diff --git a/CVE-2023/CVE-2023-224xx/CVE-2023-22467.json b/CVE-2023/CVE-2023-224xx/CVE-2023-22467.json index 3e1f61b1498..e33245b9e54 100644 --- a/CVE-2023/CVE-2023-224xx/CVE-2023-22467.json +++ b/CVE-2023/CVE-2023-224xx/CVE-2023-22467.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22467", "sourceIdentifier": "security-advisories@github.com", "published": "2023-01-04T22:15:09.357", - "lastModified": "2023-01-17T17:17:38.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-12T04:15:07.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -130,6 +130,14 @@ "Not Applicable", "Third Party Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44I3WAJKYXDLOVYRGMHAUXMIV4SPFXDZ/", + "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LIVOASKBQH7FEUI5RWM3SOHR6VK7ZZR/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28531.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28531.json index b4572218304..0ee674a05e6 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28531.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28531.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28531", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-17T04:15:14.553", - "lastModified": "2023-12-22T13:15:08.797", + "lastModified": "2024-02-12T03:15:32.443", "vulnStatus": "Modified", "descriptions": [ { @@ -91,6 +91,10 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/202307-01", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json new file mode 100644 index 00000000000..da85c7e7f95 --- /dev/null +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52429", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-12T03:15:32.573", + "lastModified": "2024-02-12T03:15:32.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4", + "source": "cve@mitre.org" + }, + { + "url": "https://www.spinics.net/lists/dm-devel/msg56625.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json index 8c206428b4a..fc9eeae5e7e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1283", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-07T00:15:56.323", - "lastModified": "2024-02-09T02:15:08.810", + "lastModified": "2024-02-12T03:15:32.633", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://issues.chromium.org/issues/41494860", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json index f5e1d1b153e..7e019cec72a 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1284", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-07T00:15:56.380", - "lastModified": "2024-02-09T02:15:08.883", + "lastModified": "2024-02-12T03:15:32.710", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://issues.chromium.org/issues/41494539", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json new file mode 100644 index 00000000000..96040be795b --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-25739", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-12T03:15:32.770", + "lastModified": "2024-02-12T03:15:32.770", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi->leb_size." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg", + "source": "cve@mitre.org" + }, + { + "url": "https://www.spinics.net/lists/kernel/msg5074816.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25740.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25740.json new file mode 100644 index 00000000000..4f958062c6e --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25740.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25740", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-12T03:15:32.823", + "lastModified": "2024-02-12T03:15:32.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://lore.kernel.org/lkml/0171b6cc-95ee-3538-913b-65a391a446b3%40huawei.com/T/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25741.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25741.json new file mode 100644 index 00000000000..c85aa6196f1 --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25741.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25741", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-12T03:15:32.870", + "lastModified": "2024-02-12T03:15:32.870", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.spinics.net/lists/linux-usb/msg252167.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f35ba89d5ac..e067995f028 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-12T00:55:24.545811+00:00 +2024-02-12T05:00:24.573217+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-11T23:15:07.850000+00:00 +2024-02-12T04:15:07.610000+00:00 ``` ### Last Data Feed Release @@ -23,26 +23,33 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-11T01:00:28.229916+00:00 +2024-02-12T01:00:28.269914+00:00 ``` ### Total Number of included CVEs ```plain -238125 +238129 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `4` -* [CVE-2024-1433](CVE-2024/CVE-2024-14xx/CVE-2024-1433.json) (`2024-02-11T23:15:07.850`) +* [CVE-2023-52429](CVE-2023/CVE-2023-524xx/CVE-2023-52429.json) (`2024-02-12T03:15:32.573`) +* [CVE-2024-25739](CVE-2024/CVE-2024-257xx/CVE-2024-25739.json) (`2024-02-12T03:15:32.770`) +* [CVE-2024-25740](CVE-2024/CVE-2024-257xx/CVE-2024-25740.json) (`2024-02-12T03:15:32.823`) +* [CVE-2024-25741](CVE-2024/CVE-2024-257xx/CVE-2024-25741.json) (`2024-02-12T03:15:32.870`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `4` +* [CVE-2023-28531](CVE-2023/CVE-2023-285xx/CVE-2023-28531.json) (`2024-02-12T03:15:32.443`) +* [CVE-2023-22467](CVE-2023/CVE-2023-224xx/CVE-2023-22467.json) (`2024-02-12T04:15:07.610`) +* [CVE-2024-1283](CVE-2024/CVE-2024-12xx/CVE-2024-1283.json) (`2024-02-12T03:15:32.633`) +* [CVE-2024-1284](CVE-2024/CVE-2024-12xx/CVE-2024-1284.json) (`2024-02-12T03:15:32.710`) ## Download and Usage