Auto-Update: 2024-05-23T20:00:37.996449+00:00

This commit is contained in:
cad-safe-bot 2024-05-23 20:03:29 +00:00
parent 33bdc18670
commit 424b9c485a
40 changed files with 3283 additions and 387 deletions

View File

@ -2,8 +2,12 @@
"id": "CVE-2020-17519",
"sourceIdentifier": "security@apache.org",
"published": "2021-01-05T12:15:12.680",
"lastModified": "2023-11-07T03:19:12.707",
"lastModified": "2024-05-23T19:54:02.487",
"vulnStatus": "Modified",
"cisaExploitAdd": "2024-05-23",
"cisaActionDue": "2024-06-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apache Flink Improper Access Control Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38028",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.067",
"lastModified": "2024-04-24T01:00:01.230",
"vulnStatus": "Modified",
"lastModified": "2024-05-23T18:12:17.383",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-04-23",
"cisaActionDue": "2024-05-14",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -63,78 +63,69 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19507",
"matchCriteriaId": "4107B4BA-0188-4838-8B98-D69D360AF1A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.5427",
"matchCriteriaId": "CE239E41-249C-44C0-B055-9A3069501D87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.5427",
"matchCriteriaId": "A229BD14-2EA0-4892-937A-18683D05DF2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.3532",
"matchCriteriaId": "3781A245-9212-4015-A880-8792500DAF43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19042.2130",
"matchCriteriaId": "B509127D-4883-4C60-AF8F-9CA2AE60665F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19042.2130",
"matchCriteriaId": "21D120C9-5B61-4C1B-9CC4-CEA53E7C1884"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.2130",
"matchCriteriaId": "165AC78C-9948-4AE2-9426-3179580B4EA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2130",
"matchCriteriaId": "FF014B8F-68BA-46BD-B741-4A904D432E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "747ED159-1972-4310-AAD1-8E02AFB08826"
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.674",
"matchCriteriaId": "9DEC0AE5-324C-4117-ADFD-D8425D01C575"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.9600.20625",
"matchCriteriaId": "CBF83FDA-6F2F-46C7-A5C3-23DA1EB36292"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.9600.20625",
"matchCriteriaId": "7EF148FB-4965-4BBE-B705-A78A9C67C2A2"
},
{
"vulnerable": true,
@ -148,18 +139,21 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5427",
"matchCriteriaId": "2EEAA2B6-8867-4C7D-95F3-B3EB1999AA14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.3532",
"matchCriteriaId": "80C80E91-7A5B-45AD-AD4D-F9899F92DB6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.1129",
"matchCriteriaId": "C8E84A9A-1B4C-4D3E-B1B3-96700DC43B09"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48654",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:07.580",
"lastModified": "2024-04-29T12:42:03.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:01:47.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nfnetlink_osf: corrige una posible coincidencia falsa en nf_osf_find() nf_osf_find() devuelve verdadero incorrectamente en caso de discrepancia, esto lleva a copiar el \u00e1rea de memoria no inicializada en nft_osf que puede usarse para filtrar el kernel obsoleto apilar datos en el espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2.0",
"versionEndExcluding": "5.4.215",
"matchCriteriaId": "790A2E9F-D8A7-4A25-8A5E-FA783C54A12C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.146",
"matchCriteriaId": "B3E44E13-2928-4D71-BF29-7855E1156F9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.71",
"matchCriteriaId": "3D01FC32-F9BE-4585-BECC-700CC14F1010"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "5.19.12",
"matchCriteriaId": "5B3E46CF-D37F-4159-9DF4-AD6456481645"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48674",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-03T15:15:07.580",
"lastModified": "2024-05-03T15:32:19.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:36:25.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: erofs: corrige el use-after-free de pcluster en plataformas UP Durante las pruebas de estr\u00e9s con CONFIG_SMP deshabilitado, KASAN informa lo siguiente: ============== ==================================================== == ERROR: KASAN: use-after-free en __mutex_lock+0xe5/0xc30 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff8881094223f8 por tarea estr\u00e9s/7789 CPU: 0 PID: 7789 Comm: estr\u00e9s No contaminado 6.0.0-rc1-00002-g0d53d2e882f9 # 3 Nombre del hardware: Red Hat KVM, BIOS 0.5.1 01/01/2011 Seguimiento de llamadas: .. __mutex_lock+0xe5/0xc30 .. z_erofs_do_read_page+0x8ce/0x1560 .. z_erofs_readahead+0x31c/0x580 .. Liberado por la tarea 7787 kasan_save_stack+0x1e/0x40 kasan_set_track+0x20/0x30 kasan_set_free_info+0x20/0x40 __kasan_slab_free+0x10c/0x190 kmem_cache_free+0xed/0x380 rcu_core+0x3d5/0xc90 __do_softirq+0x12d/0x 389 \u00daltima creaci\u00f3n de trabajo potencialmente relacionado: kasan_save_stack+0x1e/0x40 __kasan_record_aux_stack+0x97/ 0xb0 call_rcu+0x3d/0x3f0 erofs_shrink_workstation+0x11f/0x210 erofs_shrink_scan+0xdc/0x170 retract_slab.constprop.0+0x296/0x530 drop_slab+0x1c/0x70 drop_caches_sysctl_handler+0x70/0x80 proc_sys_call_handler+0x20a/0x2f0 vfs_write+0x555/0x6c0 ksys_write+0xbe/0x160 do_syscall_64+0x3b/0x90 La causa principal es que erofs_workgroup_unfreeze() no se restablece a orig_val, por lo que provoca una carrera que el pcluster reutiliza inesperadamente antes de liberarse. Dado que las plataformas UP son bastante raras ahora, ese camino se vuelve innecesario. En su lugar, eliminemos directamente esa ruta manipulada espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.15.68",
"matchCriteriaId": "D2ACADF3-2B54-4955-818B-7794FAD792E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.19.9",
"matchCriteriaId": "B4895A99-6E1B-4C76-A510-FDED00AD7D29"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2f44013e39984c127c6efedf70e6b5f4e9dcf315",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8ddd001cef5e82d19192e6861068463ecca5f556",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/94c34faaafe7b55adc2d8d881db195b646959b9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,12 @@
"id": "CVE-2023-43208",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-26T17:15:09.033",
"lastModified": "2024-01-31T18:15:46.020",
"vulnStatus": "Modified",
"lastModified": "2024-05-23T19:54:02.490",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-05-20",
"cisaActionDue": "2024-06-10",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability",
"descriptions": [
{
"lang": "en",
@ -71,7 +75,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26929",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:07.380",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:07:27.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,135 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: qla2xxx: Correcci\u00f3n doble liberaci\u00f3n de fcport El servidor fallaba despu\u00e9s de LOGO porque fcport se liberaba dos veces. -----------[ cortar aqu\u00ed ]----------- \u00a1ERROR del kernel en mm/slub.c:371! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 1 SMP PTI CPU: 35 PID: 4610 Comm: bash Kdump: cargado Contaminado: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1 Nombre de hardware: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 03/09/2021 RIP: 0010:set_freepointer.part.57+0x0/0x10 RSP: 0018:ffffb07107027d90 EFLAGS: 00010246 RAX: RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400 RDX: 0000000000001f37 RSI : 0000000000000000 RDI: ffff9cb7c0005500 RBP: fffff693448c5400 R08: 0000000080000000 R09: 00000000000000009 R10: 0000000000000000 R11: 0000000132af0 R12: ffff9cb7c0005500 R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58 FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(000) 0) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 00000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: kfree+0x238/0x250 _els_dcmd_sp_free+0x20 /0x230 [qla2xxx] ? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx] qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? kernfs_fop_write+0x11e/0x1a0 Elimine una de las llamadas gratuitas y agregue una verificaci\u00f3n de fcport v\u00e1lido. Utilice tambi\u00e9n la funci\u00f3n qla2x00_free_fcport() en lugar de kfree()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.154",
"matchCriteriaId": "131A208A-4C74-498A-BFFB-240B45FE2C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26930",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:07.540",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:10:49.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,107 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Correcci\u00f3n de doble liberaci\u00f3n del puntero ha->vp_map Coverity scan inform\u00f3 un riesgo potencial de doble liberaci\u00f3n del puntero ha->vp_map. ha->vp_map se liber\u00f3 en qla2x00_mem_alloc() y nuevamente se liber\u00f3 en la funci\u00f3n qla2x00_mem_free(ha). Asigne NULL a vp_map y kfree se encargar\u00e1 de NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "B6EDF98F-EEBC-45A5-B968-B78881A5BE83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "3CFA8A81-15BA-4322-A5C1-9450955D5E4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26932",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:07.810",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:12:39.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,80 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: typec: tcpm: soluciona el problema de doble liberaci\u00f3n en tcpm_port_unregister_pd() Cuando se cancela el registro de la capacidad de pd en tcpm, KASAN capturar\u00e1 el siguiente problema de doble liberaci\u00f3n. La causa principal es que la misma capacidad se liberar\u00e1 dos veces, la primera vez se liberar\u00e1 mediante pd_capabilities_release() y la segunda vez se liberar\u00e1 expl\u00edcitamente mediante tcpm_port_unregister_pd(). [3.988059] ERROR: KASAN: doble liberaci\u00f3n en tcpm_port_unregister_pd+0x1a4/0x3dc [3.995001] Libre de direcci\u00f3n ffff0008164d3000 por tarea kworker/u16:0/10 [4.001206] [4.002712] CPU: 2 PID: 10 Co mm: ktrabajador/u16: 0 No contaminado 6.8.0-rc5-next-20240220-05616-g52728c567a55 #53 [4.012402] Nombre del hardware: Freescale i.MX8QXP MEK (DT) [4.017569] Cola de trabajo: events_unbound deferred_probe_work_func [4.023456] Seguimiento de llamadas: [ 4.025920] dump_backtrace+ 0x94/0xec [ 4.029629] show_stack+0x18/0x24 [ 4.032974] dump_stack_lvl+0x78/0x90 [ 4.036675] print_report+0xfc/0x5c0 [ 4.040289] kasan_report_invalid_free+0xa0/0xc0 [ 4 .044937] __kasan_slab_free+0x124/0x154 [ 4.049072] kfree+0xb4/ 0x1e8 [ 4.052069] tcpm_port_unregister_pd+0x1a4/0x3dc [ 4.056725] tcpm_register_port+0x1dd0/0x2558 [ 4.061121] tcpci_register_port+0x420/0x71c [ 4.065430] +0x118/0x2e0 Para solucionar el problema, esto eliminar\u00e1 kree() de tcpm_port_unregister_pd()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b63f90487bdf93a4223ce7853d14717e9d452856",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26933",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:07.930",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:12:43.773",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,121 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: core: corrige el punto muerto en el atributo sysfs \"disable\" del puerto. Las rutinas de devoluci\u00f3n de llamada para mostrar y almacenar para el archivo del atributo sysfs \"disable\" en port.c adquieren el bloqueo del dispositivo para el puerto. dispositivo central principal. Esto puede causar problemas si otro proceso ha bloqueado el concentrador para eliminarlo o cambiar su configuraci\u00f3n: Quitar el concentrador o cambiar su configuraci\u00f3n requiere que se elimine la interfaz del concentrador, lo que requiere que se elimine el dispositivo del puerto, y device_del() espera hasta que todo Se han devuelto devoluciones de llamadas de atributos sysfs pendientes para los puertos. El bloqueo no podr\u00e1 desbloquearse hasta entonces. Pero la rutina enable_show() o enable_store() no puede regresar hasta que haya adquirido el bloqueo. El punto muerto resultante se puede evitar llamando a sysfs_break_active_protection(). Esto har\u00e1 que el n\u00facleo de sysfs no espere a que regrese la rutina de devoluci\u00f3n de llamada del atributo, lo que permitir\u00e1 que contin\u00fae la eliminaci\u00f3n. La desventaja es que despu\u00e9s de realizar esta llamada, no hay garant\u00eda de que la estructura del centro no se desasignar\u00e1 en ning\u00fan momento. Para evitar esto, primero debemos adquirir una referencia llamando a hub_get()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "247198E8-0497-4DB2-A365-EEEC6A2C8D19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "D15F9C27-5FEC-4D9D-9C75-6CB330C0B299"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "0E4663C3-7D71-4DA9-9A13-EC2E448147C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8.0",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "57497073-82D5-4695-AA8B-363CA1C033BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:r1:*:*:*:*:*:*",
"matchCriteriaId": "E1E2BC41-356E-412A-9B5D-9B5EFCB4E942"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26934",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:08.090",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:13:43.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,43 +14,178 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: core: corrige el punto muerto en usb_deauthorize_interface() Entre las rutinas de devoluci\u00f3n de llamada de archivos de atributos en drivers/usb/core/sysfs.c, la funci\u00f3n interface_authorized_store() es la \u00fanica que adquiere un bloqueo de dispositivo en un dispositivo antecesor: llama a usb_deauthorize_interface(), que bloquea el dispositivo USB principal de la interfaz. Esto conducir\u00e1 a un punto muerto si otro proceso ya posee ese bloqueo e intenta eliminar la interfaz, ya sea mediante un cambio de configuraci\u00f3n o porque el dispositivo se ha desconectado. Como parte del procedimiento de eliminaci\u00f3n, device_del() espera a que se completen todas las devoluciones de llamadas de atributos sysfs en curso. Pero usb_deauthorize_interface() no se puede completar hasta que se haya liberado el bloqueo del dispositivo, y el bloqueo no se liberar\u00e1 hasta que haya finalizado la eliminaci\u00f3n. El mecanismo proporcionado por sysfs para evitar este tipo de punto muerto es utilizar la funci\u00f3n sysfs_break_active_protection(), que le dice a sysfs que no espere la devoluci\u00f3n de llamada del atributo. Reportado y probado por: Yue Sun Reportado por: xingwei lee "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4",
"versionEndExcluding": "4.19.312",
"matchCriteriaId": "C4C98081-1B09-4E13-812A-7CF488B3FE75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionEndExcluding": "5.4.274",
"matchCriteriaId": "61B524A6-9106-4FE6-A33B-1E4EBCEB56D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.215",
"matchCriteriaId": "9B023842-6532-401F-9E36-7FB2CA379A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.154",
"matchCriteriaId": "C82FFB5F-4A2E-49F4-AACE-EC406F625AC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "C0AC9329-397B-4DA1-963E-935154D84671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "D15F9C27-5FEC-4D9D-9C75-6CB330C0B299"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "0E4663C3-7D71-4DA9-9A13-EC2E448147C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8.0",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "57497073-82D5-4695-AA8B-363CA1C033BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:r1:*:*:*:*:*:*",
"matchCriteriaId": "E1E2BC41-356E-412A-9B5D-9B5EFCB4E942"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26942",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:09.633",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:13:50.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,80 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: phy: qcom: at803x: corrige el p\u00e1nico del kernel con at8031_probe Al reelaborar y dividir el controlador at803x, en la funci\u00f3n de divisi\u00f3n de los PHY de at803x se agreg\u00f3 un error de desreferencia NULL donde se hace referencia a priv antes de que realmente se asigne y luego se intenta escribir para las variables is_1000basex e is_fiber en el caso de at8031, escribiendo en la direcci\u00f3n incorrecta. Solucione este problema configurando correctamente la variable local priv solo despu\u00e9s de llamar a at803x_probe y realmente asignar priv en la estructura phydev."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6a4aee277740d04ac0fd54cfa17cc28261932ddc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a8a296ad9957b845b89bcf48be1cf8c74875ecc3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26949",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:10.930",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:13:56.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,88 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu/pm: corrige la desreferencia del puntero NULL cuando se obtiene el l\u00edmite de energ\u00eda. Debido a que la inicializaci\u00f3n de powerplay_table se omite en el caso sriov, verificamos y configuramos el valor OD inferior y superior predeterminado si powerplay_table es NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "D395D167-B806-45A5-9C34-38C8A1FE0F7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/08ae9ef829b8055c2fdc8cfee37510c1f4721a07",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/99c2f1563b1400cc8331fc79d19ada1bb95bb388",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8eaa8ef1f1157a9f330e36e66bdd7a693309948",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26952",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:11.350",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:14:05.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,88 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: corrige posibles l\u00edmites cuando el desplazamiento del b\u00fafer no es v\u00e1lido. Encontr\u00e9 posibles l\u00edmites cuando los campos de desplazamiento del b\u00fafer de algunas solicitudes no son v\u00e1lidos. Este parche establece el valor m\u00ednimo del campo de compensaci\u00f3n del b\u00fafer en ->Desplazamiento del b\u00fafer para validar la longitud del b\u00fafer."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "D395D167-B806-45A5-9C34-38C8A1FE0F7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26978",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:15.040",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:14:12.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,35 +14,144 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: serial: max310x: corrige la desreferencia del puntero NULL en la creaci\u00f3n de instancias I2C Al intentar crear una instancia de un dispositivo max14830 desde el espacio de usuario: echo max14830 0x60 > /sys/bus/i2c/devices/i2c-2/ new_device obtenemos el siguiente error: No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual... ... Rastreo de llamadas: max310x_i2c_probe+0x48/0x170 [max310x] i2c_device_probe+0x150/0x2a0... Agregar verificaci\u00f3n de validez del tipo de desarrollo para evitar el error y cancelar la sonda con un mensaje de error significativo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.274",
"matchCriteriaId": "90955D0B-C114-49F4-9F65-0C9844CAAD75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.215",
"matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "F03B199F-8EE9-4B14-9AFE-4A3ECD504B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndIncluding": "6.8.3",
"matchCriteriaId": "19932A6B-00C5-4632-820A-05A78115D777"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d27056c24efd3d63a03f3edfbcfc4827086b110",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/12609c76b755dbeb1645c0aacc0f0f4743b2eff3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2160ad6861c4a21d3fa553d7b2aaec6634a37f8a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5cd8af02b466e1beeae13e2de3dc58fcc7925e5a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d271b798add90c6196539167c019d0817285cf0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aeca49661fd02fd56fb026768b580ce301b45733",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c45e53c27b78afd6c81fc25608003576f27b5735",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26979",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:15.227",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:14:15.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,35 +14,145 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: corrige una posible desreferencia del puntero nulo con contextos no v\u00e1lidos. vmw_context_cotable puede devolver un error o un puntero nulo y, en ocasiones, su uso no se controlaba. El c\u00f3digo posterior intentar\u00eda acceder a un puntero nulo o a un valor de error. Las desreferencias no v\u00e1lidas solo fueron posibles con aplicaciones de espacio de usuario con formato incorrecto que nunca inicializaron correctamente los contextos de representaci\u00f3n. Verifique los resultados de vmw_context_cotable para corregir los derefs no v\u00e1lidos. Gracias: ziming zhang (@ezrak1e) de Ant Group Light-Year Security Lab, quien fue la primera persona en descubrirlo. Niels De Graef, quien lo inform\u00f3 y ayud\u00f3 a localizar al poc."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.10.215",
"matchCriteriaId": "232C4522-CA13-49F2-97E0-DAA480E1E801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.154",
"matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26986",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:16.180",
"lastModified": "2024-05-13T08:15:10.867",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:14:25.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,134 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdkfd: corrige la p\u00e9rdida de memoria en el error create_process. Corrige la p\u00e9rdida de memoria debido a una referencia mmget filtrada en una ruta de c\u00f3digo de manejo de errores que se activa al intentar crear procesos KFD mientras se reinicia la GPU. Est\u00e1 en proceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "7DB36E9A-09DE-4761-955A-333F7ED4B6B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0dcd876411644da98a6b4d5a18d32ca94c15bdb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/18921b205012568b45760753ad3146ddb9e2d4e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aa02d43367a9adf8c85fb382fea4171fb266c8d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26987",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:16.260",
"lastModified": "2024-05-13T08:15:10.940",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:15:23.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,148 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/memory-failure: corrige el interbloqueo cuando Hugetlb_optimize_vmemmap est\u00e1 habilitado Cuando hice una prueba dura sin conexi\u00f3n con p\u00e1ginas de Hugetlb, se produce el siguiente interbloqueo: ============ ========================================== ADVERTENCIA: posible dependencia de bloqueo circular detectada 6.8 .0-11409-gf6cef5f8c37f #1 No contaminado ---------------------------------------- -------------- bash/46904 est\u00e1 intentando adquirir el bloqueo: ffffffffabe68910 (cpu_hotplug_lock){++++}-{0:0}, en: static_key_slow_dec+0x16/0x60 pero la tarea est\u00e1 ya mantiene el bloqueo: ffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3:3}, en: zone_pcp_disable+0x16/0x40 cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #1 (pcp_batch_high_lock){+.+.}-{3:3}: __mutex_lock+0x6c/0x770 page_alloc_cpu_online+0x3c/0x70 cpuhp_invoke_callback+0x397/0x5f0 __cpuhp_invoke_callback_range+0x71/ 0xe0 _cpu_up+0xeb/0x210 cpu_up+0x91/0xe0 cpuhp_bringup_mask+0x49/0xb0 Bringup_nonboot_cpus+0xb7/0xe0 smp_init+0x25/0xa0 kernel_init_freeable+0x15f/0x3e0 kernel_init+0x15/0x1b0 t_from_fork+0x2f/0x50 ret_from_fork_asm+0x1a/0x30 -> #0 (cpu_hotplug_lock){++++}-{0:0}: __lock_acquire+0x1298/0x1cd0 lock_acquire+0xc0/0x2b0 cpus_read_lock+0x2a/0xc0 static_key_slow_dec+0x16/0x60 __hugetlb_vmemmap_restore_folio+0x1b9/0x200 dissolve_free_huge _p\u00e1gina+0x211/0x260 __p\u00e1gina_handle_poison+0x45/ 0xc0 error_de_memoria+0x65e/0xc70 hard_offline_page_store+0x55/0xa0 kernfs_fop_write_iter+0x12c/0x1d0 vfs_write+0x387/0x550 ksys_write+0x64/0xe0 do_syscall_64+0xca/0x1e0 entrada_SYSCALL_6 4_after_hwframe+0x6d/0x75 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 CPU1 ---- ---- bloqueo(pcp_batch_high_lock); bloquear(cpu_hotplug_lock); bloquear(pcp_batch_high_lock); rlock(cpu_hotplug_lock); *** DEADLOCK *** 5 bloqueos retenidos por bash/46904: #0: ffff98f6c3bb23f0 (sb_writers#5){.+.+}-{0:0}, en: ksys_write+0x64/0xe0 #1: ffff98f6c328e488 (&of ->mutex){+.+.}-{3:3}, en: kernfs_fop_write_iter+0xf8/0x1d0 #2: ffff98ef83b31890 (kn->active#113){.+.+}-{0:0}, en : kernfs_fop_write_iter+0x100/0x1d0 #3: ffffffffabf9db48 (mf_mutex){+.+.}-{3:3}, en: Memory_failure+0x44/0xc70 #4: ffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3: 3}, en: zone_pcp_disable+0x16/0x40 seguimiento de pila: CPU: 10 PID: 46904 Comm: bash Kdump: cargado No contaminado 6.8.0-11409-gf6cef5f8c37f #1 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 01/04/2014 Seguimiento de llamadas: dump_stack_lvl+0x68/0xa0 check_noncircular+0x129/0x140 __lock_acquire+0x1298/0x1cd0 lock_acquire+0xc0/0x2b0 cpus _read_lock+0x2a /0xc0 static_key_slow_dec+0x16/0x60 __hugetlb_vmemmap_restore_folio+0x1b9/0x200 dissolve_free_huge_page+0x211/0x260 __page_handle_poison+0x45/0xc0 Memory_failure+0x65e/0xc70 hard_offline_page_store+0x55/0 xa0 kernfs_fop_write_iter+0x12c/0x1d0 vfs_write+0x387/0x550 ksys_write+0x64/0xe0 do_syscall_64+0xca /0x1e0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7fc862314887 C\u00f3digo: 10 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24 RSP: 002b:00007fff19311268 EFLAGS: 00000246 : 0000000000000001 RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007fc862314887 RDX: 000000000000000c RSI: 000056405645fe10 RDI: 0000000000000001 RBP: 000056405645fe10 R08: 00007fc8623d1460 R09: 000000007ffffff R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c R13: 00007fc86241b780 R14: 00007fc862417600 R15: 00007fc862416a00 En resumen, La siguiente escena rompe el ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B8A22524-9F14-4E3F-8B0D-E2A689BE7F8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1983184c22dd84a4d95a71e5c6775c2638557dc7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/49955b24002dc16a0ae2e83a57a2a6c863a1845c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ef7ba2799a3b5ed292b8f6407376e2c25ef002e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/882e1180c83f5b75bae03d0ccc31ccedfe5159de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27012",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:19.743",
"lastModified": "2024-05-13T08:15:12.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:15:29.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,120 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: restaurar elementos del conjunto cuando falla la eliminaci\u00f3n del conjunto Desde la ruta de cancelaci\u00f3n, nft_mapelem_activate() necesita restaurar los contadores de referencia al estado original. Actualmente, utiliza set->ops->walk() para iterar sobre estos elementos del conjunto. El iterador de conjunto existente omite elementos inactivos en la pr\u00f3xima generaci\u00f3n; esto no funciona desde la ruta de cancelaci\u00f3n para restaurar el estado original ya que tiene que omitir elementos activos (no inactivos). Este parche mueve la verificaci\u00f3n de elementos inactivos a la devoluci\u00f3n de llamada del iterador establecido, luego invierte la l\u00f3gica para el caso .activate que necesita omitir elementos activos. Cambie el bit de pr\u00f3xima generaci\u00f3n para los elementos cuando se invoque el comando eliminar conjunto y llame a nft_clear() desde la ruta .activate (abortar) para restaurar el bit de pr\u00f3xima generaci\u00f3n. El siguiente s\u00edmbolo muestra un objeto en asignaciones memleak: [43929.457523] ------------[ cortar aqu\u00ed ]------------ [43929.457532] ADVERTENCIA: CPU: 0 PID : 1139 en include/net/netfilter/nf_tables.h:1237 nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables] [...] [43929.458014] RIP: 0010:nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables] ] C\u00f3digo: 83 f8 01 77 ab 49 8d 7c 24 08 e8 37 5e d0 de 49 8b 6c 24 08 48 8d 7d 50 e8 e9 5c d0 de 8b 45 50 8d 50 ff 89 55 50 85 c0 75 86 <0f> 0b eb 82 0f 0b eb b3 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 [43929.458081] RSP: 0018:ffff888140f9f4b0 EFLAGS: 00010246 [43929.458086] RAX: 000000000000000 0 RBX: ffff8881434f5288 RCX: dffffc0000000000 [43929.458090] RDX: 00000000ffffffff RSI: ffffffffa26d28a7 RDI: ffff88810ecc9550 [43929.458093 ] RBP: ffff88810ecc9500 R08: 0000000000000001 R09: ffffed10281f3e8f [43929.458096] R10: 00000000000000003 R11: ffff0000ffff0000 R12: 4f52a0 [43929.458100] R13: ffff888140f9f5f4 R14: ffff888151c7a800 R15: 0000000000000002 [43929.458103] FS: 00007f0c687c4740(0000) 88390800000(0000) knlGS :0000000000000000 [43929.458107] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [43929.458111] CR2: 00007f58dbe5b008 CR3: 00000001236020 05 CR4: 00000000001706f0 [43929.458114] Seguimiento de llamadas: [43929.458118] [43929.458121] ? __advertir+0x9f/0x1a0 [43929.458127] ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables] [43929.458188] ? report_bug+0x1b1/0x1e0 [43929.458196] ? handle_bug+0x3c/0x70 [43929.458200] ? exc_invalid_op+0x17/0x40 [43929.458211] ? nft_setelem_data_deactivate+0xd7/0xf0 [nf_tables] [43929.458271] ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables] [43929.458332] nft_mapelem_deactivate+0x24/0x30 [nf_tables] [43929.458392] nft_rhash_walk+0xdd/0x180 [nf_tables] 53] ? __pfx_nft_rhash_walk+0x10/0x10 [nf_tables] [43929.458512] ? rb_insert_color+0x2e/0x280 [43929.458520] nft_map_deactivate+0xdc/0x1e0 [nf_tables] [43929.458582] ? __pfx_nft_map_deactivate+0x10/0x10 [nf_tables] [43929.458642] ? __pfx_nft_mapelem_deactivate+0x10/0x10 [nf_tables] [43929.458701] ? __rcu_read_unlock+0x46/0x70 [43929.458709] nft_delset+0xff/0x110 [nf_tables] [43929.458769] nft_flush_table+0x16f/0x460 [nf_tables] [43929.458830] 501/0x580 [nf_tables]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "ABBE8A9C-EB49-4236-B78E-D0771D521A7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e79b47a8615d42c68aaeb68971593333667382ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27013",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:19.857",
"lastModified": "2024-05-03T06:15:13.277",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:15:39.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,39 +14,204 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tun: limita la velocidad de impresi\u00f3n cuando el paquete ilegal recibido por tun dev vhost_worker llamar\u00e1 a tun para recibir paquetes. Si llegan demasiados paquetes ilegales, tun_do_read seguir\u00e1 descargando el contenido de los paquetes. Cuando la consola est\u00e1 habilitada, le costar\u00e1 mucho m\u00e1s tiempo a la CPU volcar el paquete y se detectar\u00e1 un bloqueo suave. El mecanismo net_ratelimit se puede utilizar para limitar la tasa de dumping. PID: 33036 TAREA: ffff949da6f20000 CPU: 23 COMANDO: \"vhost-32980\" #0 [fffffe00003fce50] crash_nmi_callback en ffffffff89249253 #1 [fffffe00003fce58] nmi_handle en ffffffff89225fa3 #2 00003fceb0] default_do_nmi en ffffffff8922642e #3 [fffffe00003fced0] do_nmi en ffffffff8922660d #4 [fffffe00003fcef0] end_repeat_nmi en ffffffff89c01663 [excepci\u00f3n RIP: io_serial_in+20] RIP: ffffffff89792594 RSP: ffffa655314979e8 RFLAGS: 00000002 RAX: ffffffff89792500 RBX: ff8af428a0 RCX: 0000000000000000 RDX: 00000000000003fd RSI: 0000000000000005 RDI: ffffffff8af428a0 RBP: 0000000000002710 R8: 00000000000000004 R9: 000000000000000f R10: 0000000000000000 R11: ffffffff8acbf64f R12: 0000000000000020 R13: ffffffff8acbf698 R14: 00000000000000058 R15: 0000000000000000 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 #5 [ffffa655314979e8] io_serial_in en ffffffff89792594 #6 [ffffa655314979e8] wait_for_xmitr en ffffffff89793470 #7 [ffffa65531497a08] console_putchar en ffffffff897934f6 #8 [ffffa65531497a20] uart_console_write en ffffffff8978b605 #9 [ffffa65531497a48] serial8250_console_write en ffffffff89796558 #10 [ffffa65531497ac8] console_unlock en ffffffff8 9316124 #11 [ffffa65531497b10] vprintk_emit en ffffffff89317c07 #12 [ffffa65531497b68] printk en ffffffff89318306 #13 [ffffa65531497bc8] print_hex_dump en ffffffff89650765 # 14 [ffffa65531497ca8] tun_do_read en ffffffffc0b06c27 [tun] #15 [ffffa65531497d38] tun_recvmsg en ffffffffc0b06e34 [tun] #16 [ffffa65531497d68] handle_rx en ffffffffc0c5d682 [vhost_net] #17 [ffffa65531497ed0] vhost_worker en ffffffffc0c644dc [vhost] #18 [ffffa65531497f10] kthread en ffffffff892d2e72 #19 [ffffa65531497f50] ret_from_fork en ffffffff89c0022f"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.35",
"versionEndExcluding": "4.19.313",
"matchCriteriaId": "A8DD9A34-5E30-4BAA-9BDA-43ABF581D1A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.275",
"matchCriteriaId": "5FF6D8DE-C559-4586-86C8-2C6B4420A2C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.216",
"matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "C67E2ABA-9F30-4CE6-A840-B1051D07E0CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27014",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.063",
"lastModified": "2024-05-13T08:15:12.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:15:45.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,155 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: evita el interbloqueo al deshabilitar aRFS. Al deshabilitar aRFS bajo `priv->state_lock`, cualquier trabajo de aRFS programado se cancela usando la funci\u00f3n `cancel_work_sync`, que espera la trabajo para terminar si ya ha comenzado. Sin embargo, mientras espera el controlador de trabajo, el controlador intentar\u00e1 adquirir el `state_lock` que ya est\u00e1 adquirido. El trabajador adquiere el bloqueo para eliminar las reglas si el estado est\u00e1 inactivo, lo cual no es responsabilidad del trabajador ya que al desactivar aRFS se eliminan las reglas. Agregue una variable de estado de aRFS, que indica si aRFS est\u00e1 habilitado y evita agregar reglas cuando aRFS est\u00e1 deshabilitado. Registro del kernel: ================================================= ======= ADVERTENCIA: posible dependencia de bloqueo circular detectada 6.7.0-rc4_net_next_mlx5_5483eb2 #1 Contaminado: GI -------------------- ---------------------- ethtool/386089 est\u00e1 intentando adquirir el bloqueo: ffff88810f21ce68 ((work_completion)(&rule->arfs_work)){ +.+.}-{0:0}, en: __flush_work+0x74/0x4e0 pero la tarea ya mantiene el bloqueo: ffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, en: mlx5e_ethtool_set_channels+ 0x53/0x200 [mlx5_core] cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #1 (&priv->state_lock){+.+.}-{3:3}: __mutex_lock+0x80/0xc90 arfs_handle_work+0x4b/0x3b0 [mlx5_core] Process_one_work+0x1dc /0x4a0 work_thread+0x1bf/0x3c0 kthread+0xd7/0x100 ret_from_fork+0x2d/0x50 ret_from_fork_asm+0x11/0x20 -> #0 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}: __lock_acquire+0x17b4/0x2c80 lock_acquire+0xd0/0x2b0 __flush_work+0x7a/0x4e0 __cancel_work_timer+0x131/0x1c0 arfs_del_rules+0x143/0x1e0 [mlx5_core] mlx5e_arfs_disable+0x1b/0x30 mlx5_core] mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core] ethnl_set_channels+0x28f/0x3b0 ethnl_default_set_doit +0xec/0x240 genl_family_rcv_msg_doit+0xd0/0x120 genl_rcv_msg+0x188/0x2c0 netlink_rcv_skb+0x54/0x100 genl_rcv+0x24/0x40 netlink_unicast+0x1a1/0x270 netlink_sendmsg+0x214/0 x460 __sock_sendmsg+0x38/0x60 __sys_sendto+0x113/0x170 __x64_sys_sendto+0x20/0x30 do_syscall_64 +0x40/0xe0 Entry_SYSCALL_64_after_hwframe+0x46/0x4e otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 CPU1 ---- ---- lock(&priv->state_lock); lock((work_completion)(&rule->arfs_work)); bloquear(&priv->state_lock); lock((work_completion)(&rule->arfs_work)); *** DEADLOCK *** 3 bloqueos retenidos por ethtool/386089: #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, en: genl_rcv+0x15/0x40 #1: ffffffff82e94c88 (rtnl_mutex){ +.+.}-{3:3}, en: ethnl_default_set_doit+0xd3/0x240 #2: ffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, en: mlx5e_ethtool_set_channels+0x53/0x200 [ mlx5_core] seguimiento de pila: CPU: 15 PID: 386089 Comm: ethtool Tainted: GI 6.7.0-rc4_net_next_mlx5_5483eb2 #1 Nombre de hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt .qemu.org 01/04/2014 Seguimiento de llamadas: dump_stack_lvl+0x60/0xa0 check_noncircular+0x144/0x160 __lock_acquire+0x17b4/0x2c80 lock_acquire+0xd0/0x2b0? __flush_work+0x74/0x4e0? save_trace+0x3e/0x360? __flush_work+0x74/0x4e0 __flush_work+0x7a/0x4e0 ? __flush_work+0x74/0x4e0? __lock_acquire+0xa78/0x2c80? lock_acquire+0xd0/0x2b0? mark_held_locks+0x49/0x70 __cancel_work_timer+0x131/0x1c0 ? mark_held_locks+0x49/0x70 arfs_del_rules+0x143/0x1e0 [mlx5_core] mlx5e_arfs_disable+0x1b/0x30 [mlx5_core] mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core] ethnl_set_channels+0x28f/0x3b0 ethnl_default_set_doit+0xec/0x240 genl_family_rcv_msg_doit+0xd0/0x120 genl_rcv_msg+0x188/0x2c0 ? ethn ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "A2C4A57D-9BB2-4F58-857C-857CE22EE580"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27015",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.230",
"lastModified": "2024-05-13T08:15:12.333",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:15:51.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,162 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: tabla de flujo: tupla de pppoe incorrecta. El tr\u00e1fico de pppoe que llega a la ruta de entrada no coincide con la entrada de la tabla de flujo porque se espera que el encabezado de pppoe est\u00e9 en el desplazamiento del encabezado de red. Este error provoca una discrepancia en la b\u00fasqueda de la tabla de flujo, por lo que los paquetes pppoe ingresan a la ruta de reenv\u00edo cl\u00e1sica."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "A2C4A57D-9BB2-4F58-857C-857CE22EE580"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27016",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.360",
"lastModified": "2024-05-13T08:15:12.407",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:33:33.040",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,162 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: flowtable: validar encabezado pppoe Aseg\u00farese de que haya suficiente espacio para acceder al campo de protocolo del encabezado PPPoe. Val\u00eddelo una vez antes de la b\u00fasqueda de la tabla de flujo, luego use una funci\u00f3n auxiliar para acceder al campo de protocolo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "A2C4A57D-9BB2-4F58-857C-857CE22EE580"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2471d271042ea18e8a6babc132a8716bb2f08b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cf366ee3bc1b7d1c76a882640ba3b3f8f1039163",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d06977b9a4109f8738bb276125eb6a0b772bc433",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27017",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.483",
"lastModified": "2024-05-13T08:15:12.473",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:36:40.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,120 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_set_pipapo: recorra la vista actual en el volcado de netlink. La m\u00e1scara de generaci\u00f3n se puede actualizar mientras el volcado de netlink est\u00e1 en progreso. El iterador de recorrido backend del conjunto pipapo no puede confiar en \u00e9l para inferir qu\u00e9 vista de la estructura de datos se va a utilizar. Agregue notaci\u00f3n para especificar si el usuario desea leer/actualizar el conjunto. Basado en un parche de Florian Westphal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "ABBE8A9C-EB49-4236-B78E-D0771D521A7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27018",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.600",
"lastModified": "2024-05-13T08:15:12.537",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:36:55.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,161 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: br_netfilter: omitir el enlace de entrada conntrack para paquetes promiscos. Por razones hist\u00f3ricas, cuando el dispositivo puente est\u00e1 en modo promisco, los paquetes que se dirigen a los taps siguen la ruta del enlace de entrada del puente. Este parche agrega una workaround para restablecer el seguimiento de conexi\u00f3n de estos paquetes. Jianbo Liu informa se\u00f1ales de advertencia en su infraestructura de prueba donde los paquetes clonados llegan al enlace de entrada br_netfilter para confirmar el objeto conntrack. Elimine un bit de BR_INPUT_SKB_CB para anotar que este paquete ha llegado al gancho de entrada porque pasa al dispositivo puente para llegar a las derivaciones. [57.571874] ADVERTENCIA: CPU: 1 PID: 0 en net/bridge/br_netfilter_hooks.c:616 br_nf_local_in+0x157/0x180 [br_netfilter] [57.572749] M\u00f3dulos vinculados en: xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat escriba xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry superposici\u00f3n rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_isc si ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5ctl mlx5_core [ 57.575158] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0+ #19 [ 57.575700] Nombre de hardware: PC est\u00e1ndar UEM (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 [ 57.576662] RIP: 0010:br_nf_local_in+0x157/0x180 [br_netfilter] [ 57.577195] C\u00f3digo: fe ff ff 41 04 00 00 00 be 04 00 00 00 e9 4a ff ff ff be 04 00 00 00 48 89 ef e8 f3 a9 3c e1 66 83 ad b4 00 00 00 04 eb 91 <0f> 0b e9 f1 fe ff ff 0f 0b e9 df fe ff ff 48 89 df e8 b3 53 47 e1 [ 57.578722] RSP: 0018:ffff88885f845a08 EFLAGS: 00010202 [ 57.579207] RAX: 0000000000000002 RBX: ffff88812dfe8000 RCX: 0000000000000000 [ 57.579830] RDX: ffff88885f845a60 RSI: ffff8881022dc300 RDI: 0000000000000000 [ 57.580454] RBP: ffff88885f845a60 R08: 0000000000000001 R09: 0000000000000003 [ 57.581076] R10: 00000000ffff1300 R11: 0000000000000002 R12: 0000000 [ 57.581695] R13: ffff8881047ffe00 R14: ffff888108dbee00 R15: ffff88814519b800 [ 57.582313] FS: 0000000000000000(0000) GS:ffff88885f8400 00(0000) knlGS:0000000000000000 [ 57.583040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.583564] CR2: 000000c4206aa000 CR3: 0000000103847001 CR4: 0000000000370eb0 [ 57.584194] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 57.584820] DR3: 00000000000000000 DR6: 00000000ffe0ff0 0000000000000400 [ 57.585440] Seguimiento de llamadas: [ 57.585721] [ 57.585976] ? __advertir+0x7d/0x130 [ 57.586323] ? br_nf_local_in+0x157/0x180 [br_netfilter] [57.586811]? report_bug+0xf1/0x1c0 [57.587177]? handle_bug+0x3f/0x70 [57.587539]? exc_invalid_op+0x13/0x60 [57.587929]? asm_exc_invalid_op+0x16/0x20 [57.588336]? br_nf_local_in+0x157/0x180 [br_netfilter] [ 57.588825] nf_hook_slow+0x3d/0xd0 [ 57.589188] ? br_handle_vlan+0x4b/0x110 [ 57.589579] br_pass_frame_up+0xfc/0x150 [ 57.589970] ? br_port_flags_change+0x40/0x40 [ 57.590396] br_handle_frame_finish+0x346/0x5e0 [ 57.590837] ? ipt_do_table+0x32e/0x430 [57.591221]? br_handle_local_finish+0x20/0x20 [ 57.591656] br_nf_hook_thresh+0x4b/0xf0 [br_netfilter] [ 57.592286] ? br_handle_local_finish+0x20/0x20 [ 57.592802] br_nf_pre_routing_finish+0x178/0x480 [br_netfilter] [ 57.593348] ? br_handle_local_finish+0x20/0x20 [ 57.593782] ? nf_nat_ipv4_pre_routing+0x25/0x60 [nf_nat] [ 57.594279] br_nf_pre_routing+0x24c/0x550 [br_netfilter] [ 57.594780] ? br_nf_hook_thresh+0xf0/0xf0 [br_netfilter] [ 57.595280] br_handle_frame+0x1f3/0x3d0 [ 57.595676] ? br_handle_local_finish+0x20/0x20 [ 57.596118] ? br_handle_frame_finish+0x5e0/0x5e0 [ 57.596566] __netif_receive_skb_core+0x25b/0xfc0 [ 57.597017] ? __napi_build_skb+0x37/0x40 [ 57.597418] __netif_receive_skb_list_core+0xfb/0x220"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "CB2F4D25-B857-48D0-BBDF-5EEEB37BE055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3f59ac29dea0921637053908fe99268d157bbb9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/43193174510ea4f3ce09b796e559a2fd9f148615",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/751de2012eafa4d46d8081056761fa0e9cc8a178",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b13db0d16bc7b2a52abcf5cb71334f63faa5dbd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dceb683ab87ca3666a9bb5c0158528b646faedc4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27019",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.743",
"lastModified": "2024-05-13T08:15:12.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:36:50.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,162 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: corrige una posible ejecuci\u00f3n de datos en __nft_obj_type_get() nft_unregister_obj() puede concurrir con __nft_obj_type_get(), y no hay ninguna protecci\u00f3n cuando se itera sobre la lista de nf_tables_objects en __nft_obj_type_get() . Por lo tanto, existe una posible ejecuci\u00f3n de datos de la entrada de la lista nf_tables_objects. Utilice list_for_each_entry_rcu() para iterar sobre la lista nf_tables_objects en __nft_obj_type_get(), y utilice rcu_read_lock() en el llamador nft_obj_type_get() para proteger todo el proceso de consulta de tipos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "C6EF9D18-9A7F-4D53-8B0F-09F7E9F86A79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27020",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.840",
"lastModified": "2024-05-03T06:15:13.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:36:59.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,39 +14,179 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: corrige una posible ejecuci\u00f3n de datos en __nft_expr_type_get() nft_unregister_expr() puede concurrente con __nft_expr_type_get(), y no hay ninguna protecci\u00f3n cuando se itera sobre la lista nf_tables_expressions en __nft_expr_type_get() . Por lo tanto, existe una posible ejecuci\u00f3n de datos en la entrada de la lista nf_tables_expressions. Utilice list_for_each_entry_rcu() para iterar sobre la lista nf_tables_expressions en __nft_expr_type_get() y utilice rcu_read_lock() en el llamador nft_expr_type_get() para proteger todo el proceso de consulta de tipos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndExcluding": "4.19.313",
"matchCriteriaId": "22DD99BA-225B-49F6-AD13-22F00AEDE90F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.275",
"matchCriteriaId": "5FF6D8DE-C559-4586-86C8-2C6B4420A2C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.216",
"matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.157",
"matchCriteriaId": "C67E2ABA-9F30-4CE6-A840-B1051D07E0CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.88",
"matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.29",
"matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27021",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:20.960",
"lastModified": "2024-05-13T08:15:12.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:37:02.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,115 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: r8169: corrige el punto muerto relacionado con el LED al eliminar el m\u00f3dulo. Vincular devm_led_classdev_register() al netdev es problem\u00e1tico porque al eliminar el m\u00f3dulo obtenemos un punto muerto relacionado con RTNL. Solucione este problema evitando las funciones LED administradas por el dispositivo. Nota: Podemos llamar con seguridad a led_classdev_unregister() para un LED incluso si falla el registro, porque led_classdev_unregister() detecta esto y no es operativo en este caso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "A6B3F478-AAC3-4675-897F-870080589B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/19fa4f2a85d777a8052e869c1b892a2f7556569d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/53d986f39acd8ea11c9e460732bfa5add66360d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27022",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:21.110",
"lastModified": "2024-05-03T06:15:13.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:37:12.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,123 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fork: posponga la vinculaci\u00f3n del archivo vma hasta que vma est\u00e9 completamente inicializado. Thorvald inform\u00f3 una ADVERTENCIA [1]. Y la causa ra\u00edz est\u00e1 por debajo de la raza: CPU 1 CPU 2 fork hugetlbfs_fallocate dup_mmap hugetlbfs_punch_hole i_mmap_lock_write(mapping); vma_interval_tree_insert_after: el vma secundario es visible a trav\u00e9s del \u00e1rbol i_mmap. i_mmap_unlock_write(mapeo); enormetlb_dup_vma_private: \u00a1borre vma_lock fuera de i_mmap_rwsem! i_mmap_lock_write(mapeo); Hugetlb_vmdelete_list vma_interval_tree_foreach Hugetlb_vma_trylock_write: Vma_lock est\u00e1 borrado. tmp->vm_ops->open - \u00a1Asigne nuevo vma_lock fuera de i_mmap_rwsem! enormetlb_vma_unlock_write - \u00a1\u00a1\u00a1Vma_lock est\u00e1 asignado!!! i_mmap_unlock_write(mapeo); Hugetlb_dup_vma_private() y hugetlb_vm_op_open() se llaman fuera del bloqueo i_mmap_rwsem, mientras que el bloqueo vma se puede utilizar al mismo tiempo. Solucione este problema posponiendo la vinculaci\u00f3n del archivo vma hasta que vma est\u00e9 completamente inicializado. Esos vmas deben inicializarse primero antes de poder usarlos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.90",
"matchCriteriaId": "A3D09CE2-613D-4A40-BA4F-D0E43023E4C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.30",
"matchCriteriaId": "84046DAF-73CF-429D-9BA4-05B658B377B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.8",
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c42f7e039aba3de6d7dbf92da708e2b2ecba557",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/abdb88dd272bbeb93efe01d8e0b7b17e24af3a34",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cec11fa2eb512ebe3a459c185f4aca1d44059bbf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28978",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-05-01T04:15:10.153",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:05:13.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -50,10 +70,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:openmanage_enterprise:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "894202A9-C16D-4573-A9F1-2A3E022F76AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:openmanage_enterprise:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE32FB11-B8CB-4224-A280-1E24F99EFA8E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000224641/dsa-2024-201-security-update-for-dell-openmanage-enterprise-vulnerability",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28979",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-05-01T04:15:10.387",
"lastModified": "2024-05-01T13:02:20.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-05-23T19:05:51.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:openmanage_enterprise:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.0",
"matchCriteriaId": "0D5A1D00-2AB4-4F92-9CF6-DB82E68B5A01"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31843",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-23T19:16:01.210",
"lastModified": "2024-05-23T19:16:01.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Italtel Embrace 1.6.4. The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows authenticated users to execute commands on the Operating System."
}
],
"metrics": {},
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3272",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T01:15:50.123",
"lastModified": "2024-05-17T02:39:49.447",
"vulnStatus": "Modified",
"lastModified": "2024-05-23T18:11:31.443",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-04-11",
"cisaActionDue": "2024-05-02",
"cisaRequiredAction": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3273",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T01:15:50.387",
"lastModified": "2024-05-17T02:39:49.583",
"vulnStatus": "Modified",
"lastModified": "2024-05-23T18:10:57.883",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-04-11",
"cisaActionDue": "2024-05-02",
"cisaRequiredAction": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-35079",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-23T19:16:01.357",
"lastModified": "2024-05-23T19:16:01.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the uploadAudio method of inxedu v2024.4 allows attackers to execute arbitrary code via uploading a crafted .jsp file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35079.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.inxedu.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-35080",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-23T19:16:01.470",
"lastModified": "2024-05-23T19:16:01.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the gok4 method of inxedu v2024.4 allows attackers to execute arbitrary code via uploading a crafted .jsp file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35080.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.inxedu.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-35375",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-23T19:16:01.627",
"lastModified": "2024-05-23T19:16:01.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is an arbitrary file upload vulnerability on the media add .php page in the backend of the website in version 5.7.114 of DedeCMS"
}
],
"metrics": {},
"references": [
{
"url": "http://shtaoism.com/",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/Tsq741/a16015209fa8728d505c4f82b4f518cd",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-35570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-23T19:16:01.747",
"lastModified": "2024-05-23T19:16:01.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component \\controller\\ImageUploadController.class of inxedu v2.0.6 allows attackers to execute arbitrary code via uploading a crafted jsp file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/KakeruJ/CVE/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,12 @@
"id": "CVE-2024-4947",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-15T21:15:09.273",
"lastModified": "2024-05-23T15:19:22.543",
"lastModified": "2024-05-23T19:54:02.490",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-05-20",
"cisaActionDue": "2024-06-10",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-23T18:00:40.277142+00:00
2024-05-23T20:00:37.996449+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-23T18:00:08.207000+00:00
2024-05-23T19:54:02.490000+00:00
```
### Last Data Feed Release
@ -33,66 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251610
251615
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `5`
- [CVE-2023-4859](CVE-2023/CVE-2023-48xx/CVE-2023-4859.json) (`2024-05-23T16:15:08.793`)
- [CVE-2024-2301](CVE-2024/CVE-2024-23xx/CVE-2024-2301.json) (`2024-05-23T17:15:28.810`)
- [CVE-2024-34927](CVE-2024/CVE-2024-349xx/CVE-2024-34927.json) (`2024-05-23T17:15:29.373`)
- [CVE-2024-34928](CVE-2024/CVE-2024-349xx/CVE-2024-34928.json) (`2024-05-23T17:15:29.460`)
- [CVE-2024-34929](CVE-2024/CVE-2024-349xx/CVE-2024-34929.json) (`2024-05-23T17:15:29.550`)
- [CVE-2024-34930](CVE-2024/CVE-2024-349xx/CVE-2024-34930.json) (`2024-05-23T17:15:29.830`)
- [CVE-2024-34931](CVE-2024/CVE-2024-349xx/CVE-2024-34931.json) (`2024-05-23T17:15:29.930`)
- [CVE-2024-34932](CVE-2024/CVE-2024-349xx/CVE-2024-34932.json) (`2024-05-23T17:15:30.017`)
- [CVE-2024-34933](CVE-2024/CVE-2024-349xx/CVE-2024-34933.json) (`2024-05-23T17:15:30.107`)
- [CVE-2024-34934](CVE-2024/CVE-2024-349xx/CVE-2024-34934.json) (`2024-05-23T17:15:30.197`)
- [CVE-2024-34935](CVE-2024/CVE-2024-349xx/CVE-2024-34935.json) (`2024-05-23T17:15:30.280`)
- [CVE-2024-34936](CVE-2024/CVE-2024-349xx/CVE-2024-34936.json) (`2024-05-23T17:15:30.363`)
- [CVE-2024-35081](CVE-2024/CVE-2024-350xx/CVE-2024-35081.json) (`2024-05-23T17:15:30.457`)
- [CVE-2024-35082](CVE-2024/CVE-2024-350xx/CVE-2024-35082.json) (`2024-05-23T17:15:30.547`)
- [CVE-2024-35083](CVE-2024/CVE-2024-350xx/CVE-2024-35083.json) (`2024-05-23T17:15:30.637`)
- [CVE-2024-35084](CVE-2024/CVE-2024-350xx/CVE-2024-35084.json) (`2024-05-23T17:15:30.733`)
- [CVE-2024-35085](CVE-2024/CVE-2024-350xx/CVE-2024-35085.json) (`2024-05-23T17:15:30.820`)
- [CVE-2024-35086](CVE-2024/CVE-2024-350xx/CVE-2024-35086.json) (`2024-05-23T17:15:30.943`)
- [CVE-2024-35090](CVE-2024/CVE-2024-350xx/CVE-2024-35090.json) (`2024-05-23T17:15:31.033`)
- [CVE-2024-35091](CVE-2024/CVE-2024-350xx/CVE-2024-35091.json) (`2024-05-23T17:15:31.127`)
- [CVE-2024-4365](CVE-2024/CVE-2024-43xx/CVE-2024-4365.json) (`2024-05-23T17:15:31.370`)
- [CVE-2024-5143](CVE-2024/CVE-2024-51xx/CVE-2024-5143.json) (`2024-05-23T17:15:31.560`)
- [CVE-2024-31843](CVE-2024/CVE-2024-318xx/CVE-2024-31843.json) (`2024-05-23T19:16:01.210`)
- [CVE-2024-35079](CVE-2024/CVE-2024-350xx/CVE-2024-35079.json) (`2024-05-23T19:16:01.357`)
- [CVE-2024-35080](CVE-2024/CVE-2024-350xx/CVE-2024-35080.json) (`2024-05-23T19:16:01.470`)
- [CVE-2024-35375](CVE-2024/CVE-2024-353xx/CVE-2024-35375.json) (`2024-05-23T19:16:01.627`)
- [CVE-2024-35570](CVE-2024/CVE-2024-355xx/CVE-2024-35570.json) (`2024-05-23T19:16:01.747`)
### CVEs modified in the last Commit
Recently modified CVEs: `27`
Recently modified CVEs: `33`
- [CVE-2018-5730](CVE-2018/CVE-2018-57xx/CVE-2018-5730.json) (`2024-05-23T17:53:44.783`)
- [CVE-2019-7256](CVE-2019/CVE-2019-72xx/CVE-2019-7256.json) (`2024-05-23T17:58:01.130`)
- [CVE-2020-1472](CVE-2020/CVE-2020-14xx/CVE-2020-1472.json) (`2024-05-23T17:56:29.137`)
- [CVE-2021-36088](CVE-2021/CVE-2021-360xx/CVE-2021-36088.json) (`2024-05-23T16:15:08.583`)
- [CVE-2021-47164](CVE-2021/CVE-2021-471xx/CVE-2021-47164.json) (`2024-05-23T17:50:11.240`)
- [CVE-2023-3603](CVE-2023/CVE-2023-36xx/CVE-2023-3603.json) (`2024-05-23T17:56:49.850`)
- [CVE-2023-36640](CVE-2023/CVE-2023-366xx/CVE-2023-36640.json) (`2024-05-23T17:46:46.207`)
- [CVE-2023-40720](CVE-2023/CVE-2023-407xx/CVE-2023-40720.json) (`2024-05-23T16:38:28.923`)
- [CVE-2023-41993](CVE-2023/CVE-2023-419xx/CVE-2023-41993.json) (`2024-05-23T17:51:57.663`)
- [CVE-2023-44247](CVE-2023/CVE-2023-442xx/CVE-2023-44247.json) (`2024-05-23T16:35:22.593`)
- [CVE-2023-45583](CVE-2023/CVE-2023-455xx/CVE-2023-45583.json) (`2024-05-23T16:23:08.470`)
- [CVE-2023-45586](CVE-2023/CVE-2023-455xx/CVE-2023-45586.json) (`2024-05-23T16:07:16.873`)
- [CVE-2023-46714](CVE-2023/CVE-2023-467xx/CVE-2023-46714.json) (`2024-05-23T16:03:21.917`)
- [CVE-2023-48788](CVE-2023/CVE-2023-487xx/CVE-2023-48788.json) (`2024-05-23T18:00:08.207`)
- [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-05-23T17:57:04.240`)
- [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-05-23T17:57:40.620`)
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-05-23T17:57:26.870`)
- [CVE-2024-27198](CVE-2024/CVE-2024-271xx/CVE-2024-27198.json) (`2024-05-23T17:57:49.653`)
- [CVE-2024-3019](CVE-2024/CVE-2024-30xx/CVE-2024-3019.json) (`2024-05-23T17:15:31.220`)
- [CVE-2024-33525](CVE-2024/CVE-2024-335xx/CVE-2024-33525.json) (`2024-05-23T17:15:28.933`)
- [CVE-2024-33526](CVE-2024/CVE-2024-335xx/CVE-2024-33526.json) (`2024-05-23T17:15:29.020`)
- [CVE-2024-33527](CVE-2024/CVE-2024-335xx/CVE-2024-33527.json) (`2024-05-23T17:15:29.103`)
- [CVE-2024-33528](CVE-2024/CVE-2024-335xx/CVE-2024-33528.json) (`2024-05-23T17:15:29.213`)
- [CVE-2024-33529](CVE-2024/CVE-2024-335xx/CVE-2024-33529.json) (`2024-05-23T17:15:29.293`)
- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2024-05-23T16:15:08.867`)
- [CVE-2024-26933](CVE-2024/CVE-2024-269xx/CVE-2024-26933.json) (`2024-05-23T19:12:43.773`)
- [CVE-2024-26934](CVE-2024/CVE-2024-269xx/CVE-2024-26934.json) (`2024-05-23T19:13:43.970`)
- [CVE-2024-26942](CVE-2024/CVE-2024-269xx/CVE-2024-26942.json) (`2024-05-23T19:13:50.467`)
- [CVE-2024-26949](CVE-2024/CVE-2024-269xx/CVE-2024-26949.json) (`2024-05-23T19:13:56.890`)
- [CVE-2024-26952](CVE-2024/CVE-2024-269xx/CVE-2024-26952.json) (`2024-05-23T19:14:05.133`)
- [CVE-2024-26978](CVE-2024/CVE-2024-269xx/CVE-2024-26978.json) (`2024-05-23T19:14:12.637`)
- [CVE-2024-26979](CVE-2024/CVE-2024-269xx/CVE-2024-26979.json) (`2024-05-23T19:14:15.993`)
- [CVE-2024-26986](CVE-2024/CVE-2024-269xx/CVE-2024-26986.json) (`2024-05-23T19:14:25.180`)
- [CVE-2024-26987](CVE-2024/CVE-2024-269xx/CVE-2024-26987.json) (`2024-05-23T19:15:23.693`)
- [CVE-2024-27012](CVE-2024/CVE-2024-270xx/CVE-2024-27012.json) (`2024-05-23T19:15:29.050`)
- [CVE-2024-27013](CVE-2024/CVE-2024-270xx/CVE-2024-27013.json) (`2024-05-23T19:15:39.063`)
- [CVE-2024-27014](CVE-2024/CVE-2024-270xx/CVE-2024-27014.json) (`2024-05-23T19:15:45.993`)
- [CVE-2024-27015](CVE-2024/CVE-2024-270xx/CVE-2024-27015.json) (`2024-05-23T19:15:51.047`)
- [CVE-2024-27016](CVE-2024/CVE-2024-270xx/CVE-2024-27016.json) (`2024-05-23T19:33:33.040`)
- [CVE-2024-27017](CVE-2024/CVE-2024-270xx/CVE-2024-27017.json) (`2024-05-23T19:36:40.587`)
- [CVE-2024-27018](CVE-2024/CVE-2024-270xx/CVE-2024-27018.json) (`2024-05-23T19:36:55.347`)
- [CVE-2024-27019](CVE-2024/CVE-2024-270xx/CVE-2024-27019.json) (`2024-05-23T19:36:50.157`)
- [CVE-2024-27020](CVE-2024/CVE-2024-270xx/CVE-2024-27020.json) (`2024-05-23T19:36:59.113`)
- [CVE-2024-27021](CVE-2024/CVE-2024-270xx/CVE-2024-27021.json) (`2024-05-23T19:37:02.563`)
- [CVE-2024-27022](CVE-2024/CVE-2024-270xx/CVE-2024-27022.json) (`2024-05-23T19:37:12.607`)
- [CVE-2024-28978](CVE-2024/CVE-2024-289xx/CVE-2024-28978.json) (`2024-05-23T19:05:13.353`)
- [CVE-2024-28979](CVE-2024/CVE-2024-289xx/CVE-2024-28979.json) (`2024-05-23T19:05:51.923`)
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-05-23T18:11:31.443`)
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-05-23T18:10:57.883`)
- [CVE-2024-4947](CVE-2024/CVE-2024-49xx/CVE-2024-4947.json) (`2024-05-23T19:54:02.490`)
## Download and Usage

View File

@ -110139,7 +110139,7 @@ CVE-2018-0432,0,0,975cb71d4b7fdf7c66ecbe36678b7bbffb3bd2ad455a1d9b500d8e3c8cdd37
CVE-2018-0433,0,0,a0bbeba86f3c384ea9a584a838f93465b9860a7b5a24c23868132d089021a6e5,2020-08-28T18:46:36.733000
CVE-2018-0434,0,0,6d1df86614f8715c40b691188d603e64497e6d18463ba2a455a29fc5be66492a,2019-10-09T23:32:04.477000
CVE-2018-0435,0,0,4e4aa0b54b3592779827ce60f459e22c64ff213359b9b52ccc3c11172976610e,2019-10-09T23:32:04.647000
CVE-2018-0436,0,1,e7424650ad1c9ac9a404b6a834a393a892e3415c9b97333e58b56c83a085c2d4,2024-05-23T17:56:44.980000
CVE-2018-0436,0,0,e7424650ad1c9ac9a404b6a834a393a892e3415c9b97333e58b56c83a085c2d4,2024-05-23T17:56:44.980000
CVE-2018-0437,0,0,7eafacd0718b5df0cb46abdb3ee897931a3332ef458b21f0ee0cc7b8f8ee0819,2019-10-09T23:32:04.880000
CVE-2018-0438,0,0,02b7d8728d776df355f868601010cff8c042bceca5fa652d5fa252a516d42b03,2019-10-09T23:32:05.023000
CVE-2018-0439,0,0,60cc2dcbfe97db13d2bd0421c76df29c1fd1427acaae1d280cd365b177c1e858,2019-10-09T23:32:05.147000
@ -124074,8 +124074,8 @@ CVE-2018-5725,0,0,58c24773cc6765e1a460e39b9eca41ee373dd88fea6cec43e4a8b2022fa013
CVE-2018-5726,0,0,98bb2103f8c892a2b91838ccff69e7c8a58b6b02780a483d746ee97089c0ecdc,2018-02-05T20:07:10.163000
CVE-2018-5727,0,0,39977449daea5e9e9e06d6978481ea776af06a32c10a8feedab427bc9e751080,2021-01-26T12:50:41.693000
CVE-2018-5728,0,0,d7a0bae50bc4af6a3f18146c16f588c760e2b1a524b780aaed42469978c436ad,2018-02-02T15:23:20.187000
CVE-2018-5729,0,1,09292357f984df082b5f3c283a1e2b35050b7e38c301d1bfc46bc1de0fd40975,2024-05-23T17:52:18.397000
CVE-2018-5730,0,1,811bebc2cc1e7f2ce3198d362397389a526d145ccb0daccc4fd9051605540cf6,2024-05-23T17:53:44.783000
CVE-2018-5729,0,0,09292357f984df082b5f3c283a1e2b35050b7e38c301d1bfc46bc1de0fd40975,2024-05-23T17:52:18.397000
CVE-2018-5730,0,0,811bebc2cc1e7f2ce3198d362397389a526d145ccb0daccc4fd9051605540cf6,2024-05-23T17:53:44.783000
CVE-2018-5731,0,0,b526198add681b2212e28528f4d6d2fbb9e3429eae811bb1c4f4b66e4eb731c3,2018-04-20T17:03:16.847000
CVE-2018-5732,0,0,0323d5fa9cdfc1f069648119a0b4678a38749f88914d738c7dbf77c8def1f728,2020-01-09T21:14:41.590000
CVE-2018-5733,0,0,b7574344e1389023575486f005caaf9c858a2144f68ba2b7cb846376108b152a,2020-01-09T21:08:05.743000
@ -141820,7 +141820,7 @@ CVE-2019-7252,0,0,867184020b08f3fc709306c75a2c692cefc343ba6b5fd49a37a531f1cdf36f
CVE-2019-7253,0,0,fad52b53282803d4d4d5e4e473135d9e4346b8ca3d896ff1b05ae3d9f491a8b9,2019-07-03T17:19:15.327000
CVE-2019-7254,0,0,f01c4cdeab11b9ee74f295802daff28c7992564c5d93a420f6f97a384f4473f8,2021-10-04T17:15:57.257000
CVE-2019-7255,0,0,d0345945117860857123641eb29c7700e1e9f797af57bb14c8b9d8b6af6257bb,2022-10-14T01:21:44.847000
CVE-2019-7256,0,1,697a3a29292970c38153676480bc6a81cf6741f8f8d78c0fc991b2aaf3f78ffc,2024-05-23T17:58:01.130000
CVE-2019-7256,0,0,697a3a29292970c38153676480bc6a81cf6741f8f8d78c0fc991b2aaf3f78ffc,2024-05-23T17:58:01.130000
CVE-2019-7257,0,0,c12bc70a2706aa0b1a235996b97baa21edcbdbf4fa73b5dff9cad9d98f3e95db,2022-10-14T01:32:10.637000
CVE-2019-7258,0,0,871837c4692b71db165da95382f732357ce210cf9527f590a57fa413b26df05a,2022-10-14T01:33:11.630000
CVE-2019-7259,0,0,46f6a86727161a6a5d745e3c1fecd80f0957dd84595b021b3c0adac240e889d9,2022-10-14T01:13:17.953000
@ -149444,7 +149444,7 @@ CVE-2020-14716,0,0,5badb156bfa6a0f957cfc7f3dc940f85418f0c19e77a06c35b4d2fab3aae3
CVE-2020-14717,0,0,d750fa1214222fb54b4b6858b791e99aa2278446bd802ebed76be324865f9daa,2020-07-20T18:29:40.307000
CVE-2020-14718,0,0,dd5a8ba52c9ae46eb2f826050fda0306cd8da7ca3432db732360ad4432ffa3f4,2020-07-20T18:26:56.473000
CVE-2020-14719,0,0,fa01a73275bf37095594dfc5aad4c28047122823eb646942a43024cec25ab80c,2020-07-20T18:19:58.587000
CVE-2020-1472,0,1,d9051d3a074f53e2a8250b98ffd6bc153e28843eb8947c8f1ee60f2a8dacc2d7,2024-05-23T17:56:29.137000
CVE-2020-1472,0,0,d9051d3a074f53e2a8250b98ffd6bc153e28843eb8947c8f1ee60f2a8dacc2d7,2024-05-23T17:56:29.137000
CVE-2020-14720,0,0,18d759ee3857691e5fa8331e309ac26705c066e68c3041be62d8d5506a8392e1,2020-07-20T17:52:43.707000
CVE-2020-14721,0,0,9001f7716fe4797834a9a925d584631d4aa45f3d555b58993a8157fe00a38bb8,2020-07-21T00:54:32.320000
CVE-2020-14722,0,0,e2be99b920a26e253bd620be1b29d937bde31112983c216884cbfdb6d02247bb,2020-07-21T00:53:08.270000
@ -151704,7 +151704,7 @@ CVE-2020-17515,0,0,b9ea468468ff921fe86bb29317afe15999bb9e8acd56c04de22c44a3c44e1
CVE-2020-17516,0,0,aec899ffce214285b5fc00810f926119a3b2a0e5b9234fe4df0136b5e9ee6c2c,2023-11-07T03:19:12.413000
CVE-2020-17517,0,0,e57f8498c8e6974eebe301708a418fa30210de71584034ce279b24f095df3efe,2022-08-05T17:12:46.173000
CVE-2020-17518,0,0,daa2c88d02dd0aa54a186f84810417e21874c98a0279b98c0b237cdcb62e335d,2023-11-07T03:19:12.540000
CVE-2020-17519,0,0,dfdb5ae89bc1166bbb7aa63c0cd35e58e908a354d18cabacb94ff7aafb71c2cb,2023-11-07T03:19:12.707000
CVE-2020-17519,0,1,11cfe65c9a0301e7def5e46e1b9aaa454d94c2a42b179bc5fe6be65fd47b7b88,2024-05-23T19:54:02.487000
CVE-2020-1752,0,0,2e8d828892809fece2039127c34a2042793c9d5fc1907e321ded9d79de475846,2023-11-07T03:19:33.337000
CVE-2020-17520,0,0,7b53e64eb7d9b93274b75df4e0956be00e02218d21c5618af95f2af576e8f301,2021-07-21T11:39:23.747000
CVE-2020-17521,0,0,ad3f32118d1f52088c1208d11c2f8e5a04ae0f368a8398ed10f42ca8c6165c50,2023-11-07T03:19:12.847000
@ -178781,7 +178781,7 @@ CVE-2021-36084,0,0,1943efc4f356b9aee63e2eb0ed82127d1fa17fe6cbdfbc137cee1dfc9d566
CVE-2021-36085,0,0,8b0b318340c0cfa9377b40b05889171387eef025025d4786abcdf87b01d4dac7,2023-11-07T03:36:42.577000
CVE-2021-36086,0,0,7a03bdc520004ea7495646f8abc513cf5e257dc64059a1a188df6af204d9818d,2023-11-07T03:36:42.637000
CVE-2021-36087,0,0,1f1eb59215453aeafe92c770fc46207bdcbf6ff56c352be49e57008075153005,2023-11-07T03:36:42.693000
CVE-2021-36088,0,1,7bb6861f45adb90d9f6a84c8c76fb5d6635b03cb3ea082b13cc92a5faa4b6c3a,2024-05-23T16:15:08.583000
CVE-2021-36088,0,0,7bb6861f45adb90d9f6a84c8c76fb5d6635b03cb3ea082b13cc92a5faa4b6c3a,2024-05-23T16:15:08.583000
CVE-2021-36089,0,0,640f9942350bea8f21ae3b71210f665b377699c21a1d3083aeb271653d318cd8,2021-07-06T21:04:08.783000
CVE-2021-3609,0,0,e0ed8226661b0941186f50d52d52ac4837f1545f3698081026c3faebf3817dc4,2023-08-11T19:44:29.540000
CVE-2021-36090,0,0,14f14d2c78a07fa46898d109e1cad7365fec7e87d402ec6b9d012fd7f8704552,2023-11-07T03:36:42.777000
@ -186952,7 +186952,7 @@ CVE-2021-47160,0,0,e9cd458b99fed8ba6ceea1a5df90f0bbdef973c04932e647742ef25d24c86
CVE-2021-47161,0,0,15e0b50e918bcd53a64719c927820f71a03df4384300f734427881f04d0280f1,2024-03-25T13:47:14.087000
CVE-2021-47162,0,0,fcc7e7eeb91f5c4e10b8e27cbaf203997edcbab5f891b90e265a0929b4470c68,2024-03-25T13:47:14.087000
CVE-2021-47163,0,0,8e4bcebda8e8dba0f896f1be4c45e4efa9b09929284864ecd45c1184cbc326e1,2024-03-25T13:47:14.087000
CVE-2021-47164,0,1,296e280b9e0e6917e501f4c47c28145cf08a085357b0f1e2eb4afdd08828fa2c,2024-05-23T17:50:11.240000
CVE-2021-47164,0,0,296e280b9e0e6917e501f4c47c28145cf08a085357b0f1e2eb4afdd08828fa2c,2024-05-23T17:50:11.240000
CVE-2021-47165,0,0,d69b73beac52d3b607749a9797524167b46e9ffcf87b692ee84045d9c3cf699f,2024-03-25T13:47:14.087000
CVE-2021-47166,0,0,30bbc3d856914a16307e2def1b6f70c79550ee4f6277ea6ed0a2d9cf25cd3473,2024-03-25T13:47:14.087000
CVE-2021-47167,0,0,6a26e20136c3a035ed6e4268c69534901ce67e944a707a3910eb8e55dd2c5be4,2024-03-25T13:47:14.087000
@ -204214,7 +204214,7 @@ CVE-2022-38023,0,0,d1b1af13ff00e02d8ac91a41c9bd9512bdd8e3daa20611e96517b340519d5
CVE-2022-38025,0,0,8ac83fa3dba3d8f02dc15c4bafe0b1a7339911b2dec7d5d8a0029de532cf5330,2023-12-20T20:15:15.140000
CVE-2022-38026,0,0,810eec0532c5fd84ff515731f2c1f5350c0bedb83314df17ab6fa629f7f62f59,2023-12-20T20:15:15.233000
CVE-2022-38027,0,0,a2885991fd02cb09a31c30059d77c3c1969beb255f85157490833d706096da80,2023-12-20T20:15:15.317000
CVE-2022-38028,0,0,740a533abbfe536f998dcc1fc724505dad0f206e46c9015844b3d7c6ceae711f,2024-04-24T01:00:01.230000
CVE-2022-38028,0,1,018e74072177d8acc1b214952e1db00605c237894c528c067f2ad4c7758c9a7d,2024-05-23T18:12:17.383000
CVE-2022-38029,0,0,225ae76b883cf6c69017cb1ebdf2872cded9c51434379e9878e6c54a2db1f08f,2023-12-20T20:15:15.500000
CVE-2022-3803,0,0,3e78f739055885f05c00687832bb87d6a6276b0391e7285d9da7711bfaf77fdd,2023-11-07T03:51:49.163000
CVE-2022-38030,0,0,f33a382430e8871477c4c4fa984f1dd0d7ff4b387260c88751884115ba3667a6,2023-12-20T20:15:15.607000
@ -211882,7 +211882,7 @@ CVE-2022-48650,0,0,68843ce531e2083131ee597f63bf1dc672c2f7ae37bed2a622be346669384
CVE-2022-48651,0,0,be0472f45e5b93bc292c90b67bea0d9edc1843d7532460583b02ee998a6d3e37,2024-04-29T12:42:03.667000
CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000
CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000
CVE-2022-48654,0,0,57581f1de35874ee18c78904c1f62dd0d7f69d22ebae196cd3ebe7754150aa73,2024-04-29T12:42:03.667000
CVE-2022-48654,0,1,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000
CVE-2022-48655,0,0,a65ec4eff6e7afc837074b4f9b8c00743a2af576677e13905af003a1a4ac6cec,2024-04-30T15:25:10.210000
CVE-2022-48656,0,0,421f7ed2ce5f328d5dde3dd7f4b4775d8fed8db494e073ab5ceefd90d9745ccb,2024-04-29T12:42:03.667000
CVE-2022-48657,0,0,53792d17e92b7b0bb22b3f0ca741148607168d1927a6cc7adf210f04916eea6b,2024-04-29T12:42:03.667000
@ -211904,7 +211904,7 @@ CVE-2022-48670,0,0,083e49a33f4c5f90aec3ee18bb82663b61a56f31443897b79e4773b4842a9
CVE-2022-48671,0,0,0a5da7c32995cab0f81e99b0c8be60a0eb3b90c149f0bc20c5d2063c21e9400c,2024-05-03T15:32:19.637000
CVE-2022-48672,0,0,d05a87ba9af9e0d0ac32947ca1b0a6a47e18d7ae74a00325a78b3953929da829,2024-05-03T15:32:19.637000
CVE-2022-48673,0,0,2b54c6b18fab403560410cf1a2a1b6a773da75ccb6879810170a993a91f98ec3,2024-05-03T15:32:19.637000
CVE-2022-48674,0,0,6c52aabc92d69d86904ef0add1580287975ea622b5d0ff6a49b44f7c58bf9f08,2024-05-03T15:32:19.637000
CVE-2022-48674,0,1,fa42813fe90b0585e3ad673a0800f86f62acc80eb213e88f44bacff6d05e9fd4,2024-05-23T19:36:25.633000
CVE-2022-48675,0,0,81a5be7a7e935cd9c2054285f9e70ccd88836f91b2137faccc8b38f1ebdc753e,2024-05-03T15:32:19.637000
CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000
CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000
@ -226397,7 +226397,7 @@ CVE-2023-36026,0,0,65b4b2c363927d614a1aa354e95d97eb7c36ec075c8085ee3fa667b753d87
CVE-2023-36027,0,0,326f76a40467d734af7c91cbafd62c59ccab632810da59186f85839f79e7fe34,2023-11-16T20:02:02.867000
CVE-2023-36028,0,0,3d7914a7acb242ebd5d4dc7b4e49dce6b49e8dcd764bb9ca42d18a3979884b75,2023-11-20T17:53:37.477000
CVE-2023-36029,0,0,0ae7d10103f2312d234b16b05b49e3822bcf1cf250ddff3d80ce925b7f9fc3a5,2024-02-03T09:15:09.903000
CVE-2023-3603,0,1,b32c090f737c60becb6b56e4974807de881f726907cce6baf44bc10819605eab,2024-05-23T17:56:49.850000
CVE-2023-3603,0,0,b32c090f737c60becb6b56e4974807de881f726907cce6baf44bc10819605eab,2024-05-23T17:56:49.850000
CVE-2023-36030,0,0,7317facb2b24abfcce56d441db23d20c3442079ad8131940a0837aba4d41654f,2023-11-20T19:54:18.003000
CVE-2023-36031,0,0,7e9aba143252a7784c41cf9f9a220002a93e838ec896bfee37ae04d894405a1a,2023-11-20T19:53:58.287000
CVE-2023-36033,0,0,428133f3dc2624385d4b1df9243a1659b58d9f9c413be30e65137eb76c16ddd4,2023-11-20T19:53:39.690000
@ -226823,7 +226823,7 @@ CVE-2023-36637,0,0,7c305b9ca634c22ed8447c596b332935f57808c9b17b6c12f9ff14dac2945
CVE-2023-36638,0,0,8c3ee86cc952c7fdc1ac68e14cf4f62efc4edb7d1fbec7d978dfc2c37415109d,2023-11-07T04:16:39.783000
CVE-2023-36639,0,0,6fdd11eea4a98277c97f4888c49d699a68d6d370b78d7d85ad9e5ac9fa763f05,2023-12-15T18:54:15.480000
CVE-2023-3664,0,0,ef51e6923199f396685dbaa0767c203536e314e4a8d5e60a049d3f5911c5ddcb,2023-11-07T04:19:17.493000
CVE-2023-36640,0,1,7ca360a3dbb6af59c04355dd504f61eb658eb920a769b77fb2e418abf7b0d0f5,2024-05-23T17:46:46.207000
CVE-2023-36640,0,0,7ca360a3dbb6af59c04355dd504f61eb658eb920a769b77fb2e418abf7b0d0f5,2024-05-23T17:46:46.207000
CVE-2023-36641,0,0,14eed1895e1dd459b3f8a6375e0c4bbaa4b9943f00f080f76bb14a4e12712504,2023-11-20T19:59:59.920000
CVE-2023-36642,0,0,b5817bb3ab405e31d7bbc953f484d8198bb18a03572502df584a98977f70bb84,2023-11-07T04:16:39.923000
CVE-2023-36643,0,0,caa7b55eb3439a56a7ada7953af427a7bfa1f0a80af8955b41ee8a026214fc73,2024-04-04T12:48:41.700000
@ -230049,7 +230049,7 @@ CVE-2023-40717,0,0,5e21b641815e67d8fd60e822e5a48457944fa11029dd9cab29e779abb944b
CVE-2023-40718,0,0,875bea918fdeb30dd3af0d1b889b1de37cb175f864ed5a44ad529fbffb476b3a,2023-11-07T04:20:20.783000
CVE-2023-40719,0,0,8e20f5ab9de3d4a89e416137cefd67c0d2e460904a66c3c7daa2e20afc27dabe,2023-11-21T02:05:04.860000
CVE-2023-4072,0,0,6f3beef0e5a180fc358e2e0d1984d6db5ee976874ae273d3925414567f36a16d,2024-01-31T17:15:13.883000
CVE-2023-40720,0,1,2ab1ec96f7a7a569f1417e615b2a6c094502f5342881a756ef145d326d0da096,2024-05-23T16:38:28.923000
CVE-2023-40720,0,0,2ab1ec96f7a7a569f1417e615b2a6c094502f5342881a756ef145d326d0da096,2024-05-23T16:38:28.923000
CVE-2023-40724,0,0,cb3a2a23d7d3552cc3b9f7afbcbdad16e1ec50d6a6ae674d611119eebbb98e22,2023-09-14T16:45:51.487000
CVE-2023-40725,0,0,5049b37cce0ba878e05f2903e62f673ca313dc566b2aa6161c2baf793576a9ad,2023-09-14T16:46:06.480000
CVE-2023-40726,0,0,e68694ff0de5714c7a73990ef97ef1bc5ff046f0794ddf59491f51664fdf8142,2023-09-14T16:46:40.793000
@ -230972,7 +230972,7 @@ CVE-2023-4199,0,0,f7de59f6b2eff5d85d5c81edbc58bffdc241931d6db8c8ac7e1eecaf7bbbe3
CVE-2023-41990,0,0,4cdf41ae5457182e2854914f83e208b2b103461a48653080b69c6bc694e9ca27,2024-02-16T18:45:01.993000
CVE-2023-41991,0,0,b9b7eeceae5fb1c749856b474c11967b1f94ed12b649a9ca87d624eb6cfcea52,2024-01-10T22:15:49.337000
CVE-2023-41992,0,0,4eb24e92af8591fd41a5264722e8726361a4901d27ef469b051a318156e45b2b,2024-01-10T22:15:49.427000
CVE-2023-41993,0,1,8b66a38717b6c137c1fca203d1eb351e3cab82720e86b23cd64a6fb3575cb509,2024-05-23T17:51:57.663000
CVE-2023-41993,0,0,8b66a38717b6c137c1fca203d1eb351e3cab82720e86b23cd64a6fb3575cb509,2024-05-23T17:51:57.663000
CVE-2023-41994,0,0,9d9ed96a7983233cac79f96192d0a87b7a85f153815c6f80ec3cd0d903fdd3d2,2024-01-12T14:42:23.890000
CVE-2023-41995,0,0,e3cc6815d15e6c68ba1ad2369c922ee2a0d1bddabf438d7900aa1668a96a5bd0,2023-12-22T16:15:29.073000
CVE-2023-41996,0,0,4b33e62f353d6c102117ee546f57300f74113d54fc9245a6b2d032ea8b426565,2023-12-22T22:15:07.727000
@ -231778,7 +231778,7 @@ CVE-2023-43203,0,0,89492255a78602a3660bb14c29156ff5d3f1c78d9c5f696957821b2311a48
CVE-2023-43204,0,0,4a4c4d4994b2f884e18726aeca1648bfa11032f7530eed52aae397e60b88aa06,2023-09-22T14:03:57.567000
CVE-2023-43206,0,0,53b089b8d72e932a87f991eeb097f8b081c537207c2cfa523c62acb7d105f551,2023-09-22T14:03:46.960000
CVE-2023-43207,0,0,8d34533c58528826e409ae037f8fc09815bbec54dca957a0332119b691dd4bc7,2023-09-22T14:03:39.580000
CVE-2023-43208,0,0,2692e6841b3c70ed401d2ac033d1ceb5c872504cf8faa4e8803c3ab9a5b99dc1,2024-01-31T18:15:46.020000
CVE-2023-43208,0,1,694bda0c9001945af9d8c58bbb067fe7a83c215d5b4d74ec15119a90f59f0215,2024-05-23T19:54:02.490000
CVE-2023-4321,0,0,30a31ab53fa53fe15c449ae93d43fb2ff1c384fe951606ab3d89bf78f7dc8679,2023-08-22T20:43:55.613000
CVE-2023-43216,0,0,be2ff07bef1ed4a95f5a3833eea5f9ba32b594950eb332bce26f1dff8ec8c9b8,2023-09-27T16:25:34.437000
CVE-2023-4322,0,0,864f4e2e8ced6d046b50f82917512ed1e21dde9d3f0e69edfd9d5977cde60080,2024-01-21T03:03:06.933000
@ -232477,7 +232477,7 @@ CVE-2023-44243,0,0,16056a988df253d5e4fad26ed3d1b93e9d3c750da50f0a2f37aee816a8f91
CVE-2023-44244,0,0,a96d51d115ef932644b14e79441f1929b23ff9866db51cc3f78865880eda3f0a,2023-10-04T02:13:12.393000
CVE-2023-44245,0,0,2014e7cf6ca579fdaa00810edc6c6bf2bbab15e6870f8206a06172b70a9d5101,2023-10-04T11:48:34.220000
CVE-2023-44246,0,0,0c54e73b30af9e05f46af7f5d48162eb5a2f90a3a89f64d7d1f77a5c3fc09910,2023-10-12T17:52:33
CVE-2023-44247,0,1,a3c0b86d7046025113286bf298c5273dabc83745551a30b916dcae1b9285d4d5,2024-05-23T16:35:22.593000
CVE-2023-44247,0,0,a3c0b86d7046025113286bf298c5273dabc83745551a30b916dcae1b9285d4d5,2024-05-23T16:35:22.593000
CVE-2023-44248,0,0,6794983adbae4d6139b19efec39d24ba21581d257693e94b37f910c37226eb42,2023-11-21T01:39:38.243000
CVE-2023-44249,0,0,7387e716bd2e1cc406de3520c5be46766f483d26051fdb8ea949636183bf1124,2023-12-21T01:05:13.217000
CVE-2023-44250,0,0,3165960603a0db493dd4bba12c66801115a708bb74106ce71e755ac95d8cd94b,2024-01-18T13:54:40.410000
@ -233214,9 +233214,9 @@ CVE-2023-4558,0,0,5a3d5caa88afd4f6e3d15c2f12016f2ce762ac9aff1cea6b11c8caf4ab4ae7
CVE-2023-45580,0,0,04e501e950d97ec2f6c2c242846fcd2bfed39668c0815b120a2d01ececd19eb7,2023-11-03T19:04:23.627000
CVE-2023-45581,0,0,367d5d01e919066242858bc41d20baeba68c4cfe1a7158bdfeddc812d1a129c6,2024-02-20T20:54:47.437000
CVE-2023-45582,0,0,ec3038d8e89bbe4a7db2f562aaf37c6a90f550f4c48b131a2c62e29f98347778,2023-11-18T03:28:51.550000
CVE-2023-45583,0,1,4490f35b0fdb554bdd8487000769c4f6e122715a6ab99a8ca80b669999f28f6c,2024-05-23T16:23:08.470000
CVE-2023-45583,0,0,4490f35b0fdb554bdd8487000769c4f6e122715a6ab99a8ca80b669999f28f6c,2024-05-23T16:23:08.470000
CVE-2023-45585,0,0,f8948e6ae3dd3172522e4847e92a91dd603a009d568e79de2b51810b9e36e369,2023-11-18T03:29:09.223000
CVE-2023-45586,0,1,a25a85857c7e079288d199a9018707a0a1eba26d93acc27701fdf5ef44d8c091,2024-05-23T16:07:16.873000
CVE-2023-45586,0,0,a25a85857c7e079288d199a9018707a0a1eba26d93acc27701fdf5ef44d8c091,2024-05-23T16:07:16.873000
CVE-2023-45587,0,0,a9cb60a58e0c672e26b5905c5a5990c316a4eadd694972cc6304e59e4e2c383e,2023-12-15T19:41:03.370000
CVE-2023-4559,0,0,f0a8f2ece2812a257fe27a6432b60e7d568a02a3bf826633cc9c197c435b67b2,2024-05-17T02:31:39.610000
CVE-2023-45590,0,0,98628c5d512b4fa4db82f9f9a9f9c201229c72b697b9d090bf82475aac88350b,2024-04-10T13:24:22.187000
@ -234078,7 +234078,7 @@ CVE-2023-4671,0,0,ad1f968edfe36b5f1d6decd4caedc1c73ef3ae935fd3b1d84fb345aca578c5
CVE-2023-46711,0,0,1c36566bf77c88f8f580bee5807cda4cdab1040c046625d658316f3bf04fa201,2024-01-04T02:45:03.603000
CVE-2023-46712,0,0,d169d9deb918d86ddb3fd6f8a9da309e3ff3aef24d01eaf742dfc995e5cc9e07,2024-01-17T18:25:21.613000
CVE-2023-46713,0,0,651ba252a50beb076dbcd77eed9416207ba8847f69703fbd84a4801e460be956,2023-12-19T18:59:02.837000
CVE-2023-46714,0,1,86197f93886e9ae5ced0ada357f3600f3edd22b0fbf08fcca860f0ab2ed48159,2024-05-23T16:03:21.917000
CVE-2023-46714,0,0,86197f93886e9ae5ced0ada357f3600f3edd22b0fbf08fcca860f0ab2ed48159,2024-05-23T16:03:21.917000
CVE-2023-46717,0,0,aa258f839ea40a78ca0a10de84d911caccb021bd36a6a7345f56d9a2b06d9ab0,2024-03-21T21:04:18.200000
CVE-2023-4672,0,0,e7f018e5b00d8caa2cd6326fde538c208ac0fc901cdb1bcffceb003eeac57c07,2024-01-04T20:09:31.050000
CVE-2023-46722,0,0,ee1e20585c3fd0a1d9c68641566f4a09ec3ae4d7392bafc4c6a7ed95aa18cb3f,2023-11-08T17:53:25.937000
@ -235388,7 +235388,7 @@ CVE-2023-48586,0,0,fc22bc044d0e9c09395a419c53cb22d0ed5f9a8091b3690a7b42e8fd492a3
CVE-2023-48587,0,0,9887f6ee124c6b817348558214bd886cf22a59fd17e795d45c10b37d15ba49ec,2023-12-16T01:13:40.947000
CVE-2023-48588,0,0,a5c386edfe2afa5e79c2e6e2f54e7ccb3d215670b041ba9333e377c91197479d,2023-12-16T01:13:51.893000
CVE-2023-48589,0,0,8070e07307190b2946b4f6c304d08cd20a37a9eb1f54b65f9a4777b45588c5f8,2023-12-16T01:14:00.417000
CVE-2023-4859,1,1,bab3d2d38d202dc7d7e19e8eea63da314ed258b5cac69e0e77636f241d2f614d,2024-05-23T16:15:08.793000
CVE-2023-4859,0,0,bab3d2d38d202dc7d7e19e8eea63da314ed258b5cac69e0e77636f241d2f614d,2024-05-23T16:15:08.793000
CVE-2023-48590,0,0,b3010109e931c706e2a2603f33a3bfe833082449e88764ab1b75d3b9a253d407,2023-12-16T01:14:08.630000
CVE-2023-48591,0,0,c2db37813796e5de1a3d2de69fd6d585a7f09c8403b68923230fc0e13363a39b,2023-12-16T01:15:33.923000
CVE-2023-48592,0,0,55aa10b9e5a6051979db713e4faa350039fe182d37f47ec9315c46d29795b84d,2023-12-16T01:15:52.377000
@ -235578,7 +235578,7 @@ CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8
CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000
CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000
CVE-2023-48784,0,0,2c8c9b5cd73fccd6bf717ce3db3d03b76214161101a0e621003f928d07a57cf5,2024-04-17T12:15:07.353000
CVE-2023-48788,0,1,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000
CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000
CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000
CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000
CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000
@ -242412,7 +242412,7 @@ CVE-2024-21330,0,0,eb56e0230af29e58642a5f9543b56981fe7bd0d744f705bd50f9823e16aeb
CVE-2024-21334,0,0,7ddd17a1171e0fbf74c7193ebf0e0c369704573b0f6c3dbc6a5a03f447fcb727,2024-04-11T20:15:19.803000
CVE-2024-21336,0,0,dbdd347c9be132e735365af150fcc3e29e71ab509afdbf782d6c0ab1312ca435,2024-01-31T21:08:30.463000
CVE-2024-21337,0,0,bcd2afa99aecc3a7eda0bcab495feb4ce92f8a0ac6002ac1d5e3768f57675f34,2024-04-11T20:15:19.920000
CVE-2024-21338,0,1,4a096c83fb1057a8fc2675b9a83e546135eca735a8b54822e515ca91f644298e,2024-05-23T17:57:04.240000
CVE-2024-21338,0,0,4a096c83fb1057a8fc2675b9a83e546135eca735a8b54822e515ca91f644298e,2024-05-23T17:57:04.240000
CVE-2024-21339,0,0,c6ef17782ee1dd876cbc8b46a2e76ff1e663ced736d6e798756efd2d61d6dbd8,2024-04-11T20:15:20.200000
CVE-2024-2134,0,0,2a687af4050c9be719cbe477e9fa0b7752c0a2c2fa5963c48bb64d4c9099e635,2024-05-17T02:38:03.667000
CVE-2024-21340,0,0,c8ac7ac496eb2577eec3898515c017e2d603dca1bcd91a79346472d7750b1527,2024-04-11T20:15:20.357000
@ -243372,7 +243372,7 @@ CVE-2024-22983,0,0,1b3e25c68b4f4c09625b6b1616200d426118f4ab97bcd8f55256ede34123b
CVE-2024-22984,0,0,e1878756268a68f030b8a1f4c487c52d091cec58671de352e5b7d5d34740ed57,2024-02-07T20:15:49.320000
CVE-2024-22988,0,0,9bce914ce9d429b5a5cd734f9618e22363c87c41939b422b32cac88106642a90,2024-03-18T20:15:08.793000
CVE-2024-2299,0,0,a2c0639aafa318e37cbe84745db202f92d0844b28db3911da779489e209e6323,2024-05-14T16:13:02.773000
CVE-2024-2301,1,1,7749ccc097b72e63dc859b3f4369adca9450ce22839276425de54d5ddd977284,2024-05-23T17:15:28.810000
CVE-2024-2301,0,0,7749ccc097b72e63dc859b3f4369adca9450ce22839276425de54d5ddd977284,2024-05-23T17:15:28.810000
CVE-2024-2302,0,0,111ef6bb80800aad8b5212c78d791bb76a08a7abc709646851b3bdf2c22369ae,2024-04-10T13:23:38.787000
CVE-2024-2303,0,0,e8ec06902514d48e2641fcd827085959ad9d4a100b3417c3f9c5bb681b9976f4,2024-03-26T12:55:05.010000
CVE-2024-23031,0,0,50a01a02c17debf717506fceb27518dcc1b40bb12f5847f406f4c7143af31def,2024-02-02T16:15:45.433000
@ -243490,7 +243490,7 @@ CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412
CVE-2024-23222,0,0,dbdfbb94ef7853af981ed6ff730267427ee1f33c1e3020606b19021bcf93c66d,2024-05-16T01:00:02.200000
CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000
CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000
CVE-2024-23225,0,1,60201724dacc7ab21bc37a6fc0b753b2d2e5d48cf78ebf0e87c3f73e3c2960cc,2024-05-23T17:57:40.620000
CVE-2024-23225,0,0,60201724dacc7ab21bc37a6fc0b753b2d2e5d48cf78ebf0e87c3f73e3c2960cc,2024-05-23T17:57:40.620000
CVE-2024-23226,0,0,1b82b4673b34cfde627eee1f5d6fa409ed57aa961d24a2b22edaff38026e1585,2024-03-13T23:15:46.243000
CVE-2024-23227,0,0,04e1ce79d1fe22c4b70141c1091acf9b225e65a49459c2665f7c7f4c8cca9f1e,2024-03-13T23:15:46.290000
CVE-2024-23228,0,0,f80e6c54b4fcb5b0b07c9156372fa6d875a1f0a4205b9f716b0f8a8654d4aff2,2024-04-24T17:16:50.397000
@ -243563,7 +243563,7 @@ CVE-2024-23292,0,0,1902f1a71fb665c00536465cef16656fbb94decd356fb8bbbf59c91ea3da5
CVE-2024-23293,0,0,3586a96339f859c33a0ba7c3a1765492ff6970f8b37d549d40edcdf59b329d60,2024-03-13T22:15:11.390000
CVE-2024-23294,0,0,c0cdcedc3bcfe664ab02fca520276a0c72a6eafb77125bfc3a4566d618829e43,2024-03-13T21:15:58.733000
CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d3b5,2024-03-13T23:15:47.630000
CVE-2024-23296,0,1,e4ed0f21c8ab9f5909d56fb8eb4c04bc36ae99f731dfe9d7d35a0f881b56627c,2024-05-23T17:57:26.870000
CVE-2024-23296,0,0,e4ed0f21c8ab9f5909d56fb8eb4c04bc36ae99f731dfe9d7d35a0f881b56627c,2024-05-23T17:57:26.870000
CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000
CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000
CVE-2024-2330,0,0,89039a53a73072e3c8dbbafcac630d622765f67693433d6946597b6c23ca98bb,2024-05-17T02:38:10.540000
@ -245824,13 +245824,13 @@ CVE-2024-26925,0,0,3e0df7ca369bcd903549430fe02ebe9b39bccde1336ed5f518c1ebc22ada4
CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
CVE-2024-26927,0,0,84d28aa2d82d7b353955d491991b07be5f1f5eedde26b528784c0de359b7829c,2024-04-29T12:42:03.667000
CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554d2d,2024-04-29T12:42:03.667000
CVE-2024-26929,0,0,82b8246e5aa18e93cb12e9c7701cba04fa92e4067e46f7cd6d3a83f9136fe6f7,2024-05-01T13:02:20.750000
CVE-2024-26929,0,1,bbb851a79a93a363e352bb5d96ddf71c38e37b9f175f55319aa1039600b887ab,2024-05-23T19:07:27.803000
CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000
CVE-2024-26930,0,0,769c2222bbd927e228ddaa8af679989d2c3edf48a0802fb73ac130c18b35f65f,2024-05-01T13:02:20.750000
CVE-2024-26930,0,1,3885fe1fa73799da895810b44f93f3951c708b35b460f991f25484a478614d7a,2024-05-23T19:10:49.540000
CVE-2024-26931,0,0,b50b6946217c07805b8a71c9d8bfc46f94338f6900470114c48a41318bdc148e,2024-05-01T13:02:20.750000
CVE-2024-26932,0,0,801165a8b51bf8428beb57f9200d92bf418f388db57d0009e84bef8f2f88a6c6,2024-05-01T13:02:20.750000
CVE-2024-26933,0,0,e6ef33bdd396b7f48076f91ddfb93ccbcb4d2ce58a6d789f480a396fdfb98873,2024-05-01T13:02:20.750000
CVE-2024-26934,0,0,45f8ccdcbbda45386fdb76897c2baa198b3dfafcf193890242e0b71150332226,2024-05-01T13:02:20.750000
CVE-2024-26932,0,1,f2d026e35f4b5233187abee7e42482ca04237021bc627080ec5bc9b0491b80e1,2024-05-23T19:12:39.257000
CVE-2024-26933,0,1,74ecb5d6388685ffacbea1351beb1f6d860ac3447041ba550ec0df60bf844fa0,2024-05-23T19:12:43.773000
CVE-2024-26934,0,1,31e6c4033127ecf5b40e2619c4b2fe58c295c7666b6f1bd612d3609b70be6366,2024-05-23T19:13:43.970000
CVE-2024-26935,0,0,a9c0e2abd03fa3d8de13e2349e28616c172d5e3135b028177bbdd2eefe05a6a7,2024-05-01T13:02:20.750000
CVE-2024-26936,0,0,ac3611a024cce1dc29fc377a7f2aca0292c14e6592911fdbd080f60f2117c044,2024-05-17T11:15:08.257000
CVE-2024-26937,0,0,36b677f52afa0378e54cd008f023ce299f437d5a5d13d3654c2238611aeddc13,2024-05-01T13:02:20.750000
@ -245838,17 +245838,17 @@ CVE-2024-26938,0,0,321e927ef910319074b978288ce15e9ebcbbcafa9b2849cd294ce5472307a
CVE-2024-26939,0,0,85eb64cbd7ee938c6394d3981a444b673e98017b7758d5c581c06bdedc9d8308,2024-05-01T13:02:20.750000
CVE-2024-26940,0,0,0f7b60c7074169eef5b0805dc07f3f012de89cf52283f43c6fb864cb8061acc6,2024-05-01T13:02:20.750000
CVE-2024-26941,0,0,d5edb0519d12495e38c26375af70fb76a969a5da638017008bfea75e4a0468ef,2024-05-01T13:02:20.750000
CVE-2024-26942,0,0,24d277bd9a7de43849c13bd666eb8df298a2eb09457c924323effe733283c30d,2024-05-01T13:02:20.750000
CVE-2024-26942,0,1,c074e6f277587fe537ac2b909f91dc78abb860cb08d8b6da3f762950bc1732e5,2024-05-23T19:13:50.467000
CVE-2024-26943,0,0,28c15f250470f99abb4044cea0ff718e86e66a59267e92211de026301eb61abf,2024-05-01T13:02:20.750000
CVE-2024-26944,0,0,95cb3bf01235c272219e76e8386a7bba4aabd1011dab496d9c06632c2a39819d,2024-05-01T13:02:20.750000
CVE-2024-26945,0,0,71f3a344617dd79a1f3cddce27c3109f39a6428bfc6d71dfba56b0575d04c141,2024-05-01T13:02:20.750000
CVE-2024-26946,0,0,03955d0f2bc318bb8984ca0ab6d4535e3edab8a455147eb89f589c2cd541c436,2024-05-01T13:02:20.750000
CVE-2024-26947,0,0,9675f42687fbcf2f6cc20529b1558a892788f21cf57028b5f39f7df35aa2717e,2024-05-13T08:15:10.313000
CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643df1,2024-05-01T13:02:20.750000
CVE-2024-26949,0,0,27d5fec1f4fb4c8e209be613fac63308e7b5332a698fcfd930b9a4593848b249,2024-05-01T13:02:20.750000
CVE-2024-26949,0,1,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3f8c,2024-05-23T19:13:56.890000
CVE-2024-26950,0,0,8a29b231f495865acff77b1b51be2dd640990aa84617667fdf843369759a9352,2024-05-01T13:02:20.750000
CVE-2024-26951,0,0,66c5bd7c9276a41301f8c77e377af720392726a767d5d35afa945139b0225875,2024-05-01T13:02:20.750000
CVE-2024-26952,0,0,6bcd9786294cf2191afe5ee285a64a28540f8ebab83fffd50af327b1af698015,2024-05-01T13:02:20.750000
CVE-2024-26952,0,1,32734f4565aee2dd8cb7fb62ec448945bd1b887fa26309c982717007450ca20c,2024-05-23T19:14:05.133000
CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000
CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000
CVE-2024-26955,0,0,193de4cb2f5cc3de46a39ac33254bf215f8ca416fe0c9caf2ed526032a4a7a8a,2024-05-01T13:02:20.750000
@ -245875,16 +245875,16 @@ CVE-2024-26974,0,0,2b8d57d755d981d1f69d0403a724548f9cb05122067aebdd3c7bdd585f219
CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d0ec,2024-05-01T13:02:20.750000
CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69b1f,2024-05-01T13:02:20.750000
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
CVE-2024-26978,0,0,5172cc85cece67dcf9c674206b1d787aa5f16a296b6c0e5a89a82549de8ab630,2024-05-01T13:02:20.750000
CVE-2024-26979,0,0,71ac697cdce0d8256ad73695d7bb5e579fe9a4574299812ac2744eb0e8205095,2024-05-01T13:02:20.750000
CVE-2024-26978,0,1,8d561a460191ee18f3c0a08c6e5356905628e7e52b101255033d5d975d400ae1,2024-05-23T19:14:12.637000
CVE-2024-26979,0,1,8b43b56d6e8afb93c65be5c5090f4a2ff2e19b842ecb60f8c0d45c442782c34d,2024-05-23T19:14:15.993000
CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
CVE-2024-26983,0,0,d3d7f9f5caf4e079a71f70f8bc14c3d32922ad02f616d250213454d5ce4002ce,2024-05-13T08:15:10.750000
CVE-2024-26984,0,0,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000
CVE-2024-26985,0,0,7a740fe69951ccfc3b1e74b7db3fbfca448128a35ad090b49ba3486012aceb7d,2024-05-13T08:15:10.823000
CVE-2024-26986,0,0,4354ffaf968f8d28b331ff9b429a0a3baa9d1d5b6fc48569e9db713d1a0b7bb9,2024-05-13T08:15:10.867000
CVE-2024-26987,0,0,40363c175c3443ac41fc956b92e55b9ca73907d82bc5c27b87285d3bf49629fd,2024-05-13T08:15:10.940000
CVE-2024-26986,0,1,3a04da6776d5b30be98a9a3456a9602e44e9b692af32172ae4d107260563fc81,2024-05-23T19:14:25.180000
CVE-2024-26987,0,1,8c26013d98bcf2e4e743c73d724873f3f29d66506454e1cf0da9933616dab821,2024-05-23T19:15:23.693000
CVE-2024-26988,0,0,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000
CVE-2024-26989,0,0,d9a342892ddbaf318c01532935f9e563e8650474956ddaee4113e50ced053bb2,2024-05-13T08:15:11.017000
CVE-2024-26990,0,0,cc83824df94cee6dd88244ef9564f0ad4caad22efc4fa52be18a57f4fd0bb8ab,2024-05-13T08:15:11.083000
@ -245910,18 +245910,18 @@ CVE-2024-27008,0,0,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b1804
CVE-2024-27009,0,0,02166e6bb27bb1993eb76c46e36c36e549073075e0d4d18f7774ce41a7b2deb0,2024-05-13T08:15:11.870000
CVE-2024-27010,0,0,2c5d1e794d485d405ee68187fd0d8f4a18187ff3b81973fdf2d28d4503c757d5,2024-05-13T08:15:11.933000
CVE-2024-27011,0,0,d243ba33b7ac681a4bbc14151edb94ad3657e98bb70afc35d69edac5ca657ed6,2024-05-13T08:15:11.983000
CVE-2024-27012,0,0,22512e28678da0a0edcea7a5d83e0c904d614a2c42d9871534608a369d42c683,2024-05-13T08:15:12.130000
CVE-2024-27013,0,0,b6a016435ccc0e27aaec1bcae522f08e68bbeebf64f7e566855dbef8d3a742ed,2024-05-03T06:15:13.277000
CVE-2024-27014,0,0,ccadbed70b347ca250a77bcfe1a136f9ae25ed6a0706488b2929c7fee5f29780,2024-05-13T08:15:12.223000
CVE-2024-27015,0,0,a35d236dac18e1afe18fbe7421bfa7a7991724db9501b6e6cbba6bfab898d0da,2024-05-13T08:15:12.333000
CVE-2024-27016,0,0,937c77db9657b9f448d4e03e8f72f9f05b5c248521538165ec33d57d3b16c090,2024-05-13T08:15:12.407000
CVE-2024-27017,0,0,0481a94e9043b5d8d3638bf873940afeca1ad3d66f40dfa698210566a87c6924,2024-05-13T08:15:12.473000
CVE-2024-27018,0,0,32e60545a41f9d7918550291e2ad380dac9584fa0eff3f52559e3910e7c79d7a,2024-05-13T08:15:12.537000
CVE-2024-27019,0,0,5d39d7d4857d1c6a2205765a7de8e93d31a7ea0bf3abc6ed0d18cdc77a7e15df,2024-05-13T08:15:12.610000
CVE-2024-27012,0,1,03b5c0d4d54555019c56c0882fdfc247c2e63140628d08e2ca4233bf1d0f3421,2024-05-23T19:15:29.050000
CVE-2024-27013,0,1,8df360ef1b02c3b46e487c2c252dcc98abb7299a51f6139af16ee30bba710b14,2024-05-23T19:15:39.063000
CVE-2024-27014,0,1,ce6b048da995e7d2e7b663a0bef4ae1e17ac6245997749e208d61bdcc3e09451,2024-05-23T19:15:45.993000
CVE-2024-27015,0,1,d298fda03fa9d24f754e9c1e7f74d5e3b34013df4efd47cdeb20f10a0b74b8ed,2024-05-23T19:15:51.047000
CVE-2024-27016,0,1,43697573ba40114bbff54175e410bfa036ad44417bbdc5134ab7087857a788b9,2024-05-23T19:33:33.040000
CVE-2024-27017,0,1,02732f54ff398442b7b4153676da0571ded79cca4c5f8df61e836f73cc067548,2024-05-23T19:36:40.587000
CVE-2024-27018,0,1,911c480dab0dbe0bfae3e2c56e2a488f444057793b7d9a6c0055e9746b6c8f21,2024-05-23T19:36:55.347000
CVE-2024-27019,0,1,36d82b81bc1d9d38d2682f844cba8493b3da054eb76c892bf5af4e5f6007f1fa,2024-05-23T19:36:50.157000
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
CVE-2024-27020,0,0,7ed737d13078748993bcd53f11f5595135ca4d8e321696990da35064932b78f9,2024-05-03T06:15:13.507000
CVE-2024-27021,0,0,8f47af856ea39f396fcb55935534a6ca1320f9bfdba5c600080e03890f5a4c36,2024-05-13T08:15:12.697000
CVE-2024-27022,0,0,a2329380e6204b86ee78f297ed101cc1a26111d29fc6127d1b62e11f64a9ea84,2024-05-03T06:15:13.697000
CVE-2024-27020,0,1,3f90653ffb98b0626657ed9434d14c1afb296510e8b1df410ca4178694ec8c53,2024-05-23T19:36:59.113000
CVE-2024-27021,0,1,a67efe759afa1d6ea088b8eaf4c7f5fbf8a2904d502e3532052bf321b9abffde,2024-05-23T19:37:02.563000
CVE-2024-27022,0,1,1b987a98b479172f1b2060d097d5a719152153d1b4388173e48cf6a8a0646b38,2024-05-23T19:37:12.607000
CVE-2024-27023,0,0,2c6de381c797e914bd2f2619ad1c4bedc5c20ae4269741b6694f80abe98917fc,2024-05-01T19:50:25.633000
CVE-2024-27024,0,0,2be5113ff6a566cf20f76601008fb7917bbdee45421f3244be93e84668df42a1,2024-05-01T19:50:25.633000
CVE-2024-27025,0,0,8034ac678d55d95e7f07d8764f5d5f10ca86d45c4ca578e11369f9f4a5c0b08c,2024-05-01T19:50:25.633000
@ -246047,7 +246047,7 @@ CVE-2024-27194,0,0,a11a5cd36110200c4194e0d9b50be85370b49ca78e4fe7835c39d94264306
CVE-2024-27195,0,0,15dbf012ca4549cdb7891efba874d75eb5f2646231444d38397e7b2ec1303fe9,2024-03-17T22:38:29.433000
CVE-2024-27196,0,0,c27db62b029efb9848cb20010330301870f945ec80731625b7338dd4b475d3d4,2024-03-15T16:26:49.320000
CVE-2024-27197,0,0,446f420f3582234bca63fa986c45b28babdb846c848604893bccdfeecbf06bbd,2024-03-17T22:38:29.433000
CVE-2024-27198,0,1,d9c6990c8c37192a62f10f61f944289b0a7a9fc634c7e99604fa99c193060df6,2024-05-23T17:57:49.653000
CVE-2024-27198,0,0,d9c6990c8c37192a62f10f61f944289b0a7a9fc634c7e99604fa99c193060df6,2024-05-23T17:57:49.653000
CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000
CVE-2024-2720,0,0,0c109ceba4c985a5e423faa81e13325bccf09b8cab75e896be42038212b9c736,2024-05-17T02:38:27.590000
CVE-2024-27201,0,0,10d33bde6c72f02eeeb78886fe63b84ea9f8986232310509561963bb62431c7f,2024-04-03T17:24:18.150000
@ -247038,8 +247038,8 @@ CVE-2024-2897,0,0,83ffd6252b79b2ee12910354dcd6602ed10e81fca82464ce07fb47ed5e0829
CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000
CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000
CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37f95,2024-04-24T13:39:42.883000
CVE-2024-28978,0,0,50111c365e099445c7c09900d8d56f0a0b9ab19ba3537906af5cbb5605baacfa,2024-05-01T13:02:20.750000
CVE-2024-28979,0,0,a6ddd4aec5743fbd91a59a0fe39fe91b4d38aa1c5c2023bce8dca8281e8b58b6,2024-05-01T13:02:20.750000
CVE-2024-28978,0,1,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f4cf,2024-05-23T19:05:13.353000
CVE-2024-28979,0,1,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000
CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000
CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000
CVE-2024-2900,0,0,a407b1858236d84c8f3b34f7314a68104abd6fc43c858c1e78b5ff160bd6a726,2024-05-17T02:38:36.333000
@ -247697,7 +247697,7 @@ CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39f
CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000
CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000
CVE-2024-30189,0,0,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000
CVE-2024-3019,0,1,e1718a4807d161128dd5f01e220ab76187eb165f2236b4efc423d8c941cfbe72,2024-05-23T17:15:31.220000
CVE-2024-3019,0,0,e1718a4807d161128dd5f01e220ab76187eb165f2236b4efc423d8c941cfbe72,2024-05-23T17:15:31.220000
CVE-2024-30190,0,0,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000
CVE-2024-30191,0,0,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000
CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000
@ -248662,6 +248662,7 @@ CVE-2024-31837,0,0,9051d48b22c0cd39a45116204b9c51e9a92d936bee66589e1aa86bb8c892b
CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000
CVE-2024-31840,0,0,5fb4754e93087489c313385a760b7b7f7b84611fdf30d003ac432087f6238482,2024-05-21T16:53:56.550000
CVE-2024-31841,0,0,e807a83ca93985dc842f15dd9311ce37f6ae1c5acd5a2d45df542202c187b560,2024-04-19T16:19:49.043000
CVE-2024-31843,1,1,89d9a9920e76a29b7c506ddb753ec3e33dab82bea13e811f48de5368ff9b0af8,2024-05-23T19:16:01.210000
CVE-2024-31844,0,0,e64a300d29b04c02e9c6f5717f9c03ceb4ceea6f6de4e98172eec5b7ba38512d,2024-05-21T16:53:56.550000
CVE-2024-31845,0,0,2df6735a617179bf821cd3a5a77bf489d3c8c892ede0862f25b0ae04ad63e2ab,2024-05-21T16:53:56.550000
CVE-2024-31846,0,0,ec1f3478d8b62b2fb094bc9ce16da74fa6c5e7add097c8b7f5b857bd703bef58,2024-04-19T16:19:49.043000
@ -249244,7 +249245,7 @@ CVE-2024-32716,0,0,ef35512837a2eb385a00af812a4bd8ccb8fac7830ef81ad43aacfa3308965
CVE-2024-32717,0,0,41fbfea18ca587f0b377a8ff08e3cedda799120e644b260bc7c5bf7bd95a593f,2024-05-14T16:12:23.490000
CVE-2024-32718,0,0,ac6094c004934613811f62cb54322c782e73ecaf784adcb8253ff40feadd2cda,2024-04-24T13:39:42.883000
CVE-2024-32719,0,0,fa54a00fe4b9fe58183d766212997764a9c038961ca46d2f53a199db06b68dd7,2024-05-14T16:12:23.490000
CVE-2024-3272,0,0,53315e6ff0949a2288d2932fc520586215357ee9bd09d7b6961de364b4add901,2024-05-17T02:39:49.447000
CVE-2024-3272,0,1,57ebb2b4c2db43c137f54ced3904182f1496f54a27deff0a2046277261d4d69d,2024-05-23T18:11:31.443000
CVE-2024-32720,0,0,1f2a21f1849072b1441d7930519901f42fecfdda829aa015d5489df39c5103b0,2024-05-17T18:35:35.070000
CVE-2024-32721,0,0,a2233fe9c4251c9373094548c77926df84a412b40d9b22eb54dd2e4b2b2e5a97,2024-04-24T13:39:42.883000
CVE-2024-32722,0,0,48ae26859b2b5b55014d7a0adb8477f1ef5dfb94d230cd27ad810ef0567e4392,2024-04-24T13:39:42.883000
@ -249252,7 +249253,7 @@ CVE-2024-32723,0,0,9cf77ce32aed9923f5362ddd9820f0128e11fb90d86d1e685c774c7fb3a6e
CVE-2024-32724,0,0,724d2a8f26930c920800979f44338a45ea9974ec444b7589426e70fcd89b821f,2024-05-14T16:12:23.490000
CVE-2024-32726,0,0,bb601a310def86682bd269dff87c17e9f340507b2044b21ebddf2d3bcecfbeae,2024-04-24T13:39:42.883000
CVE-2024-32728,0,0,bd2bab844630decb87bf708aa2ff96890fbec18a578a77e7147769c3b0f70bae,2024-04-24T17:16:50.397000
CVE-2024-3273,0,0,6016af365bcbfeb67233d8fe41b00b9ab269ace0083a01fdcbe5db768950934f,2024-05-17T02:39:49.583000
CVE-2024-3273,0,1,4186ca3d9d4d9abaa8c5ff8b339ab3ddc0d0d7a4580a55f48ceb768f2254d32e,2024-05-23T18:10:57.883000
CVE-2024-32730,0,0,1b540a6978216af51f74ca4011575d9f341f3a8ea462d26115f28861c4f0864f,2024-05-14T16:12:23.490000
CVE-2024-32731,0,0,38a3ff1f8bbd6df03536e2535563547564f97d47962816c584496adf13c47a39,2024-05-14T19:17:55.627000
CVE-2024-32733,0,0,cc2a83bf0b8d4e35cad819b5164d2b12cff00a586034fce34f072bdde6c85904,2024-05-14T19:17:55.627000
@ -249570,11 +249571,11 @@ CVE-2024-33517,0,0,4499de4ebe1f423e3234cee0e8f8c16d3a4ed4c1336ceb4afb74bc9302601
CVE-2024-33518,0,0,a108170f2e1680b2f8dbc295b01f7ca4d562d69a81654ec6ce930349bde31438,2024-05-01T19:50:25.633000
CVE-2024-3352,0,0,8d8116cce81ffc02b3d2f59517baad98542659fb6068576e268a365bf929b959,2024-05-17T02:39:51.777000
CVE-2024-33522,0,0,698c28a35bc69cffbbdcc528451b780b5020339e6e061f4789570701ef9577a2,2024-04-30T13:11:16.690000
CVE-2024-33525,0,1,b6d079a03697f91dcdb6de513c15709a33ae65e4b13b01969f901eb91157f34e,2024-05-23T17:15:28.933000
CVE-2024-33526,0,1,1bf86d2025468f58f3259fa37536f4b45c8320ff99e9665e583ba93873ee7943,2024-05-23T17:15:29.020000
CVE-2024-33527,0,1,3aa4268b04e818d68b9981964d63adc6e021a5caa6806fc76a3e6e04e4e0d782,2024-05-23T17:15:29.103000
CVE-2024-33528,0,1,c64e3b1ff77d3562f26644714e92a8b6968829150e1cbafbe65986600efc0f6e,2024-05-23T17:15:29.213000
CVE-2024-33529,0,1,1fbb4de274d5f20f9e85daa4abc72f288ff6653bbae56bc9839381acf6b5a67b,2024-05-23T17:15:29.293000
CVE-2024-33525,0,0,b6d079a03697f91dcdb6de513c15709a33ae65e4b13b01969f901eb91157f34e,2024-05-23T17:15:28.933000
CVE-2024-33526,0,0,1bf86d2025468f58f3259fa37536f4b45c8320ff99e9665e583ba93873ee7943,2024-05-23T17:15:29.020000
CVE-2024-33527,0,0,3aa4268b04e818d68b9981964d63adc6e021a5caa6806fc76a3e6e04e4e0d782,2024-05-23T17:15:29.103000
CVE-2024-33528,0,0,c64e3b1ff77d3562f26644714e92a8b6968829150e1cbafbe65986600efc0f6e,2024-05-23T17:15:29.213000
CVE-2024-33529,0,0,1fbb4de274d5f20f9e85daa4abc72f288ff6653bbae56bc9839381acf6b5a67b,2024-05-23T17:15:29.293000
CVE-2024-3353,0,0,2ddbc6535b793a0147a58343572c1b0e378c4cc25bcc9f8dccfa91f1a8c7260c,2024-05-17T02:39:51.867000
CVE-2024-33530,0,0,751595441bab8b069ccfb432ce06432dd472d8d3dc9bf6ea51c901f83966c0c7,2024-05-02T18:00:37.360000
CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000
@ -250219,17 +250220,17 @@ CVE-2024-34913,0,0,cd99fcd1c9a447c22a0c8c6d2fe09f57f41c6bae75d10850bf762035ab33c
CVE-2024-34914,0,0,70a7c11501909b39ef53f8b81e0474e671bd02725d09e7751be6f86dc2b4f270,2024-05-14T19:17:55.627000
CVE-2024-34919,0,0,3b58bcaada9443a615b9da4a712e7a9b2cf49d93cbec4e97e3462cce15a1e03d,2024-05-17T18:35:35.070000
CVE-2024-34921,0,0,dbf53dbc9b81b9221c12f4c1ada0297cc361fc3675871ab0069ddf8fe9b53895,2024-05-14T16:12:23.490000
CVE-2024-34927,1,1,1f73fcec98d868e3b4ec6212e2a49afef696472cc1d70bc53eb6278a37535166,2024-05-23T17:15:29.373000
CVE-2024-34928,1,1,74d188c1c24f41933a4cf326837e200dc1bc4390f0623d554a196178720984d5,2024-05-23T17:15:29.460000
CVE-2024-34929,1,1,eabe5d1515c1643b8a9765354c46901a04f43283ffa4d12d4b9e867db785c280,2024-05-23T17:15:29.550000
CVE-2024-34927,0,0,1f73fcec98d868e3b4ec6212e2a49afef696472cc1d70bc53eb6278a37535166,2024-05-23T17:15:29.373000
CVE-2024-34928,0,0,74d188c1c24f41933a4cf326837e200dc1bc4390f0623d554a196178720984d5,2024-05-23T17:15:29.460000
CVE-2024-34929,0,0,eabe5d1515c1643b8a9765354c46901a04f43283ffa4d12d4b9e867db785c280,2024-05-23T17:15:29.550000
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
CVE-2024-34930,1,1,581ff31ad2096c67d1f81ea9759ec427e034305a9a27620078871af69c72f028,2024-05-23T17:15:29.830000
CVE-2024-34931,1,1,3b7c0523eface114a2b8262581279389a15442432e69a75874d510363ad6db3a,2024-05-23T17:15:29.930000
CVE-2024-34932,1,1,2c761a0b9e09f9f536bb4ff3a1be1f509c48af235c6b853a6578587b277a04fa,2024-05-23T17:15:30.017000
CVE-2024-34933,1,1,6daea6a9bfe58e1d9e98925e2a62945862a8411ce963bc89c5df2febc7f44bdf,2024-05-23T17:15:30.107000
CVE-2024-34934,1,1,708876571edb305cf5a50060bfe47ff50e52945e8e30421b66e381951eee4780,2024-05-23T17:15:30.197000
CVE-2024-34935,1,1,8e2885a02332d7adcdf6cb09d1e17e18c6f7ecc964ee4ed05f5a751cf60d318d,2024-05-23T17:15:30.280000
CVE-2024-34936,1,1,7cfa69906e94ce9ae254cda258c2c9c85c17aeea8bf04b6ec35d63e67f3d18e2,2024-05-23T17:15:30.363000
CVE-2024-34930,0,0,581ff31ad2096c67d1f81ea9759ec427e034305a9a27620078871af69c72f028,2024-05-23T17:15:29.830000
CVE-2024-34931,0,0,3b7c0523eface114a2b8262581279389a15442432e69a75874d510363ad6db3a,2024-05-23T17:15:29.930000
CVE-2024-34932,0,0,2c761a0b9e09f9f536bb4ff3a1be1f509c48af235c6b853a6578587b277a04fa,2024-05-23T17:15:30.017000
CVE-2024-34933,0,0,6daea6a9bfe58e1d9e98925e2a62945862a8411ce963bc89c5df2febc7f44bdf,2024-05-23T17:15:30.107000
CVE-2024-34934,0,0,708876571edb305cf5a50060bfe47ff50e52945e8e30421b66e381951eee4780,2024-05-23T17:15:30.197000
CVE-2024-34935,0,0,8e2885a02332d7adcdf6cb09d1e17e18c6f7ecc964ee4ed05f5a751cf60d318d,2024-05-23T17:15:30.280000
CVE-2024-34936,0,0,7cfa69906e94ce9ae254cda258c2c9c85c17aeea8bf04b6ec35d63e67f3d18e2,2024-05-23T17:15:30.363000
CVE-2024-3494,0,0,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000
CVE-2024-34942,0,0,e059946476e6ed6f7700787b6d293319c3917f84cc21df39845c2415b202e398,2024-05-14T16:12:23.490000
CVE-2024-34943,0,0,44d98cd58aa649e622669b5d139eb3c721c497a3ed9e2f38cf0a924b84b63888,2024-05-14T16:12:23.490000
@ -250269,15 +250270,17 @@ CVE-2024-35059,0,0,bd64074b0906c1c54ef17d2e14ef72d6e07f1a69861632fbcb25eee708531
CVE-2024-35060,0,0,62446a6780b8c8e1187040238ecfc349f6eb1b933015bf43bbb359906b5391dc,2024-05-22T12:46:53.887000
CVE-2024-35061,0,0,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000
CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000
CVE-2024-35079,1,1,03a94d2c1e46219fdab3775001cd317496076a5b438d25b07d1b55cbc78728d7,2024-05-23T19:16:01.357000
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
CVE-2024-35081,1,1,a005f09143becb9a4b5cf08e87bdb362a10deb42e63050d6ba3c07fa8733e120,2024-05-23T17:15:30.457000
CVE-2024-35082,1,1,e25143d45d030822e5055242c65d8c4eee292418827818ce4b8351957da7b03e,2024-05-23T17:15:30.547000
CVE-2024-35083,1,1,3591f79b67cd5d02b1c5e56bec7434cdcdc069674121931ded121cf27fdff10c,2024-05-23T17:15:30.637000
CVE-2024-35084,1,1,78e6dca7d8f67d8a02483874ea6b5111ba0d1bb786f4e97701dc150c40cf3956,2024-05-23T17:15:30.733000
CVE-2024-35085,1,1,57da6b9a0b1da06fc3715274ec6276760f67ca625ae8ee70a2c92a05faf4f2ca,2024-05-23T17:15:30.820000
CVE-2024-35086,1,1,510dc95d19c6dad1fd66543c9c54c0872a89fb9bcd8241047c4b6089c8057438,2024-05-23T17:15:30.943000
CVE-2024-35090,1,1,a383100ee2c44becf7378cfb7f3457cfc550ccfbf7c7ddddc12546e067ba4334,2024-05-23T17:15:31.033000
CVE-2024-35091,1,1,4afebceacc9513c525b1ad938c96bc91deb4c3842a0d8e32508a53da65af36c3,2024-05-23T17:15:31.127000
CVE-2024-35080,1,1,3e4fc92de578c0ab7f3efdf71f0bb045543e565b2e009a5bc1ba03443d80277e,2024-05-23T19:16:01.470000
CVE-2024-35081,0,0,a005f09143becb9a4b5cf08e87bdb362a10deb42e63050d6ba3c07fa8733e120,2024-05-23T17:15:30.457000
CVE-2024-35082,0,0,e25143d45d030822e5055242c65d8c4eee292418827818ce4b8351957da7b03e,2024-05-23T17:15:30.547000
CVE-2024-35083,0,0,3591f79b67cd5d02b1c5e56bec7434cdcdc069674121931ded121cf27fdff10c,2024-05-23T17:15:30.637000
CVE-2024-35084,0,0,78e6dca7d8f67d8a02483874ea6b5111ba0d1bb786f4e97701dc150c40cf3956,2024-05-23T17:15:30.733000
CVE-2024-35085,0,0,57da6b9a0b1da06fc3715274ec6276760f67ca625ae8ee70a2c92a05faf4f2ca,2024-05-23T17:15:30.820000
CVE-2024-35086,0,0,510dc95d19c6dad1fd66543c9c54c0872a89fb9bcd8241047c4b6089c8057438,2024-05-23T17:15:30.943000
CVE-2024-35090,0,0,a383100ee2c44becf7378cfb7f3457cfc550ccfbf7c7ddddc12546e067ba4334,2024-05-23T17:15:31.033000
CVE-2024-35091,0,0,4afebceacc9513c525b1ad938c96bc91deb4c3842a0d8e32508a53da65af36c3,2024-05-23T17:15:31.127000
CVE-2024-35099,0,0,8c0b69879ab1111cf063e500789278f969d059f38759acadb58167d526b5b96f,2024-05-14T16:11:39.510000
CVE-2024-35102,0,0,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31a06,2024-05-16T13:03:05.353000
CVE-2024-35108,0,0,3d160490977cee5bde1d3bbae750736ca9206a5392ad0c8f4f20b1d705d7e1b9,2024-05-15T16:40:19.330000
@ -250347,6 +250350,7 @@ CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8
CVE-2024-35361,0,0,981fcbfd9f4303bd43de5df85c3e320402b0db2b2b55c36fbcead39aa2c6a55b,2024-05-21T16:54:35.880000
CVE-2024-35362,0,0,bc6cc73ae2c385c72fa8e171de6f5e48fe251acb5a307d4b68c4eadfbc25ba42,2024-05-22T18:59:20.240000
CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000
CVE-2024-35375,1,1,9c2fd3d108ffab1fabb75b6576f1424f8ca4c36dab42964d4a37932faa5bdc97,2024-05-23T19:16:01.627000
CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000
CVE-2024-35384,0,0,d21dcb965b72196df94f0bb7eb7aa18a6c33135d9d1348ad106df5e9cb4ecf63,2024-05-21T16:54:26.047000
CVE-2024-35385,0,0,21597def780ca6884558067b51483acdca600d8be33898c67abdcdef1ba103a9,2024-05-21T16:54:26.047000
@ -250380,6 +250384,7 @@ CVE-2024-35559,0,0,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd5184
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000
CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000
CVE-2024-35570,1,1,b4a35d0a44d663885ce3a5fa386586afd8caf23ec535752fc61273fecf449fb6,2024-05-23T19:16:01.747000
CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c3932d,2024-05-20T19:34:58.277000
@ -251149,7 +251154,7 @@ CVE-2024-4357,0,0,15f39a23a70c5acc3d08c2f81b16ef69b06f28ee37422807405e1ad5464110
CVE-2024-4361,0,0,73ddfe2adce7d05432def4f47addf8f84eda9a30fdc3baa140fd6866bc8a2a94,2024-05-21T12:37:59.687000
CVE-2024-4362,0,0,7f41e0c07e69c05f76665c888ba128e44dae52656bfc3d33cd11b51b4c09f3e6,2024-05-22T12:46:53.887000
CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000
CVE-2024-4365,1,1,f739547fde8c034a3e23399a7eba97ac98b5e5b02551c2916213ee97a3d0e452,2024-05-23T17:15:31.370000
CVE-2024-4365,0,0,f739547fde8c034a3e23399a7eba97ac98b5e5b02551c2916213ee97a3d0e452,2024-05-23T17:15:31.370000
CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
@ -251264,7 +251269,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176
CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000
CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000
CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000
CVE-2024-4563,0,1,72fe5c7a22672098d9e43518c79a1e9152e7fdebf8f626972ebe81254147fb0c,2024-05-23T16:15:08.867000
CVE-2024-4563,0,0,72fe5c7a22672098d9e43518c79a1e9152e7fdebf8f626972ebe81254147fb0c,2024-05-23T16:15:08.867000
CVE-2024-4566,0,0,56d6dff8001ced0ac379df1540d8c705e1cb0415cd6a569faf0604bdd4ed8dc7,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
@ -251488,7 +251493,7 @@ CVE-2024-4933,0,0,7b2f7569ee693877ba391d27e3452d47316b559fbbc3e96bc86c11c7c9d326
CVE-2024-4943,0,0,171d862a6bb9828bb93ea4e83954a15cb7aaeebe9a1644e4f909bfeff0bac21a,2024-05-21T12:37:59.687000
CVE-2024-4945,0,0,e0a5ba7966643efb73fd914f70b4524cd2866097ad449d2a2165f63e6d16c777,2024-05-17T02:40:43.560000
CVE-2024-4946,0,0,2baf4f00c5706f17b6e0e44a9760a1e19206d19f91f4169e19252f73fcb559cc,2024-05-17T02:40:43.650000
CVE-2024-4947,0,0,abe6c5164eb2f1501e6c3e03d76656a795e315e76bfdc35a57865ea34dbe6992,2024-05-23T15:19:22.543000
CVE-2024-4947,0,1,788ea4f6b7d540c9e54006dcd9ef87bbae00b6bf34b14544e4575dad99473a37,2024-05-23T19:54:02.490000
CVE-2024-4948,0,0,2b5345a3a2ad0f0e256c8a9888ed4459968962a0ab1b7459292f31a2fc3a82d1,2024-05-16T13:03:05.353000
CVE-2024-4949,0,0,259df003248cd164c42bd8e14c2329886e112004798407d6615ac49c44fb7c83,2024-05-16T13:03:05.353000
CVE-2024-4950,0,0,ee7f090411e231f963c331a4d42c01705715794d425732d14831f9be8aa12a99,2024-05-16T13:03:05.353000
@ -251579,7 +251584,7 @@ CVE-2024-5134,0,0,44a789f42f5a3c13ba63d82e5081c6abc6a3d25c1481cb7c53cfc6c6e78700
CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b446,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
CVE-2024-5143,1,1,ccf4ee8b89aaca80691c8d7d0945f1e3856788e1749e458bd61ffbe246285005,2024-05-23T17:15:31.560000
CVE-2024-5143,0,0,ccf4ee8b89aaca80691c8d7d0945f1e3856788e1749e458bd61ffbe246285005,2024-05-23T17:15:31.560000
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000
CVE-2024-5157,0,0,c51a9f5f8f4c7b7f699f53e1f0267c61dca7dd3a3eb507f57f12d9966dbb6911,2024-05-22T18:59:20.240000

Can't render this file because it is too large.