mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-09-23T12:00:18.973969+00:00
This commit is contained in:
parent
942c5565cf
commit
705028cb66
57
CVE-2022/CVE-2022-489xx/CVE-2022-48945.json
Normal file
57
CVE-2022/CVE-2022-489xx/CVE-2022-48945.json
Normal file
@ -0,0 +1,57 @@
|
||||
{
|
||||
"id": "CVE-2022-48945",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-23T10:15:02.467",
|
||||
"lastModified": "2024-09-23T10:15:02.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: fix compose size exceed boundary\n\nsyzkaller found a bug:\n\n BUG: unable to handle page fault for address: ffffc9000a3b1000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n RIP: 0010:memcpy_erms+0x6/0x10\n[...]\n Call Trace:\n <TASK>\n ? tpg_fill_plane_buffer+0x856/0x15b0\n vivid_fillbuff+0x8ac/0x1110\n vivid_thread_vid_cap_tick+0x361/0xc90\n vivid_thread_vid_cap+0x21a/0x3a0\n kthread+0x143/0x180\n ret_from_fork+0x1f/0x30\n </TASK>\n\nThis is because we forget to check boundary after adjust compose->height\nint V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem\nfor this case."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: vivid: fix compose size above bound syzkaller encontr\u00f3 un error: BUG: no se puede manejar la falla de p\u00e1gina para la direcci\u00f3n: ffffc9000a3b1000 #PF: acceso de escritura del supervisor en modo kernel #PF: error_code(0x0002) - p\u00e1gina no presente PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0 Oops: 0002 [#1] PREEMPT SMP CPU: 0 PID: 23489 Comm: vivid-000-vid-c No contaminado 6.1.0-rc1+ #512 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 01/04/2014 RIP: 0010:memcpy_erms+0x6/0x10 [...] Seguimiento de llamadas: ? tpg_fill_plane_buffer+0x856/0x15b0 vivid_fillbuff+0x8ac/0x1110 vivid_thread_vid_cap_tick+0x361/0xc90 vivid_thread_vid_cap+0x21a/0x3a0 kthread+0x143/0x180 ret_from_fork+0x1f/0x30 Esto se debe a que olvidamos verificar el l\u00edmite despu\u00e9s de ajustar el caso V4L2_SEL_TGT_CROP en el int compose->height. Agregue v4l2_rect_map_inside() para solucionar este problema en este caso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f558c5208b0f70c8140e08ce09fcc84da48e789",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/54f259906039dbfe46c550011409fa16f72370f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5edc3604151919da8da0fb092b71d7dce07d848a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8c0ee15d9a102c732d0745566d254040085d5663",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94a7ad9283464b75b12516c5512541d467cefcf8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9c7fba9503b826f0c061d136f8f0c9f953ed18b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab54081a2843aefb837812fac5488cc8f1696142",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ccb5392c4fea0e7d9f7ab35567e839d74cb3998b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f9d19f3a044ca651b0be52a4bf951ffe74259b9f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-465xx/CVE-2024-46544.json
Normal file
33
CVE-2024/CVE-2024-465xx/CVE-2024-46544.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-46544",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-23T11:15:10.563",
|
||||
"lastModified": "2024-09-23T11:15:10.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Default Permissions vulnerability in Apache Tomcat Connectors allows local users to view and modify shared memory containing mod_jk configuration which may lead to information disclosure and/or denial of service.\n\nThis issue affects Apache Tomcat Connectors: from 1.2.9-beta through 1.2.49. Only mod_jk on Unix like systems is affected. Neither the ISAPI redirector nor mod_jk on Windows is affected.\n\nUsers are recommended to upgrade to version 1.2.50, which fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/q1gp7cc38hs1r8gj8gfnopwznd5fpr4d",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
14
README.md
14
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-23T10:00:49.123762+00:00
|
||||
2024-09-23T12:00:18.973969+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-23T09:15:03.617000+00:00
|
||||
2024-09-23T11:15:10.563000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263562
|
||||
263564
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-45348](CVE-2024/CVE-2024-453xx/CVE-2024-45348.json) (`2024-09-23T09:15:02.960`)
|
||||
- [CVE-2024-8903](CVE-2024/CVE-2024-89xx/CVE-2024-8903.json) (`2024-09-23T09:15:03.617`)
|
||||
- [CVE-2022-48945](CVE-2022/CVE-2022-489xx/CVE-2022-48945.json) (`2024-09-23T10:15:02.467`)
|
||||
- [CVE-2024-46544](CVE-2024/CVE-2024-465xx/CVE-2024-46544.json) (`2024-09-23T11:15:10.563`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-23T09:15:03.230`)
|
||||
- [CVE-2024-7609](CVE-2024/CVE-2024-76xx/CVE-2024-7609.json) (`2024-09-23T09:15:03.473`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
10
_state.csv
10
_state.csv
@ -212507,6 +212507,7 @@ CVE-2022-48941,0,0,42a02148f60b226da82bd8396a5b1beca7927e48a1f4eb5fb7b081dc3b5cf
|
||||
CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
|
||||
CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
|
||||
CVE-2022-48944,0,0,78b35f4e96175b0acbd7eb76c8fc345abc146c0623b459d55b4bfe903afbd190,2024-09-03T14:26:56.393000
|
||||
CVE-2022-48945,1,1,c6d826b85712944395f1dbd0f767269d15e19596285a2d887e56b3f32c76fdb9,2024-09-23T10:15:02.467000
|
||||
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
|
||||
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
||||
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
|
||||
@ -259860,7 +259861,7 @@ CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148e
|
||||
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
|
||||
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
|
||||
CVE-2024-45348,1,1,4df46d4bb04facab6c1b96ac69a49767b51652fd53ccdf7b773d9d95937edc7e,2024-09-23T09:15:02.960000
|
||||
CVE-2024-45348,0,0,4df46d4bb04facab6c1b96ac69a49767b51652fd53ccdf7b773d9d95937edc7e,2024-09-23T09:15:02.960000
|
||||
CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45366,0,0,ec78c74ac351c22ffbb4e903d91259c92e90ebafbe4e65694c50f7e794cfe1f6,2024-09-20T12:30:51.220000
|
||||
@ -260152,6 +260153,7 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46544,1,1,d47ff95af97ce8e0d20920cd73cfea5ffcd92c9a1e859a54b085761d2e60fda3,2024-09-23T11:15:10.563000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
CVE-2024-46550,0,0,dbfd90472f86885f437cdb17b60b43e8d80027dc256b6fa3f37250c68a11c734,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46551,0,0,7d680c195cee424aa1c9fe58540d432bc709203e2247c1daf09b4190980aa965,2024-09-20T12:30:17.483000
|
||||
@ -262372,7 +262374,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400
|
||||
CVE-2024-7012,0,0,7505e34b161e28dbe95eb89541c44fc261402b7bb3b4a766cd0492f45404fdcf,2024-09-19T06:15:03.777000
|
||||
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7015,0,1,2f98818b22a577671d31cb1f515142d61fc105f3f7ead87a06bda616310e4f0c,2024-09-23T09:15:03.230000
|
||||
CVE-2024-7015,0,0,2f98818b22a577671d31cb1f515142d61fc105f3f7ead87a06bda616310e4f0c,2024-09-23T09:15:03.230000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000
|
||||
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
|
||||
@ -262792,7 +262794,7 @@ CVE-2024-7605,0,0,bc09a75b7c45de231dc015ea353239dfd63eba4bd43fa0fa35326485eaab33
|
||||
CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000
|
||||
CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
|
||||
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
|
||||
CVE-2024-7609,0,1,dd287019708dc32756806d00da78ef364565c2b83873d7c121b6afe97b890f01,2024-09-23T09:15:03.473000
|
||||
CVE-2024-7609,0,0,dd287019708dc32756806d00da78ef364565c2b83873d7c121b6afe97b890f01,2024-09-23T09:15:03.473000
|
||||
CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
|
||||
CVE-2024-7611,0,0,20c7aea76b96fadb718b1a1cc787a6b3d6bd93752875f41cd913fb6624e501f4,2024-09-06T16:46:26.830000
|
||||
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
|
||||
@ -263499,7 +263501,7 @@ CVE-2024-8891,0,0,ff7b73f9bb006862fcafd00a3c7fc11e18cbcab5a72fef5cdc59af2eebbe90
|
||||
CVE-2024-8892,0,0,c9caca4d0649554f09943d8c0b6b3ad595c85c6885b65601c2d986f975532bfc,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8897,0,0,15e9b60d292ae69a3cbabdc5b3b6c0b60bc9e0178f2aa5e1d8167c3742c685d1,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8900,0,0,a2f685783b9e1c392a05c85bce9847889aa408cf0022e8683f9ceee8bc3b9ae3,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8903,1,1,a202d8be2447438106198baeb8942dd84fade1944d07391ad71e131cd338c749,2024-09-23T09:15:03.617000
|
||||
CVE-2024-8903,0,0,a202d8be2447438106198baeb8942dd84fade1944d07391ad71e131cd338c749,2024-09-23T09:15:03.617000
|
||||
CVE-2024-8904,0,0,d8dcf25b3cbae62dbf75fa5380e6989346805c7240b139b8d28c46adffd353f1,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8905,0,0,625d5bb69a9f76fcb9a2cd22498ac865437c911f131708c6085adf66bce9c960,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8906,0,0,c51af906a95a15be5327dac802b1d2f57255f0ac356fbd5092d72b98f427b1aa,2024-09-20T12:30:51.220000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user