb6bdcef30d7a4d69f39b4671f100d7df8ea1fb5d63a1bfdc5634e7c,2024-08-21T07:15:05.143000 -CVE-2022-48888,0,0,bb5191e916e7a22da4484fce9ae4a64a9c3ac07890a87c2da330de7d86f63208,2024-08-21T07:15:05.193000 -CVE-2022-48889,0,0,88da34346ef839c431bf532e9d111858e1ccb11f92fc215f4420ff21e0e7e643,2024-08-21T07:15:05.243000 +CVE-2022-48880,0,1,535014dc78a0cf3939da51e6f231a7ecade974f110d4883d643255c8fd017946,2024-08-21T12:30:33.697000 +CVE-2022-48881,0,1,4529142080378258e7699142e2b76fb0175d5f0fe24d36a6a11bab09f24b7a27,2024-08-21T12:30:33.697000 +CVE-2022-48882,0,1,0c04f0a48f0a2c66c7d16b8f56362ee4d87b9295566754dc03cb9cc95b815530,2024-08-21T12:30:33.697000 +CVE-2022-48883,0,1,393ba512ffb574163a9f61b49138c9f5fd99ee611a3c62b415a0eaf8e576afe0,2024-08-21T12:30:33.697000 +CVE-2022-48884,0,1,442f30c7bc460d0b750d0d62192aad9e98cf9980141831c7f81e4f22265a3feb,2024-08-21T12:30:33.697000 +CVE-2022-48885,0,1,35ac4a7e1e8f5139175ec20c47904c43ea4c403f46b809abb72a048c5e6e4d07,2024-08-21T12:30:33.697000 +CVE-2022-48886,0,1,fbb8cb578ee34c46a629d920c669b5266480d2131c7595f34b24d6250ec06a42,2024-08-21T12:30:33.697000 +CVE-2022-48887,0,1,4c3287af674f510dd827352a6c8dd2e2278b1758ff6afea8a14a98732b28b2bb,2024-08-21T12:30:33.697000 +CVE-2022-48888,0,1,f163515eae2464d9d9302c9a75aa50562ddecdfb55de9befbc0b938c4aa0c79c,2024-08-21T12:30:33.697000 +CVE-2022-48889,0,1,0ace9ae656211a838629351878d5fb993a94475452966e6fd8ea8feece5b1019,2024-08-21T12:30:33.697000 CVE-2022-4889,0,0,e28145e6bac3566714c615b828c485e97008b42961c16fdc8c566e13678a4601,2024-05-17T02:17:01.537000 -CVE-2022-48890,0,0,39f0bf226d76b28261639f14aae6ba7aea2e5b47c7d64b079a82492c1e18b1e0,2024-08-21T07:15:05.303000 -CVE-2022-48891,0,0,a453136cf6485b2d243ff7872eea0e46d838cb47bf51e89e6962b95f7af4e252,2024-08-21T07:15:05.360000 -CVE-2022-48892,0,0,45868c47b9453e14dbab40974b264c5e5757f6e0fc47aadd0ffc11bbd1886d69,2024-08-21T07:15:05.420000 -CVE-2022-48893,0,0,4a1b1af85325f86a0bd47b4a695a8da657a543ef9d1bc03255faed28bc22262f,2024-08-21T07:15:05.477000 -CVE-2022-48894,0,0,d9c7e7ea2eb3fab0f72df125cb82f6b566609907e3c96520a0a0e0225650a159,2024-08-21T07:15:05.527000 -CVE-2022-48895,0,0,34996717b44d3bfca980912d689048639a61724603fa0fd5b8f5ae08bae670cc,2024-08-21T07:15:05.580000 -CVE-2022-48896,0,0,48dae6adeb402ca2442ef781a0e993f00e1176b3de1d6761e706d74587021d79,2024-08-21T07:15:05.640000 -CVE-2022-48897,0,0,fb62568da841f70e07386a9c634430265eaef90f31f656eaf2df736efdd667b7,2024-08-21T07:15:05.693000 -CVE-2022-48898,0,0,3a0276bbbc377ad49f0760f8ea0b393d28d10477acfd2681220f9edba0639ebb,2024-08-21T07:15:05.750000 -CVE-2022-48899,0,0,9d847cc32614cf58376c3994aa3ea22de3cfae6e33079188def9b87973800628,2024-08-21T07:15:05.810000 +CVE-2022-48890,0,1,8d471a89cf6880b7cd37d8d0ba6cb3ed39cb14ceca4825d111dc75c6f9a3e804,2024-08-21T12:30:33.697000 +CVE-2022-48891,0,1,8bd1ccf93fa3137f130f10ac98df13c7e237c10f47e5ecd1db0e42ee6854040b,2024-08-21T12:30:33.697000 +CVE-2022-48892,0,1,7f50c31454caf3e0e2cd5084fcbf62ad7daf82734016173e45e0b917ccec0adb,2024-08-21T12:30:33.697000 +CVE-2022-48893,0,1,645849ac15c6c57ced5bada514698b028f54849a319712c5a87536a648b54450,2024-08-21T12:30:33.697000 +CVE-2022-48894,0,1,cc9217ce9add8b5aeed626510c21b98581e273835dc5ae73be0685c1b9a6cdee,2024-08-21T12:30:33.697000 +CVE-2022-48895,0,1,19ad666c46f620b30858124ae15f808ef0522f778d905672251ae5956cb52cb6,2024-08-21T12:30:33.697000 +CVE-2022-48896,0,1,c92022674c5851a1d89368ba3318515bc47afb75c24cf98d931b43f923f0d707,2024-08-21T12:30:33.697000 +CVE-2022-48897,0,1,a6f0e85400bd9699693ba1d35d5bdbfdbac3685639be1f6ee3d1f2d589983125,2024-08-21T12:30:33.697000 +CVE-2022-48898,0,1,db123fbf5ec577b4cc5c353572831875154cf4dfd348ca1511458d53d92f2971,2024-08-21T12:30:33.697000 +CVE-2022-48899,0,1,307122423943779556534a3fc536d67a546d19e3083d1df8d83008bd134af184,2024-08-21T12:30:33.697000 CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000 CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000 CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000 @@ -216644,7 +216645,7 @@ CVE-2023-22572,0,0,778132e3b3f1c6111ec36dfa71316889039f517589afb27544bf256807f05 CVE-2023-22573,0,0,695940d0a93594287fdbd9acbc9b34e26235c4d79dab66e64e7b07d3ab3ac00f,2023-11-07T04:07:03.490000 CVE-2023-22574,0,0,aabdaef9b03b49d2d5c4e805d45fdd5dedd66691d702929398a4937fd5b7eac8,2023-11-07T04:07:03.700000 CVE-2023-22575,0,0,0fa7814eb835b1136895274bd2531f1a8e8cbfed45eb164215437ecf3caa9fba,2023-11-07T04:07:03.910000 -CVE-2023-22576,1,1,f34c873317b85e1cc8a94c6e89652edd8bcceda8efb18db311343ae15a5c58bd,2024-08-21T10:15:04.173000 +CVE-2023-22576,0,1,66803a5adeab0382347c0f36ef2052007283687f969f732f04f0db18304bd256,2024-08-21T12:30:33.697000 CVE-2023-22577,0,0,e60adbac0fa6d3fedb1bcdd27e7e5af2dd2842bde5e722c2b627410b2be78279,2023-05-02T19:13:08.980000 CVE-2023-22578,0,0,aa99ee9b2e1474cc51633927001ee761e43c7fc8e969c212365f2e94662f2910,2023-03-03T19:23:56.890000 CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05dfd7f,2023-04-28T18:50:21 @@ -236629,7 +236630,7 @@ CVE-2023-49190,0,0,86cb6859aa19958c166ca64e47676d44af4b98597ca7dd177a61fac83182b CVE-2023-49191,0,0,34969ee3df3717ecd0fd0437e5d4d4fc0bd1f9b89d2160d0adca8969e1a92937,2023-12-21T17:20:50.323000 CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501171,2023-12-18T19:48:51.397000 CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000 -CVE-2023-49198,1,1,396f914d30a46917822b7244e0ebed77f8413fe2f0d5d066a5087cbf0c9fecdf,2024-08-21T10:15:04.903000 +CVE-2023-49198,0,1,725821010494a68156c9175ca615f3473dd5f531b7326767a74a87073d266fca,2024-08-21T12:30:33.697000 CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000 CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000 CVE-2023-4921,0,0,d59093adbc168eaf1f1dcabc1b2c8846c3b0575f8dbf1988414be85426e1ed5d,2024-01-11T19:15:12.373000 @@ -239239,30 +239240,30 @@ CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000 CVE-2023-52892,0,0,32d862a219e297bef87d6af26c1c79f877a4570bd3376c8ef713855d979da993,2024-06-28T10:27:00.920000 -CVE-2023-52893,0,0,b44edc36a2cdd85da84249057ec53101430dac5a8ebb6a2c47313223f74913c6,2024-08-21T07:15:05.880000 -CVE-2023-52894,0,0,1f853e060c40816d7b437ac94820c0a1a076d4a0d1e97ce4c12e9a2002266c8e,2024-08-21T07:15:05.943000 -CVE-2023-52895,0,0,7becbccbe98e47a54670a06c1177ccde1cd6362450068cd1b83c2e92ec630280,2024-08-21T07:15:06.007000 -CVE-2023-52896,0,0,d3bf2194b67ca6deb47910c1feb19be2d3300f09be3d5fcc9502856d2530118c,2024-08-21T07:15:06.060000 -CVE-2023-52897,0,0,7f5b939c20664e292bbdfefebb360e552cd1d88980ae57294055e5d297fc03c8,2024-08-21T07:15:06.120000 -CVE-2023-52898,0,0,bd4ed759d32b9b408b843ca971610071a604e502dedf583651093af838b4c3f6,2024-08-21T07:15:06.180000 -CVE-2023-52899,0,0,f94522c4b5582f0c2cf0f1cdfa920542166663012ae0d2861afeac7dbd8d1cb6,2024-08-21T07:15:06.237000 +CVE-2023-52893,0,1,f90ef0c635dc5e96ae72022334213ea95dcab5dbd307cb21411266f0404ac61c,2024-08-21T12:30:33.697000 +CVE-2023-52894,0,1,2e1a1b33551b46a32f161e1e0895eb9b4109ca7bc25f7f829bb0be0a183d33af,2024-08-21T12:30:33.697000 +CVE-2023-52895,0,1,cdfca4de01d01d96f66c1e396dc4f20d4c8ed5ab2a7bd7e0c026a8f8a9b624e7,2024-08-21T12:30:33.697000 +CVE-2023-52896,0,1,9e325490170ccc4699bb7b2ee59b01a2d937cd6c944eadef3ced0101aa04b448,2024-08-21T12:30:33.697000 +CVE-2023-52897,0,1,82b03590aeb7d06adb91a062613ce07818803afc103ed1dbe0c2fa0e9ab8e79f,2024-08-21T12:30:33.697000 +CVE-2023-52898,0,1,8cbaa4f931cc670c627d6baab668fa553d62773113ab9aefa322a75178095563,2024-08-21T12:30:33.697000 +CVE-2023-52899,0,1,3e7c3fec06aa8337f05283e52d323844bfb68ce304710259cf7ba04775acf96e,2024-08-21T12:30:33.697000 CVE-2023-5290,0,0,255136b2a2d1074a86a7ffaaa04fac7dce086f58333ef45175fedd871048a368,2023-11-07T04:23:48.727000 -CVE-2023-52900,0,0,2350fa55886cb47ebc13f866d003c8f547e5a8ed3014035d8e0344099ab09eee,2024-08-21T07:15:06.297000 -CVE-2023-52901,0,0,2b6b46b8f1582cd6183c36472ee0019222c1ed445a9a7e06e45c7c908fd222c3,2024-08-21T07:15:06.363000 -CVE-2023-52902,0,0,5301f846c75805f813245f8df15b7c5c5ce897c7b3f8fcd63bbe773a69a65e11,2024-08-21T07:15:06.427000 -CVE-2023-52903,0,0,5c79f08b2e4b8a002772bb3da9f3ad045e0a2261c7db62b8e25341a7bf7b37d4,2024-08-21T07:15:06.480000 -CVE-2023-52904,0,0,40f6a244e47418265433b067f6c491948d1e99214ae1d263dac24c42b5079983,2024-08-21T07:15:06.540000 -CVE-2023-52905,0,0,e4ade75ae414ecfb6d8138fd94894bb5bfbd46760ae741f522f68e53dda3327a,2024-08-21T07:15:06.597000 -CVE-2023-52906,0,0,20b61617be2e5ddb90bf7dcfa2cbdde43fb4ce975ef1025d4e02f19f1e698f2a,2024-08-21T07:15:06.663000 -CVE-2023-52907,0,0,5d21847bd162dff651037227b0b145b4392442e8a81f3b8678a41059f2498860,2024-08-21T07:15:06.733000 -CVE-2023-52908,0,0,cada97a9b33aecab7684f6d8e4f949fff1e7b535f7446e135a7e97a7edb00e27,2024-08-21T07:15:06.800000 -CVE-2023-52909,0,0,ed21478189dcd9bdb9c1040c7ac2052582b55883366a1575fdfb2434d24e8206,2024-08-21T07:15:06.857000 +CVE-2023-52900,0,1,81240c8c480ef8ddae7c158b4fa428099d73bb12c00aa748494b792b317ed795,2024-08-21T12:30:33.697000 +CVE-2023-52901,0,1,fe52f7c792ad7571bc707668147e40ccb358389559237904f7be5b1484f2a42c,2024-08-21T12:30:33.697000 +CVE-2023-52902,0,1,3a64241fa436c92d6c706f2f1a9cd760f8e4afbae6798b96764358815a2089a9,2024-08-21T12:30:33.697000 +CVE-2023-52903,0,1,0aa8b0d65ef802e80c46f464ba59aa3ef4316db172397d8024ec3cd40c35377e,2024-08-21T12:30:33.697000 +CVE-2023-52904,0,1,9159f3d88ffe60703cc1158899822dd69c776cd123eff1f6b788ce237399c534,2024-08-21T12:30:33.697000 +CVE-2023-52905,0,1,844ee3d3038a6437ecf0441373cf768d006831998b96a872e63658d73d7e6f9b,2024-08-21T12:30:33.697000 +CVE-2023-52906,0,1,e98f3e29c32310af81557e157270ce7904a2ca0d7b45b08b6ee8191218342cf4,2024-08-21T12:30:33.697000 +CVE-2023-52907,0,1,141e24817be8a675a6819819dc5baaed8798b4d4f62369fa55c31c3d6cfd1b44,2024-08-21T12:30:33.697000 +CVE-2023-52908,0,1,4783116bdb1bfaf8f17335f1a6a04ff145a0fc1fb9d401f4d5b1884abbab9ab1,2024-08-21T12:30:33.697000 +CVE-2023-52909,0,1,79ef8120e9d4331997e82f95401edb5e5c58c884d3651131b21caaecd8546c2b,2024-08-21T12:30:33.697000 CVE-2023-5291,0,0,9fbf4165ef098167a71fe88b00d2bfc45902a0f6c10baa2f3dd4bdabd4d91739,2023-11-07T04:23:48.757000 -CVE-2023-52910,0,0,bfbb9e6d24e3702c61876f69c2ad6447bffbbe132976da491d68acb63049928e,2024-08-21T07:15:06.910000 -CVE-2023-52911,0,0,ac7859752d845ae191861aed248a033a7108870eae69cc8519650c0488e8e59d,2024-08-21T07:15:06.967000 -CVE-2023-52912,0,0,c0a3e4d87467f009e4102e719c6b5fcd5fb26ceeb7abb50dc229b477c8dda4e3,2024-08-21T07:15:07.020000 -CVE-2023-52913,0,0,f35d3d04987097a61f1949515901b96c566fcc632e43d33fadb3594621956f1d,2024-08-21T07:15:07.087000 -CVE-2023-52914,0,0,3a1a2998871bc54e3d6d5c458e76fc1487477a2da0da908c417fe5277db8ea4c,2024-08-21T07:15:07.143000 +CVE-2023-52910,0,1,6b3d63bc178db249c11a51b9cf4ea7a47d69138276715e0929d9b6d5460b9ebf,2024-08-21T12:30:33.697000 +CVE-2023-52911,0,1,2af2c3d0ac94f18832bdbfb812cd89f5bcf7c455fbb47f44325f26b9fd555651,2024-08-21T12:30:33.697000 +CVE-2023-52912,0,1,35e2fb23cc2b3d8ee8ace75dae24510a27a1acc79e782a7f50807002d781cdc8,2024-08-21T12:30:33.697000 +CVE-2023-52913,0,1,129cdeacbcdf9fc2a03d83d6ec4685ad3195f61176864d5a1f48876e4f68f95a,2024-08-21T12:30:33.697000 +CVE-2023-52914,0,1,acbca0438666849cd79bdf9a02224685d6f456b02987127237c7fe3b8a881fe1,2024-08-21T12:30:33.697000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 @@ -241962,7 +241963,7 @@ CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab32714 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000 -CVE-2024-1062,0,0,cab06f9e66465daaff5564857810540eaa7a6b902ff896c97141dc1991e6706b,2024-07-18T16:15:06.337000 +CVE-2024-1062,0,1,5158163b0a53ecb1d2311455b166b1fa8464d0cc51f215fcc66567750596750f,2024-08-21T13:15:04.323000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 @@ -244183,7 +244184,7 @@ CVE-2024-21985,0,0,5be6c4314c54967db21f569a7eb0edf0296d8e6d79d3b140c3c90dd37f0a0 CVE-2024-21987,0,0,fca4c9f834ddbe9c3a160147983282a262179a060989c8608286cc72638e93a7,2024-02-16T21:39:50.223000 CVE-2024-21988,0,0,8f9115a6d883264ba63cc20f9fd2562d93569dc3327ba10e43009e22c7f4132e,2024-06-17T12:42:04.623000 CVE-2024-21989,0,0,b37107fd2c4d1a57e1c54ea23713cd824a129161eab1168533bf8418858bddee,2024-04-18T13:04:28.900000 -CVE-2024-2199,0,0,8874bb730be7330a3294d680f770333328bbc85669787d883f03061f0a740fa1,2024-07-18T16:15:06.620000 +CVE-2024-2199,0,1,59cfdd5614277a4cdfe41ed7cee8f7ffdb9b280026c3b9f68d7d87a26f4892e7,2024-08-21T13:15:04.610000 CVE-2024-21990,0,0,3f2777f17d0268e19ae7208ee53d1e5f87b95b7b3f1f72a38c6db4b42aa0ce21,2024-04-18T13:04:28.900000 CVE-2024-21993,0,0,bec1cb1a899f83d01555cece7d7239988767e734e499b33253776f6b7390f928,2024-07-11T13:05:54.930000 CVE-2024-2200,0,0,d5a4c544d7b3fb05e31b9bd6329cd0f60f6524be79f4f8737689831ac183f031,2024-04-10T13:23:38.787000 @@ -244436,7 +244437,7 @@ CVE-2024-22278,0,0,f35dc006103cc663388ce8b4cff5063958c5dfc051683cc0f74cfb0c3db3b CVE-2024-22279,0,0,5d8aa0dbd91af7dcc363b8a8ffff6d2d8af807d5702d0e6e6114610449201025,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,4ca7747914203ad7b21ad0d53afc1cc8d90ca3afc5fa0d3e8fdef13a47d40ae2,2024-03-22T19:02:10.300000 CVE-2024-22280,0,0,3da3aabe176d318c08d6891e24f9a02048e4a39b0f9e5e399bf16a98c62585bd,2024-07-12T17:01:29.947000 -CVE-2024-22281,0,0,e9c1e482b1c898351df3c0a5e8cdeaabcc45bb6f84c0e61f46dbff0086384fa1,2024-08-20T23:15:03.347000 +CVE-2024-22281,0,1,1d218b257ae9b6b6ce0e1df026d0cfad2498d4b196f9a9742b31380700910218,2024-08-21T12:30:33.697000 CVE-2024-22282,0,0,26b1c47e99c9dffaa9274bb3bd07f383deef3df3849a0c4518fbd4e71b98ba58,2024-02-06T16:55:19.983000 CVE-2024-22283,0,0,544dd9a2e43016c913633959df76087fb16733849536bef1ea079da6811820f2,2024-02-01T04:13:41.033000 CVE-2024-22284,0,0,5e7364fc84632f981109189abefae496a6e3b87af77c98411ed929276f5c79be,2024-01-30T17:43:02.180000 @@ -247834,10 +247835,10 @@ CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431 CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000 CVE-2024-27182,0,0,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000 CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000 -CVE-2024-27184,0,0,7fd0637b82f5a128bd7289879c97a0422e93d38603e9f177a72cfb4bd1571d70,2024-08-20T16:15:10.733000 -CVE-2024-27185,0,0,8326379bd171dbe214049ffac448a92019d575aa0842d4d0f338a755cf9f746c,2024-08-20T20:35:21.323000 -CVE-2024-27186,0,0,7d37766492a8c135811ea900487d2e8814452a8db7d0b8754dbb9987be5d370b,2024-08-20T16:15:10.893000 -CVE-2024-27187,0,0,d6882d61406172688191333efc9abdd503a3b46d1e6f7aabe7b0990c4efd644e,2024-08-20T20:35:22.107000 +CVE-2024-27184,0,1,d27258a08ec723a941addb4bb2a2c30ae14dda17a55ede0aef2dc950361ddede,2024-08-21T12:30:33.697000 +CVE-2024-27185,0,1,daa5d05d2a65f6d930269f75c9d53a762917c3d0c09a9e5ff330264bf9965c07,2024-08-21T12:30:33.697000 +CVE-2024-27186,0,1,f7fe08e5f4b7d5180c79088df80bd67536777321be61e31aba4444583ba7c65a,2024-08-21T12:30:33.697000 +CVE-2024-27187,0,1,32158e2082b18c6d5d5bddb28bf354f8353016a3e995123bcfaff2f5ad6259ca,2024-08-21T12:30:33.697000 CVE-2024-27188,0,0,def19a2058b71e528abca5da80971f2d008d715cb853d3ea2c84141e42391a01,2024-03-27T12:29:30.307000 CVE-2024-27189,0,0,994d0c9d134383fa54dc85b5fd282a40acff54c3ff303ac4e31ff6be7de68f0c,2024-03-15T16:26:49.320000 CVE-2024-2719,0,0,88b98f9c8e1ee55bae1643da5167a65192c054db7f10e8055f2478a756a0d2de,2024-05-17T02:38:27.497000 @@ -250999,7 +251000,7 @@ CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb0089 CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000 CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000 CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 -CVE-2024-31842,0,0,5de51cf62bdb9c9a1071c1f88172b8f5c146c16e43a42b5de51897550d7a8d90,2024-08-20T20:15:08.090000 +CVE-2024-31842,0,1,c71fb8c6136bcf44bb741352dcdb8b01e7e7f93cab2ea6d8db399dc6ff7ffdb2,2024-08-21T12:30:33.697000 CVE-2024-31843,0,0,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000 CVE-2024-31844,0,0,1937c7d5532d433d17341d1780be28aa6de78ba531c8095e0172be3243a39c54,2024-07-26T18:21:23.027000 CVE-2024-31845,0,0,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000 @@ -252827,7 +252828,7 @@ CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9c CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000 -CVE-2024-34458,0,0,4f4f90b054f8f1192a8674e928c96437c64d6fff40a28b6e682bd77b16c11b4b,2024-08-20T15:44:20.567000 +CVE-2024-34458,0,1,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000 CVE-2024-34459,0,0,e23f2c7438f4601aa9a56de6db52d8787783787763d585bc066caf2ee41c958d,2024-06-10T18:15:34.930000 CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000 @@ -253282,7 +253283,7 @@ CVE-2024-35210,0,0,81f5eb1cd2c214fed01b7d479c60a962ea85b697b02b3fceb612e3b93bbf9 CVE-2024-35211,0,0,19534889f081150f139415aeffdc66a9de4b652b6cde992612a0b71b906a33ab,2024-08-06T15:10:56.163000 CVE-2024-35212,0,0,053c3edc590a8c81ff407b4c0affd7ea52fd1601e9d265a6a1927307cc6f4b93,2024-08-06T15:11:27.243000 CVE-2024-35213,0,0,76339f3ccade6707f71873f12fb8a84bb7076efcedfad313066f61130756b80e,2024-06-13T18:36:09.013000 -CVE-2024-35214,0,0,a3f133331b218e29f9b1741fadd53d8625c597ac393149c6d54f55adf0fd559c,2024-08-20T18:15:08.497000 +CVE-2024-35214,0,1,2b31910db550ae62dce0539566e4b97406294e5b4685a53cf976835083028ef5,2024-08-21T12:30:33.697000 CVE-2024-35218,0,0,e1184bfd50c39d7ccb9d3af67c83c225381571c141531e6e99c4b17efa5619ff,2024-05-21T16:54:26.047000 CVE-2024-35219,0,0,d38f1e7fcd795eac766ba6f65b3b8cde339bb119340da2573ee5da93c2c59a44,2024-05-28T12:39:28.377000 CVE-2024-3522,0,0,9fcd750541ca966e32ae6d2621df4edb4119f4023cb2690f2536e43db1908a7f,2024-06-26T18:15:15.547000 @@ -254286,7 +254287,7 @@ CVE-2024-36549,0,0,55197a9eb0c500888bab7cc4a629fb75ed440d45a5f54f4b25e5199e4a6cc CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e605,2024-06-06T15:24:43.683000 CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000 -CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000 +CVE-2024-3657,0,1,5d5edd2c181d124b6fe340f680aa00429419dbcc7ec2b37280e0e8bc6bf5ff1f,2024-08-21T13:15:04.753000 CVE-2024-36572,0,0,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000 CVE-2024-36573,0,0,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000 CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000 @@ -254535,7 +254536,7 @@ CVE-2024-37004,0,0,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33 CVE-2024-37005,0,0,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000 CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 -CVE-2024-37008,1,1,85936969a50ff59ca67989589a6b2eb44f362d8416df47e4d9d579786430837d,2024-08-21T10:15:05.037000 +CVE-2024-37008,0,1,63f0dc5cd207ef15641f66aef3117f90e8b853286deac8238bd90469fdd0043d,2024-08-21T12:30:33.697000 CVE-2024-3701,0,0,d0eb5159a877411bc688498f011f247ba2357363b8455c201bea5174efe527d7,2024-08-21T03:15:05.297000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 CVE-2024-37015,0,0,06f63d10776f12944092a5aeb799730f5be21ccdf02c7eed139cbe7f55ddde9d,2024-08-14T02:07:05.410000 @@ -254601,7 +254602,7 @@ CVE-2024-3710,0,0,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3 CVE-2024-37100,0,0,2b3fe9b89db247c6739af47c680e25c99c767f88c107eecdb29b2289fcbaa161,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 CVE-2024-37107,0,0,f6151dfeaef735d98ee2a1964bf7a62bf00cbaffb6872b2c666a0538498bf195,2024-08-20T20:13:48.467000 -CVE-2024-37109,0,0,6d9561b54eb1585204efd78bb4aca173265e0252b0f8c4fd1c394313da00bedf,2024-06-28T13:15:02.650000 +CVE-2024-37109,0,1,59c880e2cd3e38e3a3c7de833017795e6e64fa002daefd66d3ca656f3048b37b,2024-08-21T13:49:47.070000 CVE-2024-3711,0,0,3b2dc1b2087adfd05ceebf60dbe737e15dd78bf5f431af93b3b9e5c8041fab21,2024-05-24T01:15:30.977000 CVE-2024-37110,0,0,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816b18,2024-07-11T13:05:54.930000 CVE-2024-37111,0,0,cbf55fa6a98f52463d7e8a1ebf3ce64ea395c04f7f627e359b44f9a7ebb3f9b0,2024-08-20T20:22:14.573000 @@ -255316,7 +255317,7 @@ CVE-2024-38170,0,0,9a5e4818a4f15343ab6700f1986a4eade1a06a741ce99851853071b8cb9b2 CVE-2024-38171,0,0,aa4db954dea7257feb4ca1bba22b279bd8d6cf60c22d4187e72bae445379eedb,2024-08-16T19:16:23.683000 CVE-2024-38172,0,0,9422ffd4691df7b41177adbf20666b6dc2c2f954424197bc643adf61474e1a4a,2024-08-16T19:18:06.187000 CVE-2024-38173,0,0,661864fb92068b9447007088b1974e096e25e60690a0e7d4fb855112bee61f16,2024-08-16T19:18:39.243000 -CVE-2024-38175,0,0,10848ee5340e1b284bbc1e55d8516fa184d29cdb778edb569183e0a5826c883c,2024-08-20T19:15:09.950000 +CVE-2024-38175,0,1,7ee3e1fc94700b16d00a2f26c03cfea7234039ed3cfc64750501f773001a7fb3,2024-08-21T12:30:33.697000 CVE-2024-38176,0,0,d026365cfa60427a2aa768447fd78b35c5b5d665c83edd557822602e0115dba8,2024-08-13T23:15:19.540000 CVE-2024-38177,0,0,f6c4f1d43d7e38f03a6491693822f9b2a6b51e959022ad48764d85f77857b9bd,2024-08-16T19:20:08.750000 CVE-2024-38178,0,0,0718359cc65b3baa799d5e8ed6ced3acf1847c46f13cc5a862a0cd0e4acf46f7,2024-08-14T16:34:46.337000 @@ -255380,7 +255381,7 @@ CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d5 CVE-2024-38295,0,0,c8378492e2d02be00aeda8d1da5a5ec5803f1a3bcf3481a4ca52e9e0e7261335,2024-08-02T18:10:46.607000 CVE-2024-38301,0,0,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780cd8,2024-08-08T17:01:45.347000 CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 -CVE-2024-38305,0,0,9f5ded5d6025997fd957a23f5f92925678cad026e405bb3525b8b7c1194a6ccc,2024-08-21T03:15:05.020000 +CVE-2024-38305,0,1,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da289eb,2024-08-21T12:30:33.697000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000 @@ -255866,7 +255867,7 @@ CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d81 CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000 CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000 -CVE-2024-39094,0,0,de22017251a33b96f73dab86fc1a649c22660fc7149e3d8b505bd367896cc213,2024-08-20T15:44:20.567000 +CVE-2024-39094,0,1,750555c9edd0083bf4bab9a297015b076d9622d923fd25a5d13752489b5b9d1a,2024-08-21T13:31:04.087000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -256626,7 +256627,7 @@ CVE-2024-4074,0,0,e0d606c18d1f193dcf25e2a451ef5a2bdfc69d8e090f30f7431f35132ae93a CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c8c5,2024-07-12T16:12:01.927000 CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 -CVE-2024-40743,0,0,af28eadf1bea9ee7db596b6ad671b273d7c4ad3b0798019b4c7067c99523d0bc,2024-08-20T16:15:11.457000 +CVE-2024-40743,0,1,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000 @@ -257106,9 +257107,9 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000 CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 -CVE-2024-41657,0,0,c85222db22d6b1b44c78142dca8eada82e49d8d64e68cde248eb171606fefe1a,2024-08-20T21:15:13.687000 -CVE-2024-41658,0,0,d3fb0b79ef6c090381cc49c02e00e027438d625ecf05569cea02d3351a32b176,2024-08-20T21:15:13.910000 -CVE-2024-41659,0,0,9acb425aca795f9fb72c6d2f0e4feddad05afae522e3cf0dd2a9f0e99b4c4f91,2024-08-20T20:15:08.207000 +CVE-2024-41657,0,1,9548b1223e9a93c24c88da65f71fa257164363d0fa8c7101bf5615f81fe0c55e,2024-08-21T12:30:33.697000 +CVE-2024-41658,0,1,6ae504120f32a9740f2609938bf47828d872f6a284b7f6df52aa43fde2a8ed46,2024-08-21T12:30:33.697000 +CVE-2024-41659,0,1,ac2558137e8051c9ac6fc033ad0bed168630c3da876cc8a763620352aee78d81,2024-08-21T12:30:33.697000 CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000 CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000 CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000 @@ -257178,7 +257179,7 @@ CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d30 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 -CVE-2024-41773,0,0,6e907628f89464106e5e2af6c3012d6c64389fcc068e9af53a1b152fdfda2de6,2024-08-20T20:15:08.423000 +CVE-2024-41773,0,1,e915a596fb7e1ca4e452145ef4744da8e1b8ffba9e32d109e0437370be6438d6,2024-08-21T12:30:33.697000 CVE-2024-41774,0,0,7818c8adf317bf30a416f15f6b032dd47bfa6f92a75c0e563bc173e90a8f11fd,2024-08-13T12:58:25.437000 CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 @@ -257305,7 +257306,7 @@ CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b9079070 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 -CVE-2024-42006,0,0,7c9ea4325bde54cb0392559d0cf8d02dbee33e07c543ed3907cca47637f09739,2024-08-20T15:44:20.567000 +CVE-2024-42006,0,1,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000 CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 CVE-2024-42008,0,0,54c5efe7cc13cbb13be4a33dc9811a7d441226bfd6f8fc26ec0019f7ccb6db29,2024-08-06T16:30:24.547000 CVE-2024-42009,0,0,b6a6b7e03bd3d7f2ada73a4d7d0bdaecb6dc8a9c6d65a8f836b258bd083ab66f,2024-08-06T16:30:24.547000 @@ -257565,7 +257566,7 @@ CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 CVE-2024-42334,0,0,36d922c7aff1cbc406d7d1b44890a9833509e3e270339a0dfa4e888751ed0cea,2024-08-20T15:44:20.567000 -CVE-2024-42335,0,0,a5ed85480f5d7ad18009700b8af13efde681e0f7cd9008cca9a4d118664b8840,2024-08-20T15:44:20.567000 +CVE-2024-42335,0,1,2b9b97973dd654c6eb68cc221bad7788b92938b457385b73625ca969f07db996,2024-08-21T13:49:19.863000 CVE-2024-42336,0,0,9d50c356f0d4adf09aca00c9c846bf696f6bb56ab685e11cd2eb3baef191e723,2024-08-20T15:44:20.567000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000 @@ -257582,9 +257583,9 @@ CVE-2024-42357,0,0,7b039f202cf78cd0431d1a42b63791f2941347495cf765d1f5a63b9327175 CVE-2024-42358,0,0,3235df447217095f8cbf5213ea3a6f300e00850291878619ee95d2566fd638a9,2024-08-12T18:50:20.967000 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 CVE-2024-42360,0,0,c0e81a640f58f96b9fc0250139f55b49001f14d12c83fe8a549cad0d8c4e02a6,2024-08-16T20:00:10.467000 -CVE-2024-42361,0,0,800032000ca5ef0bd0ae2bd26364e28c0989ef0b5b7b437583fe7898566e7ec8,2024-08-20T21:15:14.120000 -CVE-2024-42362,0,0,68cc48d79832fa9c931573dee25ebe5ecf3e29542c8caae4783fc7f8daab592f,2024-08-20T21:15:14.333000 -CVE-2024-42363,0,0,e0b0eb83bcc51f06ab643aa38ac73c9add143c0e7ceb56ba9d4b275a1b5e3a18,2024-08-20T21:15:14.543000 +CVE-2024-42361,0,1,5d36be7b51525539b0b8ae62b66b7f8640ec3cb8e6a3450f2b1ad7da62e59af6,2024-08-21T12:30:33.697000 +CVE-2024-42362,0,1,31ef3287f3935e217a1d7bfe2a60b1c3c47582894049ac650e7ed832aa61c859,2024-08-21T12:30:33.697000 +CVE-2024-42363,0,1,845d80b3d90627c09cd2ebcd1015d3397a70bb5dfd2fb99126f84654bc7633e2,2024-08-21T12:30:33.697000 CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000 @@ -257684,49 +257685,49 @@ CVE-2024-42562,0,0,95374f95cddb8581f360fb4a8bda45010193fe86e767e637b2647fc080f29 CVE-2024-42563,0,0,40129ab7d8048132e234dd5b3a3d8048368dc40b360ab46b202db5c49bfeff90,2024-08-20T15:44:20.567000 CVE-2024-42564,0,0,d11dd74cdbc88c75461941d9a4470126fb867541e46ed51b0c7bf5d3da3ec994,2024-08-20T15:44:20.567000 CVE-2024-42565,0,0,1591c4cab80f6693619cd5a4da52c8a7cd3181b67994b124b718c4e4c7faf1a2,2024-08-20T21:35:05.227000 -CVE-2024-42566,0,0,7daa25d3c4f0a63407e0bc50929380dfa16a41d6aa786adf6bd1d237e6492904,2024-08-20T18:35:08.070000 -CVE-2024-42567,0,0,c1d9eb056c12ef59c4fe6fcd805840475e624509de9f2c5b83f4542977702ff2,2024-08-20T18:35:09.340000 -CVE-2024-42568,0,0,01ccc6dcc47dc5700cf3cc130beef5afa932e01c0bddd838d26a2642c7293ed9,2024-08-20T15:44:20.567000 +CVE-2024-42566,0,1,98ae4d4c54aadbbb33d8445750ac45a5fb4d45d2ba72f710ffd19034073726bc,2024-08-21T13:47:05.013000 +CVE-2024-42567,0,1,fa925fac4049dc81680b6b86d83a2403e69ca3e4e76faf0a9fa11845b2f9f031,2024-08-21T13:46:48.087000 +CVE-2024-42568,0,1,6e34876cdb41f52a18fce2fc511397baae5d2ee6e14fed378e5f6f52ff4bd0ea,2024-08-21T13:46:29.497000 CVE-2024-42569,0,0,a2bf09fa7918830ac6a9bdd170fcd5f4025f3b5655536c64aae4250f3722f774,2024-08-20T16:35:27.333000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 -CVE-2024-42570,0,0,9fe87da2bb598fbfd3a76bd9d53e750d40e9ca2872980235c42e68a51b383693,2024-08-20T18:35:10.617000 +CVE-2024-42570,0,1,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000 CVE-2024-42571,0,0,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000 -CVE-2024-42572,0,0,126962f7ac97dfad95cc268dbc268718fa32df05ca10c4b5ff2c9c3a32c2a74b,2024-08-20T15:44:20.567000 -CVE-2024-42573,0,0,1e21888771d4b7d45592dfe8c5f31922c592bd2540bb3ae3fada72d76e0e6cce,2024-08-20T15:44:20.567000 -CVE-2024-42574,0,0,2fc1ecd2ac456ab4859be7ed80e428e71f270ad699b08592facab878d6597ce9,2024-08-20T21:35:05.983000 -CVE-2024-42575,0,0,bd856d06bee1b3e46a392ed0c60b77d2988cdd6cb2adb696081823bfef734429,2024-08-20T18:35:11.897000 +CVE-2024-42572,0,1,d5e756401e0b9e3659d31dbdf17fd8a71113d1c2dc4fe792e3169491d0c4f5a3,2024-08-21T13:44:58.823000 +CVE-2024-42573,0,1,c4d9e0f6d8b833e2509d8c2910fa5ba22120e6bbd03b4460129e761d76e30cf4,2024-08-21T13:44:48.360000 +CVE-2024-42574,0,1,aa616629d677652eb91e6bb032b777df1c13de96e0b62fbe4b20bbe0e1fe4f9a,2024-08-21T13:44:39.147000 +CVE-2024-42575,0,1,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e7197a,2024-08-21T13:43:06.420000 CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000 -CVE-2024-42577,0,0,84a2e11bebf6320927bda4a0681e6c2f8b953c02ff4eadfe92c943b500781a83,2024-08-20T15:44:20.567000 +CVE-2024-42577,0,1,11efe01cf6381978d4e4c0b926e00bed4bbe2af9475b2fcdcb2e011bd6164110,2024-08-21T13:39:36.670000 CVE-2024-42578,0,0,e49e6d1eec15d8971d4646a9d9f4fa585ff2792aff3d9892d55116d7caa208d1,2024-08-20T15:44:20.567000 -CVE-2024-42579,0,0,0585538f9b5f24884fdac13436bd67d1fd5829c1b74794210d8b0c050a31b4bc,2024-08-20T15:44:20.567000 +CVE-2024-42579,0,1,fa99ce7ac5f22e1d2334d6eec7f7550bac4275b5f10f14882b3897e6f5bad313,2024-08-21T13:39:19.630000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 -CVE-2024-42580,0,0,962c47c1c538e2b4f9625ab61046e750d1b7b0b3f20d81c37bad356e214c8ab5,2024-08-20T19:35:11.603000 -CVE-2024-42581,0,0,7288867d4ba1fa105d1ed38795ed490d6d16147379d19577aace2ddeefe3b096,2024-08-20T21:35:07.197000 -CVE-2024-42582,0,0,03d748c10ae9959b4998e3563db5bffa57a6abfc578a3cb2bc09d84be409577b,2024-08-20T18:35:13.170000 -CVE-2024-42583,0,0,7b4eabcd2b8559a85ee0934e076885967be0b81e9d370408d7ad09ecbfbc3492,2024-08-20T18:35:14.437000 -CVE-2024-42584,0,0,547db4345dafdee39ffaa64277c067b846e6b23f555b2f488f71b1ed2e7a12a3,2024-08-20T15:44:20.567000 +CVE-2024-42580,0,1,2990563b67d4dc92b3ce407afe260e1a67fac4a4f00be92eeacf912a244c329a,2024-08-21T13:39:07.857000 +CVE-2024-42581,0,1,c905d276d2309271a54559459476e6aa55a4022f51585f282439786c09ceb2ed,2024-08-21T13:38:50.380000 +CVE-2024-42582,0,1,bf5f7376ea0a37dc60484dd411de31d4a785c3f497f341cc1b189b0708911010,2024-08-21T13:38:36.603000 +CVE-2024-42583,0,1,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c136e1,2024-08-21T13:38:19.947000 +CVE-2024-42584,0,1,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000 CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000 CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000 -CVE-2024-42598,0,0,a0ea7bca3a0a60be3c4f9892feb74f575387beba21f13c554e0f97620e095743,2024-08-20T16:15:11.727000 +CVE-2024-42598,0,1,f84068afa431dac666314c81a0e0ae65b2644ef29efa564d1b4da4b712849c95,2024-08-21T12:30:33.697000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 -CVE-2024-42603,0,0,d325871435d5c9233ee0c2b175063435b805fafdfc62278206b91bae25f9e1ee,2024-08-20T19:35:12.840000 -CVE-2024-42604,0,0,c9c8978a1ff0508c491960cd28ceae738b52daeffde14edbe507cd264dd6399f,2024-08-20T15:44:20.567000 -CVE-2024-42605,0,0,0f257c2c0df1c04ec5c08215a5943d9e711f43c7375df277f60670bfe791b48b,2024-08-20T18:35:15.713000 -CVE-2024-42606,0,0,e0b91978731670ea0b9c51b31de0fa33ccadbcc2a752e7006338fb8c4b77aa46,2024-08-20T18:35:16.980000 -CVE-2024-42607,0,0,e6b6c6fb761003b002c38ff7739e2261a191bec011dd23d1dc8b045311299376,2024-08-20T18:35:18.240000 +CVE-2024-42603,0,1,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000 +CVE-2024-42604,0,1,c728aa7d1997da2891fdaf68c4e186010a0ab578e913f3d19b193328f99c33c2,2024-08-21T13:12:50.820000 +CVE-2024-42605,0,1,3d7b70705f0c340fd9e9ac2feaeb7c16213ffec0f6a7c6374438550a8c1d62c6,2024-08-21T13:12:40.957000 +CVE-2024-42606,0,1,e46323a2b9a85aad3954a3b27bc1e8c958b659372d991d6df8f73aab5c26bf01,2024-08-21T13:12:27.070000 +CVE-2024-42607,0,1,b5b5d184fb29386f840a66de2587a7be0c2df56835ad775e585769a324e9820a,2024-08-21T13:12:16.913000 CVE-2024-42608,0,0,8ead7d3513622cd9cafe6103807b025cedcbbac585441bda0ed3d95a857e9389,2024-08-20T15:44:20.567000 -CVE-2024-42609,0,0,c0c178be3040b5fff7f57d16cdeedf2f90d807c7fef1e9681e67629eb9f59b17,2024-08-20T21:35:08.410000 +CVE-2024-42609,0,1,f63b45fca798ad24817857f390287beb793195563f037ecfcae8997c9ecfddec,2024-08-21T13:12:03.427000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 -CVE-2024-42610,0,0,985656c8e1859d40f1787072228076981bb6369edc8d6decd386d8eb49ba477f,2024-08-20T18:35:19.523000 -CVE-2024-42611,0,0,847ea5cd106efda1b31685fec0882f99e5f9c3ca7792d82db0ca8f77fbee7eea,2024-08-20T16:35:34.633000 -CVE-2024-42612,0,0,74920fa42016433228e72ef695770b7397212c8ef1ed53ed5acbf23921865152,2024-08-20T18:15:09.660000 -CVE-2024-42613,0,0,e2f29a70e08ccdd96b19afe3dc9bb94e9b7c6806b065790741e6a9e18e244ea5,2024-08-20T18:35:20.787000 -CVE-2024-42616,0,0,90ebc0bebd55c5801efb817a3e7ab17f558c021b69a36235e165fb7a039f647d,2024-08-20T15:44:20.567000 -CVE-2024-42617,0,0,1f8d16b46ddae04971bb01c1394471ce3d96b86d76e3a8fa32eecf5fb3736296,2024-08-20T16:35:35.733000 -CVE-2024-42618,0,0,40f3437cdcd2107ffd5b134286b05765377a077ef1bad93e36329e534cba07be,2024-08-20T18:35:22.050000 -CVE-2024-42619,0,0,a3f2acefff09dff53f2e69597b2d7bc372b40ddece5234aa24fc4701c4903b78,2024-08-20T19:35:14.070000 +CVE-2024-42610,0,1,9ff653a6a99494fed368590a85a46ec66dee52a770d3e028c312550d378eb0f9,2024-08-21T13:11:37.863000 +CVE-2024-42611,0,1,f9674380fc6f878f1ac0ab8729105a9d78b38c8b71f0a0730627362d566fed82,2024-08-21T13:11:27.467000 +CVE-2024-42612,0,1,ba8cb6ffc04d8779516139bc3c318091cbd49d76e94a9a5a1c451edb4e4d6fbf,2024-08-21T12:30:33.697000 +CVE-2024-42613,0,1,6221a14ebaf52652c0c84fec6a243252d38dbbfd2eaa4426e4cb9e2770861a6f,2024-08-21T13:11:06.807000 +CVE-2024-42616,0,1,7bee95a5cbe45629c3e71b1e12aa6afe4fbc410af1d1f91cf79c5dad28a1561c,2024-08-21T13:10:56.257000 +CVE-2024-42617,0,1,28cb54a107433a0012884815935f086d11a13f698ecc4f093de34f4378dade94,2024-08-21T13:09:48.897000 +CVE-2024-42618,0,1,1fad9f26767fe4bc2b21ab955de8140e240e642a937fb90f5d789394abc56bef,2024-08-21T13:09:33.787000 +CVE-2024-42619,0,1,1dc35d1763e0cb96b3c563bf038903bd2957f4dcebdaf6a803403f097ae358ee,2024-08-21T12:30:33.697000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 -CVE-2024-42621,0,0,f2b44e20260f6aa4286312fe90cd0eed6ebd6e03ed8b6b85c7dc17f8f7663e2c,2024-08-20T18:35:23.343000 +CVE-2024-42621,0,1,64f6f994782d88cf131213bfdf262ee8516865b9ffadc1a60f1ef8fe28ea5c6a,2024-08-21T12:50:32.727000 CVE-2024-42623,0,0,bc6ed2a4c8b4194e95ad5cff4494c1d77b65b6e029288a20eb974c9e2fd7502c,2024-08-13T20:35:12.777000 CVE-2024-42624,0,0,13a200a50303b94ee2a9c0f889b5dc513260afbf05e91cf9385719f04ea77284,2024-08-15T17:35:08.070000 CVE-2024-42625,0,0,a336ad04b717d78488d075fbe4f05189cb75b4a8481071a35a5b1b1eee244b14,2024-08-13T17:37:07.567000 @@ -257754,9 +257755,9 @@ CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3 CVE-2024-42676,0,0,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000 CVE-2024-42677,0,0,85c08a22e8a37131c90308072afe209c51004b01a70c30ff33acbdf877c43e4a,2024-08-19T16:08:17.727000 CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000 -CVE-2024-42679,0,1,2ffe2a4be5c215d810f5b898b95b8290538512d66dc44037835c595a5e530f63,2024-08-21T11:06:24.627000 +CVE-2024-42679,0,0,2ffe2a4be5c215d810f5b898b95b8290538512d66dc44037835c595a5e530f63,2024-08-21T11:06:24.627000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 -CVE-2024-42680,0,1,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000 +CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000 CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 @@ -257796,10 +257797,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 -CVE-2024-42919,0,0,0d4d9236af3e88e77a598ff9abf029cb75f753ce61fafb7445e61745bd695bdf,2024-08-20T17:15:19.463000 +CVE-2024-42919,0,1,7884ca2db3b42df8cea014fe9c7f92e13b5906264980e99d7b276d089e845d16,2024-08-21T12:30:33.697000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 -CVE-2024-42939,0,0,063810f5bb6a6e0548bad9e96a46b51dc48585338b19c52acbbea6730ae59fdc,2024-08-21T05:15:14.920000 +CVE-2024-42939,0,1,597d8260550191a5ec4535dfd1b57fea9bc10dd98d246cece4677dfa19b6454c,2024-08-21T12:30:33.697000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 CVE-2024-42940,0,0,097785b0d8b1a2c5e9dc9f93304a2dd55a9659adb94f015efea3fb7466159ea6,2024-08-15T19:33:37.670000 CVE-2024-42941,0,0,4823e4e899032fc94bff489b9cbadb70ea6c991fd28db39b71d862913b0d21ef,2024-08-15T19:33:07.637000 @@ -258025,21 +258026,21 @@ CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd CVE-2024-43376,0,0,ad23541b381294fa5ed81f446c7a00cb43da818fefe222ccedb6694674b9577d,2024-08-20T15:44:20.567000 CVE-2024-43377,0,0,b06dfadc8661f012b9345444232386a24e2cadd0116f1734d754c1230ab2d9c8,2024-08-20T15:44:20.567000 CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202d67,2024-08-19T13:00:23.117000 -CVE-2024-43379,0,0,2274510657d95ffcc48a92770730410821cfe34d62852c5631ab582d27d295cf,2024-08-19T18:36:20.123000 -CVE-2024-43380,0,0,8e4600010954207ddca63fc28edeb1cd291abe3badd6cde0e059ea5db707d614,2024-08-19T18:36:20.123000 +CVE-2024-43379,0,1,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000 +CVE-2024-43380,0,1,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 -CVE-2024-43396,0,0,2ddb3b71638a62009ad9a0978f85841a5e544f5423bbf70bb50b46d997fa9ac7,2024-08-20T21:15:14.897000 +CVE-2024-43396,0,1,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000 CVE-2024-43397,0,0,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000 CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000 CVE-2024-43401,0,0,15903cc3c455a698e44524d269216ecf71232ae93f3f18482e5b95f18bb9ab5a,2024-08-20T16:09:23.747000 -CVE-2024-43403,0,0,7db0800e54ae4228fdb6c1833bb3180826cd2ac253188122b2865422a86f828e,2024-08-20T22:15:04.703000 +CVE-2024-43403,0,1,2d2fd26bb8b3833065b554e3ee4081855a0a04ca3de9ec4a77dfc795be220eec,2024-08-21T12:30:33.697000 CVE-2024-43404,0,0,20af26cd731b3ba8b34b0057b5259bd09cfea8cca89a07a9d1aba2ec472dceb0,2024-08-20T15:44:20.567000 CVE-2024-43406,0,0,73b0ba9348d7fda79585237be1ca1a5ac69ce938ffa97f7ec991727d16bb5e34,2024-08-20T15:44:20.567000 -CVE-2024-43408,0,0,9ac30ee1dfa29d31fb3dcc779d7a5d1f4e3de6f61770d464fcd94fe1c95ac0d2,2024-08-20T17:15:19.550000 +CVE-2024-43408,0,1,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000 CVE-2024-43409,0,0,936bb6be49fd3f1a52856d091099b7d0ee01c9becc80fdf8cce500121c258f30,2024-08-20T15:44:20.567000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 @@ -258137,30 +258138,30 @@ CVE-2024-43858,0,0,0a0385cf9d0c0fc9eaa0d371a3762bcf312c0ca0ce4acfe991bb8d771b07e CVE-2024-43859,0,0,9712b932918a4c9b01b9c17486755a7d630a29290c2554f3a970daffc82e20d5,2024-08-19T12:59:59.177000 CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000 CVE-2024-43860,0,0,491920f1c1ab45942801557921424048533e33d83993551563440b271ac0e9b2,2024-08-19T12:59:59.177000 -CVE-2024-43861,0,0,0c0e0fb312a9183fbfff03020c8ea0c5e98d517fadeb0c1062545e7a21e55d15,2024-08-20T22:15:04.917000 -CVE-2024-43862,0,0,f634cf6402e845f3534ddf6c9e7e0fcee7ab96546cf0fddaaa6a7b97f8125e63,2024-08-21T00:15:04.773000 -CVE-2024-43863,0,0,af381da8f06c7a9210ca18c59cb7a806a44d9ea2804f10de9ec3417cb67b6568,2024-08-21T00:15:04.847000 -CVE-2024-43864,0,0,8ca68124659de3813a43a1421bbb76b6ab555516b18460f100069336694dc8b7,2024-08-21T00:15:04.910000 -CVE-2024-43865,0,0,0a8e1cca87fe10b414ea89a3fa95bd10d16a61d1634910cff2a068619fcd3c31,2024-08-21T00:15:04.967000 -CVE-2024-43866,0,0,efdd66be76be9f74cccda990d6b43074e168a94a5ac6b102382e3d3f285fe6de,2024-08-21T00:15:05.023000 -CVE-2024-43867,0,0,531448921535e264abe8f6f042fdd79e1a46f9acf821c8c37b3150b785e5a840,2024-08-21T00:15:05.087000 -CVE-2024-43868,0,0,5eaf0d96e7bd9f1bd47436f1cf5135884583af1931d016a1e81656e0941e350d,2024-08-21T00:15:05.150000 -CVE-2024-43869,0,0,e718eab723b3338aa91bdc74d6e990b2c5715310fd8e4aed6f3f1857a11fb3fb,2024-08-21T01:15:11.550000 +CVE-2024-43861,0,1,356b6dbbcd5535ba76dcd78a87fd5df7522157cacaed0327954273ead9025b21,2024-08-21T12:30:33.697000 +CVE-2024-43862,0,1,73b429ba4062c240ef5657760dd2797510410c65046b141eae59e5a01f4e0f39,2024-08-21T12:30:33.697000 +CVE-2024-43863,0,1,8e5e01d22b57359fcf091d9531df2ac12c42d526d43aa46ba9fd057c2b2d9772,2024-08-21T12:30:33.697000 +CVE-2024-43864,0,1,21d16c6aaddff6921ea6961f03c4534862e785bec53c822be6ee212eb279e5e5,2024-08-21T12:30:33.697000 +CVE-2024-43865,0,1,3ea6e9c4ca349deed15ed0ff69ac86878978452d8ff75eb76c40f26fbd6827b8,2024-08-21T12:30:33.697000 +CVE-2024-43866,0,1,a54c7a266578736803efbffb7d88fb09c3b613ee746e00ef246aff1220f5b60c,2024-08-21T12:30:33.697000 +CVE-2024-43867,0,1,019b477a9c2ec97cd466b2e65bc244b10d61671d0bdbb2dd9346d03b97543e1b,2024-08-21T12:30:33.697000 +CVE-2024-43868,0,1,88be01dd732ff6da5baef81c9b1056645a9df6256d9302c340c20b075158ebbc,2024-08-21T12:30:33.697000 +CVE-2024-43869,0,1,5f88e5ad59f3470d3abee67e401ae58d414a0501c24f0ca9ce1eb4fef318a9bd,2024-08-21T12:30:33.697000 CVE-2024-4387,0,0,e174205a853415a731f22788a3c678b3fe9a7067078ee3c331ab7c9e4e787abd,2024-06-11T10:15:13.637000 -CVE-2024-43870,0,0,2cdc24d68f67dde77d7bcf6aadfc147ea1b8f5f93fdbe207c65167bc35ed3862,2024-08-21T01:15:11.620000 -CVE-2024-43871,0,0,16c987ded94179a6472dbf12fb0a1c9a353706d02b2f5bda6825768e24d61a00,2024-08-21T01:15:11.680000 -CVE-2024-43872,0,0,ad45ed5d91d7e202548a494f30f92c49c901fc00195eb62a0d2627baebac287c,2024-08-21T01:15:11.740000 -CVE-2024-43873,0,0,205a9e7723bbd422cb325abb5a96e45c236fdd2a0805e63f8c3baf7ab080ed34,2024-08-21T01:15:11.790000 -CVE-2024-43874,0,0,05043ff35f4389e88eb8d9e8b0e4a9488fa0606c8bfb44fcbe638f42f6cfddf1,2024-08-21T01:15:11.843000 -CVE-2024-43875,0,0,69995ce6734783b078057ae384c9429e9118692a95d3a99a43aabec651d9e4e8,2024-08-21T01:15:11.910000 -CVE-2024-43876,0,0,66a59c0c8a7b7efed1efe04ab4eee2ed78aa09856abbb137eaef25e817546af2,2024-08-21T01:15:11.973000 -CVE-2024-43877,0,0,ebd6c08bfb62fd4424ad71f7f83d4d86b8f03df89f52d9243c657042dd038a1f,2024-08-21T01:15:12.033000 -CVE-2024-43878,0,0,fb1b47a20c523296f49551a77dc617d6ab5c7743dfc0d82af359d59120a20ee7,2024-08-21T01:15:12.093000 -CVE-2024-43879,0,0,78bce32e741eab975be65ee068bdb60bab4b0edb2b3d308da49561ede841d7fb,2024-08-21T01:15:12.153000 +CVE-2024-43870,0,1,eea96fb7d85fb9f698cc357463068952170218510d11d133e32f1c1c6d3cf75d,2024-08-21T12:30:33.697000 +CVE-2024-43871,0,1,2813efb1e7e84048c3e349401e8445bc387f980de9ef5f2c2988ce1ba771204a,2024-08-21T12:30:33.697000 +CVE-2024-43872,0,1,23e84f48411d14455ef355dc26a0fb039f3210985a5246fb420bade00ce63dcc,2024-08-21T12:30:33.697000 +CVE-2024-43873,0,1,3f00c1f919114686130c92b4e1e06987a4f4c3b2a1ccc1ab3e10d6ffb446f987,2024-08-21T12:30:33.697000 +CVE-2024-43874,0,1,3df27230e635af2bd8568fb8b593774a8fe716cd59ff047dda25a18f6f596d34,2024-08-21T12:30:33.697000 +CVE-2024-43875,0,1,1748f33f756bd308f67c7dd3a119e03e5914a16ae4c5675de3a38c0ae09f1cf6,2024-08-21T12:30:33.697000 +CVE-2024-43876,0,1,4611fab6755a8985868b2fb65fa7c27e0f8a1a57d535918f1099b723f50c0ea0,2024-08-21T12:30:33.697000 +CVE-2024-43877,0,1,a11444ac34779accc32466963f337c06bf8ce25d87236a16646d1111a5ec3f2d,2024-08-21T12:30:33.697000 +CVE-2024-43878,0,1,dcbb7b503a2563826e1dabd5d908c79fea0e5aca9d567d9970cc5ef1a61c4723,2024-08-21T12:30:33.697000 +CVE-2024-43879,0,1,cb7b3cfa1ed9fa4dd22345c94ae271a52fd44dd5bba20e03039cbabba1b4c38d,2024-08-21T12:30:33.697000 CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000 -CVE-2024-43880,0,0,2e4786119337799f733cbbfd58db7b0d1de4a1d4c13ec395fcdfe30e1fd82a20,2024-08-21T01:15:12.213000 -CVE-2024-43881,0,0,832c16d5af189a996be6c989c7d5ddae65983d14573070267dc6c0c8397b4a88,2024-08-21T01:15:12.280000 -CVE-2024-43882,0,0,f4dbabc0737aa9d8cbd37ddd870560532f9dd924cee06244d7574d97dd79ab6c,2024-08-21T01:15:12.340000 +CVE-2024-43880,0,1,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d4fe,2024-08-21T12:30:33.697000 +CVE-2024-43881,0,1,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000 +CVE-2024-43882,0,1,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 @@ -258177,10 +258178,10 @@ CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000 CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 -CVE-2024-44070,0,0,2bc8de687612ae3b9a8e8ae6b5aa923874665cdf749880ee2ac700153b29547c,2024-08-19T12:59:59.177000 -CVE-2024-44073,0,0,a0168bab6b2fc8cdc2cdbd9e0c651e338c773869c4d49563b614716d8087553b,2024-08-19T12:59:59.177000 -CVE-2024-44076,0,0,f256db47e09f07fbefa7130d7f559d7caf56ad92a6a684543ad9f4757099347a,2024-08-19T16:35:28.723000 -CVE-2024-44083,0,0,1f929fd124b08bd86da7a04645c047d1110e3fe35c902c764dcf6bdd78af33f0,2024-08-19T16:35:29.767000 +CVE-2024-44070,0,1,ee0bd7875b0ada1d78b3bd0d960dcf458d0d303b4b9aafcaff1ad0e37ccd926e,2024-08-21T12:31:47.347000 +CVE-2024-44073,0,1,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000 +CVE-2024-44076,0,1,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 +CVE-2024-44083,0,1,87d77446f0404849741728544a896c280716acaeea3d28649c66451adb3a186e,2024-08-21T12:35:54.380000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 @@ -258711,14 +258712,14 @@ CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19b CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000 CVE-2024-5010,0,0,af35128cc9db48220726dcddff7a65b4ed403a9dff49a9c43e67e875bed0adc1,2024-06-26T14:15:11.250000 CVE-2024-5011,0,0,3893ac733a665090571cbc9b1d86bf3eb7381b999fcc8d59c6d135913d8c6665,2024-06-26T14:15:11.350000 -CVE-2024-5012,0,0,1ae91deea2eb9b4a08e5b9e0721c524febcd9f98ff8ce5b4cbbdb218833d0281,2024-06-26T12:44:29.693000 -CVE-2024-5013,0,0,20a1d2321062713e23ccf34bdcbc62a38d42c75d80f61e29ba89111f5b32eb30,2024-06-26T12:44:29.693000 -CVE-2024-5014,0,0,e0e1b647dfdebcac246d4bbaa00fc5bc46c1af2b49c86e5382815cbc81b0d0fa,2024-06-26T12:44:29.693000 -CVE-2024-5015,0,0,80c204dae9de44766257ac6a08b2618f55929359014d4d54a60d808db4648fec,2024-06-26T12:44:29.693000 -CVE-2024-5016,0,0,97a34e56cd2adb8ef4815d71f75caf45162d5e44762b7866539ddf3d3a9b02e3,2024-06-26T12:44:29.693000 -CVE-2024-5017,0,0,452962aba40854d8ac2ce246b0e9f5c31cecd72bc69f1809b18f653d2d70a324,2024-06-26T14:15:11.587000 +CVE-2024-5012,0,1,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000 +CVE-2024-5013,0,1,2b6e46c5c558997322ab16e56ac5bd13f8f3890cf64227402cfe38f28e8502bf,2024-08-21T13:35:28.750000 +CVE-2024-5014,0,1,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035fa0,2024-08-21T13:36:06.417000 +CVE-2024-5015,0,1,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000 +CVE-2024-5016,0,1,99504ccb587052e75d99d9fcbf07f0a52b025e8122dba2c854727d3b50b1c62e,2024-08-21T13:38:32.480000 +CVE-2024-5017,0,1,4bf66f9149c1825eb6053785aae4f79372d6014d70aef068fefc59f9d5142f99,2024-08-21T13:40:49.903000 CVE-2024-5018,0,0,db90f5d428aef62075cfdd54e2cc9e013f4fa27d883078f17d78f927e28812b1,2024-06-26T12:44:29.693000 -CVE-2024-5019,0,0,9451438578b101d922ccff5db353542f277a66dd106849ca9e0a3e9d20c4d3aa,2024-06-26T12:44:29.693000 +CVE-2024-5019,0,1,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000 CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000 CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000 @@ -258996,7 +258997,7 @@ CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99 CVE-2024-5331,0,0,f05fb229c386046dcd65cdaa4c35f1d7d27dbf88e27984042e1518b076a10077,2024-08-01T12:42:36.933000 CVE-2024-5332,0,0,440877c08f2207e575e98ca75a231683ae97178fa156f1a4d40f84efe3c80f11,2024-08-02T15:03:49.773000 CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 -CVE-2024-5335,0,0,af4b6ddab2c64dee47c068383fc8039e8f6c161833bd8240683c69765185ea69,2024-08-21T09:15:04.563000 +CVE-2024-5335,0,1,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000 CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000 @@ -259435,7 +259436,7 @@ CVE-2024-5866,0,0,1e8ac9a24cff1ef0b1e69b0cad4245851696c731844c0dad74330fe9e97df7 CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344ed,2024-06-17T12:42:04.623000 CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000 CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000 -CVE-2024-5880,0,0,ebf838631b85cb084ee3c123a33dca070716403aae01d55c63a31ce80114bec0,2024-08-21T06:15:07.633000 +CVE-2024-5880,0,1,ba1ed54b40d42e877081166356a11c64c8cd8d08513a1ac6c742fc002810239c,2024-08-21T12:30:33.697000 CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 CVE-2024-5882,0,0,9790fb22da231882b81afb2259612f6848f747553cc5560caa274dd01996ad4d,2024-08-01T14:00:04.947000 CVE-2024-5883,0,0,d6a370f6079b934cdc983b97c847b09fbc2fd364cbab75a4154dad04b870dbf6,2024-08-01T14:00:05.160000 @@ -259491,7 +259492,7 @@ CVE-2024-5949,0,0,4572c12d3ad878ee653901722f7c16c0dabd647af42f6f6ae5a5828547615d CVE-2024-5950,0,0,f2973766f812398c51fdc9e52a19a5f151706c2da451b30e218939a121000c2a,2024-08-07T18:12:58.253000 CVE-2024-5951,0,0,6febf2923b11ad8e5c0b580c95ce8478dd937b62c84a55da1a853959f3aac15d,2024-08-07T18:12:55.977000 CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28bb,2024-08-07T17:50:09.493000 -CVE-2024-5953,0,0,9f46daa6c571dce2c2ecdf2bd38bf4d61c52513a19f8abc23bb19202a887298b,2024-08-12T13:38:38.430000 +CVE-2024-5953,0,1,e9574cc1fd34f1e834cbe0d5750f95c4489259c54c4b5423533e702bf4652353,2024-08-21T13:15:04.867000 CVE-2024-5961,0,0,458be8cb6fdb0d558a4d51d11b5f294250dd9695661afd805b88290bb2df249d,2024-06-17T12:42:04.623000 CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f321,2024-08-06T16:30:24.547000 CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000 @@ -259783,7 +259784,7 @@ CVE-2024-6318,0,0,87eaacee4d7a5063296249046cfb20a5128d5a5e29b5c82ab7a2c5bbe9407d CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a0e,2024-07-05T17:21:47.817000 CVE-2024-6320,0,0,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000 CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000 -CVE-2024-6322,0,0,6bb6eba934f8cef5e6d0ccb60256b6881f1895e43a615e9d14e570d4ac994902,2024-08-20T18:15:09.900000 +CVE-2024-6322,0,1,8d7a1084476b1bbfe0beb3b2fb5fe7b67eda10da654967af54513f67a857c5e5,2024-08-21T12:30:33.697000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c00880,2024-07-16T18:00:02.110000 CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000 @@ -259794,9 +259795,9 @@ CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90c CVE-2024-6331,0,0,170e6a9ca8d17834b0d067352ac524c06575a24a7d50c9bc89357069533d125d,2024-08-20T19:55:35.153000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000 -CVE-2024-6337,0,0,4bbaace135a65e16bd97b2f84fc2780e829de9473b830dbe86c073fce6003d74,2024-08-20T20:15:09.033000 +CVE-2024-6337,0,1,2e78350836fa8817ff4aec79c82f6f0f98d78739985b39708ec542654e5f48f4,2024-08-21T12:30:33.697000 CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000 -CVE-2024-6339,0,0,0908dc10a04daa9a65725fca0f1e84e79bced582f5db1322b56ee6175cfa8944,2024-08-21T08:15:04.333000 +CVE-2024-6339,0,1,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 @@ -259915,7 +259916,7 @@ CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 -CVE-2024-6508,0,0,ad710cc967089e6834cd0bda1693c96808d80b6089a0c3a4cd253e1aa8b0008b,2024-08-21T06:15:08.120000 +CVE-2024-6508,0,1,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6518,0,0,7a127ef3c2d090457ff99a50f0f761572ef9ee379e26194986d16a2b77609a00,2024-07-29T14:12:08.783000 @@ -259959,7 +259960,7 @@ CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3f CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000 CVE-2024-6566,0,0,d6506e8698f9fc48107baf6879b3d68aa0d41c6ff56f3284c695ecacd8e825b0,2024-07-29T14:12:08.783000 CVE-2024-6567,0,0,9de7307cc0759fd9897fd3f0912c6bf0e2680673968bc0cc458d792904193dbe,2024-08-02T12:59:43.990000 -CVE-2024-6568,0,0,9c59c2befb80672bcceb861772c983f5bf38da3b51fc50e701c26ed574236c09,2024-08-21T06:15:08.500000 +CVE-2024-6568,0,1,528ace20f0d467f7790e4e054591b302a80f9056e014bb27385a4ebe6c2274ef,2024-08-21T12:30:33.697000 CVE-2024-6569,0,0,ea17e16deeca6260fdba738f342a9d86e7275b877d87aa50f5264cd0a02b7a0c,2024-07-29T14:12:08.783000 CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b46,2024-07-16T13:43:58.773000 CVE-2024-6571,0,0,78a981d5a6d937e0ba878714ecb6e9c0e22f79c4ebbc143a02b12bb91eae6bff,2024-08-14T19:24:59.063000 @@ -260090,7 +260091,7 @@ CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000 -CVE-2024-6767,0,0,5732aae7dd2bc3e20c67c665f4626a4a8a3aa8aa61698ea65a022d013409b6a4,2024-08-21T06:15:08.877000 +CVE-2024-6767,0,1,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000 CVE-2024-6768,0,0,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000 CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000 CVE-2024-6772,0,0,f0ffeebc9a92372629de2eb0378ed8854f5d1b95881919ea662c83ca59f4b1a0,2024-08-06T19:35:10.307000 @@ -260110,7 +260111,7 @@ CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc8 CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000 CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000 -CVE-2024-6800,0,0,67506ffc0d2cf3491c6ffc1ed50e1a892ed2f0468ccfc67b5c1a25b0d0dfe8fa,2024-08-20T20:15:09.910000 +CVE-2024-6800,0,1,905f179e2d4ab3f1a642369f80acd1cb09cf2cc4719cb8c0b853076a876bd4d3,2024-08-21T12:30:33.697000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 @@ -260135,7 +260136,7 @@ CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 CVE-2024-6881,0,0,520f7716290babc1617560777d62fc095cd252de40f50f3ed54fb0f967edb111,2024-08-08T20:24:41.957000 -CVE-2024-6883,0,0,0bd38a88444dfb59228ac9618461e5d3d2e5a60d0d3ad4e99860c91c8c2d6fde,2024-08-21T06:15:09.433000 +CVE-2024-6883,0,1,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000 CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000 CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000 CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000 @@ -260233,13 +260234,13 @@ CVE-2024-7006,0,0,e6fa209ac0713e033e0ece6a5e36f45d5c69970bc1d46f1daeb274aa6fa96c CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 -CVE-2024-7013,0,0,66ce99a337f0f86d204cb5544882650b9d56adecbd2755f45811969a6820e690,2024-08-21T06:15:09.753000 +CVE-2024-7013,0,1,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c22,2024-08-05T12:41:45.957000 -CVE-2024-7030,0,0,ea9f562942a2af0f2104072413a81037570527653965cb62ca96c615002d5bd2,2024-08-21T06:15:10.053000 +CVE-2024-7030,0,1,e1620788fed30b0547a754019286bd289fb4e3d907a5fa126dedef832f975b36,2024-08-21T12:30:33.697000 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 -CVE-2024-7032,0,0,7e7c52e8ad4a656046e935668264238995d9aedb55a26e6312d6577ab4062e2a,2024-08-21T06:15:10.453000 +CVE-2024-7032,0,1,3560b48f27bfff69db1e59c5bf5a8bf1115ef48945752de496fcc7dee3f42d1d,2024-08-21T12:30:33.697000 CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 @@ -260260,7 +260261,7 @@ CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04 CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000 CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000 CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000 -CVE-2024-7090,0,0,c11699ae55c8dc840700dbb2bdad33df3834d1766ce8bd2bbcb91ea34081cf21,2024-08-21T06:15:10.800000 +CVE-2024-7090,0,1,3d2aabad43a36db418269bf4caffe0ea33f51a81aff1bd4a0b06249046f5e156,2024-08-21T12:30:33.697000 CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000 CVE-2024-7092,0,0,e9e7e1c22eeddb38238cff178e26d1e84cd16a1ecd7c31190a29d77a32325d08,2024-08-13T12:58:25.437000 CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000 @@ -260281,7 +260282,7 @@ CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e8 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 CVE-2024-7127,0,0,6b292748e8421eae2ee17ad044bc14a6084b68762b6284b02f94a1dd672b3c81,2024-07-30T13:32:45.943000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 -CVE-2024-7134,0,0,7f76c7b2c99d9ad04d443d4bfc2e64896df0515015867856ce022336ff1d724c,2024-08-21T06:15:11.200000 +CVE-2024-7134,0,1,c5170ada8be1ea583d3dc92d1c0c20ff0ddcfa0f860d82c947cda0aff2380786,2024-08-21T12:30:33.697000 CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000 CVE-2024-7136,0,0,8aada0541fe051e5634e6d0e6056d54d479250830cd49e1b32d308af5a5c28dc,2024-08-19T13:00:23.117000 CVE-2024-7143,0,0,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000 @@ -260468,7 +260469,7 @@ CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c5 CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 -CVE-2024-7390,0,0,610180941de1e06138edd637cd770e584545754db830b3acbf5408ed4203650c,2024-08-21T06:15:11.577000 +CVE-2024-7390,0,1,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000 CVE-2024-7394,0,0,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000 CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000 CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 @@ -260604,7 +260605,7 @@ CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd70 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000 CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472cd,2024-08-15T13:01:10.150000 -CVE-2024-7629,0,0,bdad6e88a60b6e28b6a6165c465cef06856149a274cba51b9fec2de5ceb7e4af,2024-08-21T06:15:12.090000 +CVE-2024-7629,0,1,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000 CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000 @@ -260619,10 +260620,10 @@ CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c CVE-2024-7644,0,0,af133dd73ba0f9ae2c852b6a18dbacddae25120427cf0e48515211be4d6d6b46,2024-08-15T18:19:11.080000 CVE-2024-7645,0,0,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000 CVE-2024-7646,0,0,0e47e4757200b360ac0ac2cd875beb2809de05dd15d4a2274662b759af795194,2024-08-19T13:00:23.117000 -CVE-2024-7647,0,0,2cbd04d35c060cdf36a73a46de985be78c07587b07a6c82a0150d3ba48b3ca41,2024-08-21T06:15:12.413000 +CVE-2024-7647,0,1,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1e6,2024-08-21T12:30:33.697000 CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000 -CVE-2024-7651,0,0,ef7780d13e330a90a52a24f3e76f74d649b7ce4c67c2a1b9ac311449caebbbbe,2024-08-21T06:15:12.830000 +CVE-2024-7651,0,1,5a46da6be71e23b2a70e27947f885b8fb16b12b8154bc4dda4808e71839c3b2b,2024-08-21T12:30:33.697000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 CVE-2024-7659,0,0,3cb22096bf2f6ca2aa4f8495c729121ab87c6bf294191fb47bc11d37c76e5c86,2024-08-15T17:49:42.667000 @@ -260657,7 +260658,7 @@ CVE-2024-7705,0,0,ba2446d549e3c4265501aacae0f49b053f84e0be1e1ff6443743a7ef69ec83 CVE-2024-7706,0,0,34691e01382f75dab77331457a35200e30d6d542602059394c4cb51de28ec4d5,2024-08-13T12:58:25.437000 CVE-2024-7707,0,0,38947b3991050cbcb34490d84db5d3d8182daacb8ab1c53d2e724892f18e8ffa,2024-08-13T12:58:25.437000 CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 -CVE-2024-7711,0,0,570afd66c5f3310946e55bb10f3177c2e5309b1e55693a3999c6cc8aea19060c,2024-08-20T20:15:10.173000 +CVE-2024-7711,0,1,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 CVE-2024-7728,0,0,c0ed30007f00488b5c62db3cfd8f859193059df346d1ebce1c04c936068d2a21,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,b303d5d4be15b474d481a2bd874b63765444e7a77fd0332a4aa454ee055ae189,2024-08-14T13:00:37.107000 @@ -260718,7 +260719,7 @@ CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad0 CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000 CVE-2024-7852,0,0,d81b5371e4f0add1d395c3b1194a942c6ec099c1cdc2d46560d4b57bf5d930b7,2024-08-19T13:00:23.117000 CVE-2024-7853,0,0,602b79ace26812f03f94bfc9d8a0781cb4744715aed03debdd7aa8ad39738b45,2024-08-19T13:00:23.117000 -CVE-2024-7854,0,0,f6770298cee66bfb859303fbb0734bd388c855bf73b2a6b1e34477335ab8db42,2024-08-21T06:15:13.423000 +CVE-2024-7854,0,1,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,6a317fb9db8a508202f8841173e6c3d2bd77edc707a891aff0fcaf7f472e0f1b,2024-08-19T13:00:23.117000 CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 @@ -260744,10 +260745,10 @@ CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f2280f,2024-08-19T16:14:30.670000 CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 CVE-2024-7916,0,0,2890180016b54dc9da9d7caa383969ad75f3180954e602dd9178d25d09afddce,2024-08-20T19:38:11.163000 -CVE-2024-7917,0,0,04549485abf4cbb2eb3f17d0e5ce12d1a18b8be9164f5e1eb097a380a8d65e4b,2024-08-20T19:38:43.633000 -CVE-2024-7919,0,0,f2bb5e312b080254029100aad55ac0e116f106f8875406ee9eda26e8584e5716,2024-08-19T12:59:59.177000 -CVE-2024-7920,0,0,c41e33ff5de5a36152bea0a48597e7ee27df39730a99a7d96b4832bf67ef32a2,2024-08-19T12:59:59.177000 -CVE-2024-7921,0,0,373fc8493a42dec9024075bfa6d26cd35595f3ee4bbd93f8a4d782f94f96ad56,2024-08-19T12:59:59.177000 +CVE-2024-7917,0,1,1232374447889b44f95a3651db2b7e919b58eb5c9a0d77c398ae62eee2338564,2024-08-21T12:30:34.283000 +CVE-2024-7919,0,1,1863f3ded361827cbb07eac1eea3f3ab9748bf8576157da3db06c534b87a214c,2024-08-21T12:30:01.187000 +CVE-2024-7920,0,1,03604c94082c1da3fc5c107dc3e686ed281b4a09d67a2a74662346c68cad27ae,2024-08-21T12:31:20.663000 +CVE-2024-7921,0,1,0f227aa56af57464e66f96a1f8f7af9df81009de406656147353a8e23b801955,2024-08-21T12:34:04.490000 CVE-2024-7922,0,0,c7a8281cc30c452535b1935299b85a2bdb852d82530dc7a36d8d5dc42009e9db,2024-08-20T16:20:25.403000 CVE-2024-7924,0,0,2cf76ea42b1644543678da9fb702b4f7d4bee65303ff016d26c15c306f799b7f,2024-08-20T16:07:26.443000 CVE-2024-7925,0,0,34a7774a8c3accfc943090e80e03d9858b71da046812c3f4a53477aade0cc157,2024-08-20T16:06:31.663000 @@ -260766,13 +260767,13 @@ CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000 CVE-2024-7944,0,0,663610bd19af05baccff8ed30fdea4b6dad68a15a9d16879945ad27f07010894,2024-08-20T15:44:20.567000 CVE-2024-7945,0,0,2d203c1c29b024f88ee3b7227e338cd5142a37f19827f0958a6e660fe56a81e2,2024-08-20T15:44:20.567000 -CVE-2024-7946,0,0,fd037b5d720e856aa0df6446c4d5f261cd9338836a0b89bc8a3e66c91172da0a,2024-08-20T15:44:20.567000 -CVE-2024-7947,0,0,55a17b777c2727a9d5198f18e7cd79d1e697fa58892c329bf2c0ae50fc239784,2024-08-20T15:44:20.567000 -CVE-2024-7948,0,0,f86f46af4e10433dfdbb63175cf759444d87e68853678aab74d0579f8baaa6ae,2024-08-20T15:44:20.567000 -CVE-2024-7949,0,0,d28736f5bd3ae6cac0b634f14aa71a195aeb3974f7e232436da0812de0906ff8,2024-08-20T15:44:20.567000 +CVE-2024-7946,0,1,55b44492c55caac843a1ad836ee11f9cccc3723d88087e17cb61194f5c694743,2024-08-21T13:55:24.780000 +CVE-2024-7947,0,1,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193e5,2024-08-21T13:53:38.750000 +CVE-2024-7948,0,1,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000 +CVE-2024-7949,0,1,a0f87c25225f514b77e6885828a01bd09830515b5f3d810f59da2bdb40fb721c,2024-08-21T13:51:13.580000 CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 -CVE-2024-7998,0,0,3dc26ef61a5d368dd9fd15664cdb4276e656eefcf59b8003a27f54d67c7bf9bc,2024-08-21T06:15:13.830000 +CVE-2024-7998,0,1,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,758a1d14516c7281f099a97088179c2e30fef28a491033cc2c207616771ff8ed,2024-08-20T15:44:20.567000 CVE-2024-8005,0,0,fb303ce9b5523956d31743af9e352f3e80929fff92324ad367dffd602076c37d,2024-08-20T15:44:20.567000 -CVE-2024-8022,0,0,f9746f158d1ab09f6238548067d7a58a561e45999bb721069bfe7b2589b6de00,2024-08-21T00:15:05.227000 -CVE-2024-8023,0,0,efc35671a3775b7561b380f5b8ea46a53563270db6625ad26e607b41b6e908e5,2024-08-21T00:15:05.527000 +CVE-2024-8022,0,1,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 +CVE-2024-8023,0,1,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000