mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-08-17T12:00:17.056689+00:00
This commit is contained in:
parent
d86e9d8933
commit
785536b02a
64
CVE-2023/CVE-2023-07xx/CVE-2023-0714.json
Normal file
64
CVE-2023/CVE-2023-07xx/CVE-2023-0714.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-0714",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-08-17T10:15:06.147",
|
||||||
|
"lastModified": "2024-08-17T10:15:06.147",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Metform Elementor Contact Form Builder for WordPress is vulnerable to Arbitrary File Upload due to insufficient file type validation in versions up to, and including, 3.2.4. This allows unauthenticated visitors to perform a \"double extension\" attack and upload files containing a malicious extension but ending with a benign extension, which may make remote code execution possible in some configurations."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/file-data-validation.php?rev=2746287",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2896914/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/697ce433-f321-4977-a2ad-68369d9ce9c3?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2023/CVE-2023-34xx/CVE-2023-3416.json
Normal file
60
CVE-2023/CVE-2023-34xx/CVE-2023-3416.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-3416",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-08-17T10:15:07.383",
|
||||||
|
"lastModified": "2024-08-17T10:15:07.383",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'subscriptionCouponId' parameter via the 'create_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://tagdiv.com/tagdiv-opt-in-builder/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7659ac9b-fa4e-4cb7-9887-38aa65b6d1c3?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2023/CVE-2023-34xx/CVE-2023-3419.json
Normal file
60
CVE-2023/CVE-2023-34xx/CVE-2023-3419.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-3419",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-08-17T10:15:07.633",
|
||||||
|
"lastModified": "2024-08-17T10:15:07.633",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'couponId' parameter of the 'recreate_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://tagdiv.com/tagdiv-opt-in-builder/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17150263-261d-422f-8b36-a2981d4aaad3?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43815.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43815.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43815",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:07.870",
|
||||||
|
"lastModified": "2024-08-17T10:15:07.870",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: mxs-dcp - Ensure payload is zero when using key slot\n\nWe could leak stack memory through the payload field when running\nAES with a key from one of the hardware's key slots. Fix this by\nensuring the payload field is set to 0 in such cases.\n\nThis does not affect the common use case when the key is supplied\nfrom main memory via the descriptor payload."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/dd52b5eeb0f70893f762da7254e923fd23fd1379",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e1640fed0377bf7276efb70d03cb821a6931063d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43816.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43816.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43816",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:07.950",
|
||||||
|
"lastModified": "2024-08-17T10:15:07.950",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages\n\nOn big endian architectures, it is possible to run into a memory out of\nbounds pointer dereference when FCP targets are zoned.\n\nIn lpfc_prep_embed_io, the memcpy(ptr, fcp_cmnd, sgl->sge_len) is\nreferencing a little endian formatted sgl->sge_len value. So, the memcpy\ncan cause big endian systems to crash.\n\nRedefine the *sgl ptr as a struct sli4_sge_le to make it clear that we are\nreferring to a little endian formatted data structure. And, update the\nroutine with proper le32_to_cpu macro usages."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8bc7c617642db6d8d20ee671fb6c4513017e7a7e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9fd003f344d502f65252963169df3dd237054e49",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43817.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43817.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43817",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.010",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.010",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: missing check virtio\n\nTwo missing check in virtio_net_hdr_to_skb() allowed syzbot\nto crash kernels again\n\n1. After the skb_segment function the buffer may become non-linear\n(nr_frags != 0), but since the SKBTX_SHARED_FRAG flag is not set anywhere\nthe __skb_linearize function will not be executed, then the buffer will\nremain non-linear. Then the condition (offset >= skb_headlen(skb))\nbecomes true, which causes WARN_ON_ONCE in skb_checksum_help.\n\n2. The struct sk_buff and struct virtio_net_hdr members must be\nmathematically related.\n(gso_size) must be greater than (needed) otherwise WARN_ON_ONCE.\n(remainder) must be greater than (needed) otherwise WARN_ON_ONCE.\n(remainder) may be 0 if division is without remainder.\n\noffset+2 (4191) > skb_headlen() (1116)\nWARNING: CPU: 1 PID: 5084 at net/core/dev.c:3303 skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303\nModules linked in:\nCPU: 1 PID: 5084 Comm: syz-executor336 Not tainted 6.7.0-rc3-syzkaller-00014-gdf60cee26a2e #0\nHardware name: Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303\nCode: 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 52 01 00 00 44 89 e2 2b 53 74 4c 89 ee 48 c7 c7 40 57 e9 8b e8 af 8f dd f8 90 <0f> 0b 90 90 e9 87 fe ff ff e8 40 0f 6e f9 e9 4b fa ff ff 48 89 ef\nRSP: 0018:ffffc90003a9f338 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff888025125780 RCX: ffffffff814db209\nRDX: ffff888015393b80 RSI: ffffffff814db216 RDI: 0000000000000001\nRBP: ffff8880251257f4 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: 000000000000045c\nR13: 000000000000105f R14: ffff8880251257f0 R15: 000000000000105d\nFS: 0000555555c24380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000002000f000 CR3: 0000000023151000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ip_do_fragment+0xa1b/0x18b0 net/ipv4/ip_output.c:777\n ip_fragment.constprop.0+0x161/0x230 net/ipv4/ip_output.c:584\n ip_finish_output_gso net/ipv4/ip_output.c:286 [inline]\n __ip_finish_output net/ipv4/ip_output.c:308 [inline]\n __ip_finish_output+0x49c/0x650 net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\n ip_output+0x13b/0x2a0 net/ipv4/ip_output.c:433\n dst_output include/net/dst.h:451 [inline]\n ip_local_out+0xaf/0x1a0 net/ipv4/ip_output.c:129\n iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82\n ipip6_tunnel_xmit net/ipv6/sit.c:1034 [inline]\n sit_tunnel_xmit+0xed2/0x28f0 net/ipv6/sit.c:1076\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3545 [inline]\n dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3561\n __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4346\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n packet_xmit+0x257/0x380 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3087 [inline]\n packet_sendmsg+0x24ca/0x5240 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0xd5/0x180 net/socket.c:745\n __sys_sendto+0x255/0x340 net/socket.c:2190\n __do_sys_sendto net/socket.c:2202 [inline]\n __se_sys_sendto net/socket.c:2198 [inline]\n __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5b1997487a3f3373b0f580c8a20b56c1b64b0775",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/90d41ebe0cd4635f6410471efc1dd71b33e894cf",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e269d79c7d35aa3808b1f3c1737d63dab504ddc8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e9164903b8b303c34723177b02fe91e49e3c4cd7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43818.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43818.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43818",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.080",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.080",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: Adjust error handling in case of absent codec device\n\nacpi_get_first_physical_node() can return NULL in several cases (no such\ndevice, ACPI table error, reference count drop to 0, etc).\nExisting check just emit error message, but doesn't perform return.\nThen this NULL pointer is passed to devm_acpi_dev_add_driver_gpios()\nwhere it is dereferenced.\n\nAdjust this error handling by adding error code return.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1ba9856cf7f6492b47c1edf853137f320d583db5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5080808c3339de2220c602ab7c7fa23dc6c1a5a3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/99b642dac24f6d09ba3ebf1d690be8aefff86164",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b1173d64edd276c957b6d09e1f971c85b38f1519",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43819.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43819.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43819",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.147",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.147",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: s390: Reject memory region operations for ucontrol VMs\n\nThis change rejects the KVM_SET_USER_MEMORY_REGION and\nKVM_SET_USER_MEMORY_REGION2 ioctls when called on a ucontrol VM.\nThis is necessary since ucontrol VMs have kvm->arch.gmap set to 0 and\nwould thus result in a null pointer dereference further in.\nMemory management needs to be performed in userspace and using the\nioctls KVM_S390_UCAS_MAP and KVM_S390_UCAS_UNMAP.\n\nAlso improve s390 specific documentation for KVM_SET_USER_MEMORY_REGION\nand KVM_SET_USER_MEMORY_REGION2.\n\n[frankja@linux.ibm.com: commit message spelling fix, subject prefix fix]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/49c9945c054df4c22008e2bf87ca74d3e2507aa6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7816e58967d0e6cadce05c8540b47ed027dc2499",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43820.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43820.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43820",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.207",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.207",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume\n\nrm-raid devices will occasionally trigger the following warning when\nbeing resumed after a table load because DM_RECOVERY_RUNNING is set:\n\nWARNING: CPU: 7 PID: 5660 at drivers/md/dm-raid.c:4105 raid_resume+0xee/0x100 [dm_raid]\n\nThe failing check is:\nWARN_ON_ONCE(test_bit(MD_RECOVERY_RUNNING, &mddev->recovery));\n\nThis check is designed to make sure that the sync thread isn't\nregistered, but md_check_recovery can set MD_RECOVERY_RUNNING without\nthe sync_thread ever getting registered. Instead of checking if\nMD_RECOVERY_RUNNING is set, check if sync_thread is non-NULL."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3199a34bfaf7561410e0be1e33a61eba870768fc",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a5c15a78c0e1631b7df822b56e8b6424e4d1ca3e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43821.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43821.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43821",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.277",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.277",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix a possible null pointer dereference\n\nIn function lpfc_xcvr_data_show, the memory allocation with kmalloc might\nfail, thereby making rdp_context a null pointer. In the following context\nand functions that use this pointer, there are dereferencing operations,\nleading to null pointer dereference.\n\nTo fix this issue, a null pointer check should be added. If it is null,\nuse scnprintf to notify the user and return len."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/45b2a23e00d448a9e6d1f371ca3a4d4b073fe78c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/57600a7dd2b52c904f7c8d2cac0fd8c23868e680",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5e0bf3e8aec2cbc51123f84b29aaacbd91fc56fa",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43822.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43822.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43822",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.340",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.340",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoc: PCM6240: Return directly after a failed devm_kzalloc() in pcmdevice_i2c_probe()\n\nThe value \u201c-ENOMEM\u201d was assigned to the local variable \u201cret\u201d\nin one if branch after a devm_kzalloc() call failed at the beginning.\nThis error code will trigger then a pcmdevice_remove() call with a passed\nnull pointer so that an undesirable dereference will be performed.\nThus return the appropriate error code directly."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3722873d49a1788d5420894d4f6f63e35f5c1f13",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fa6f16eff7320c91e908309e31be34cbbe4b7e58",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43823.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43823.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43823",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.400",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.400",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()\n\nIf IORESOURCE_MEM is not provided in Device Tree due to\nany error, resource_list_first_type() will return NULL and\npci_parse_request_of_pci_ranges() will just emit a warning.\n\nThis will cause a NULL pointer dereference. Fix this bug by adding NULL\nreturn check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0a6f1b5fe8ef8268aaa069035639968ceeea0a23",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a231707a91f323af1e5d9f1722055ec2fc1c7775",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/bbba48ad67c53feea05936ea1e029dcca8057506",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/dbcdd1863ba2ec9b76ec131df25d797709e05597",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43824.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43824.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43824",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.477",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.477",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init()\n\nInstead of getting the epc_features from pci_epc_get_features() API, use\nthe cached pci_epf_test::epc_features value to avoid the NULL check. Since\nthe NULL check is already performed in pci_epf_test_bind(), having one more\ncheck in pci_epf_test_core_init() is redundant and it is not possible to\nhit the NULL pointer dereference.\n\nAlso with commit a01e7214bef9 (\"PCI: endpoint: Remove \"core_init_notifier\"\nflag\"), 'epc_features' got dereferenced without the NULL check, leading to\nthe following false positive Smatch warning:\n\n drivers/pci/endpoint/functions/pci-epf-test.c:784 pci_epf_test_core_init() error: we previously assumed 'epc_features' could be null (see line 747)\n\nThus, remove the redundant NULL check and also use the epc_features::\n{msix_capable/msi_capable} flags directly to avoid local variables.\n\n[kwilczynski: commit log]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5a5095a8bd1bd349cce1c879e5e44407a34dda8a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/af4ad016abb1632ff7ee598a6037952b495e5b80",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43825.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43825.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43825",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.533",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.533",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: Fix the sorting functionality in iio_gts_build_avail_time_table\n\nThe sorting in iio_gts_build_avail_time_table is not working as intended.\nIt could result in an out-of-bounds access when the time is zero.\n\nHere are more details:\n\n1. When the gts->itime_table[i].time_us is zero, e.g., the time\nsequence is `3, 0, 1`, the inner for-loop will not terminate and do\nout-of-bound writes. This is because once `times[j] > new`, the value\n`new` will be added in the current position and the `times[j]` will be\nmoved to `j+1` position, which makes the if-condition always hold.\nMeanwhile, idx will be added one, making the loop keep running without\ntermination and out-of-bound write.\n2. If none of the gts->itime_table[i].time_us is zero, the elements\nwill just be copied without being sorted as described in the comment\n\"Sort times from all tables to one and remove duplicates\".\n\nFor more details, please refer to\nhttps://lore.kernel.org/all/6dd0d822-046c-4dd2-9532-79d7ab96ec05@gmail.com."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/31ff8464ef540785344994986a010031410f9ff3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5acc3f971a01be48d5ff4252d8f9cdb87998cdfb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b5046de32fd1532c3f67065197fc1da82f0b5193",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43826.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43826.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43826",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.593",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.593",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: pass explicit offset/count to trace events\n\nnfs_folio_length is unsafe to use without having the folio locked and a\ncheck for a NULL ->f_mapping that protects against truncations and can\nlead to kernel crashes. E.g. when running xfstests generic/065 with\nall nfs trace points enabled.\n\nFollow the model of the XFS trace points and pass in an expl\u0456cit offset\nand length. This has the additional benefit that these values can\nbe more accurate as some of the users touch partial folio ranges."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43827.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43827.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43827",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.653",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.653",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add null check before access structs\n\nIn enable_phantom_plane, we should better check null pointer before\naccessing various structs."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/081ff4c0ef1884ae55f7adb8944efd22e22d8724",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c96140000915b610d86f941450e15ca552de154a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43828.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43828.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43828",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.720",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.720",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix infinite loop when replaying fast_commit\n\nWhen doing fast_commit replay an infinite loop may occur due to an\nuninitialized extent_status struct. ext4_ext_determine_insert_hole() does\nnot detect the replay and calls ext4_es_find_extent_range(), which will\nreturn immediately without initializing the 'es' variable.\n\nBecause 'es' contains garbage, an integer overflow may happen causing an\ninfinite loop in this function, easily reproducible using fstest generic/039.\n\nThis commit fixes this issue by unconditionally initializing the structure\nin function ext4_es_find_extent_range().\n\nThanks to Zhang Yi, for figuring out the real problem!"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/181e63cd595c688194e07332f9944b3a63193de2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/81f819c537d29932e4b9267f02411cbc8b355178",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/907c3fe532253a6ef4eb9c4d67efb71fab58c706",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c6e67df64783e99a657ef2b8c834ba2bf54c539c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43829.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43829.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43829",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.787",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.787",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/qxl: Add check for drm_cvt_mode\n\nAdd check for the return value of drm_cvt_mode() and return the error if\nit fails in order to avoid NULL pointer dereference."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4b1f303bdeceac049e56e4b20eb5280bd9e02f4f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7bd09a2db0f617377027a2bb0b9179e6959edff3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d4c57354a06cb4a77998ff8aa40af89eee30e07b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f28b353c0c6c7831a70ccca881bf2db5e6785cdd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43830.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43830.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43830",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.857",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.857",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: trigger: Unregister sysfs attributes before calling deactivate()\n\nTriggers which have trigger specific sysfs attributes typically store\nrelated data in trigger-data allocated by the activate() callback and\nfreed by the deactivate() callback.\n\nCalling device_remove_groups() after calling deactivate() leaves a window\nwhere the sysfs attributes show/store functions could be called after\ndeactivation and then operate on the just freed trigger-data.\n\nMove the device_remove_groups() call to before deactivate() to close\nthis race window.\n\nThis also makes the deactivation path properly do things in reverse order\nof the activation path which calls the activate() callback before calling\ndevice_add_groups()."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43831.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43831.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43831",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.917",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Handle invalid decoder vsi\n\nHandle an invalid decoder vsi in vpu_dec_init to ensure the decoder vsi\nis valid for future use."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1c109f23b271a02b9bb195c173fab41e3285a8db",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/59d438f8e02ca641c58d77e1feffa000ff809e9f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cdf05ae76198c513836bde4eb55f099c44773280",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43832.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43832.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43832",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:08.980",
|
||||||
|
"lastModified": "2024-08-17T10:15:08.980",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/uv: Don't call folio_wait_writeback() without a folio reference\n\nfolio_wait_writeback() requires that no spinlocks are held and that\na folio reference is held, as documented. After we dropped the PTL, the\nfolio could get freed concurrently. So grab a temporary reference."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1a1eb2f3fc453dcd52726d13e863938561489cb7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3f29f6537f54d74e64bac0a390fb2e26da25800d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8736604ef53359a718c246087cd21dcec232d2fb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b21aba72aadd94bdac275deab021fc84d6c72b16",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43833.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43833.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43833",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.040",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.040",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l: async: Fix NULL pointer dereference in adding ancillary links\n\nIn v4l2_async_create_ancillary_links(), ancillary links are created for\nlens and flash sub-devices. These are sub-device to sub-device links and\nif the async notifier is related to a V4L2 device, the source sub-device\nof the ancillary link is NULL, leading to a NULL pointer dereference.\nCheck the notifier's sd field is non-NULL in\nv4l2_async_create_ancillary_links().\n\n[Sakari Ailus: Reword the subject and commit messages slightly.]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/249212ceb4187783af3801c57b92a5a25d410621",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9b4667ea67854f0b116fe22ad11ef5628c5b5b5f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b87e28050d9b0959de24574d587825cfab2f13fb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fe0f92fd5320b393e44ca210805e653ea90cc982",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43834.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43834.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43834",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.113",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.113",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: fix invalid wait context of page_pool_destroy()\n\nIf the driver uses a page pool, it creates a page pool with\npage_pool_create().\nThe reference count of page pool is 1 as default.\nA page pool will be destroyed only when a reference count reaches 0.\npage_pool_destroy() is used to destroy page pool, it decreases a\nreference count.\nWhen a page pool is destroyed, ->disconnect() is called, which is\nmem_allocator_disconnect().\nThis function internally acquires mutex_lock().\n\nIf the driver uses XDP, it registers a memory model with\nxdp_rxq_info_reg_mem_model().\nThe xdp_rxq_info_reg_mem_model() internally increases a page pool\nreference count if a memory model is a page pool.\nNow the reference count is 2.\n\nTo destroy a page pool, the driver should call both page_pool_destroy()\nand xdp_unreg_mem_model().\nThe xdp_unreg_mem_model() internally calls page_pool_destroy().\nOnly page_pool_destroy() decreases a reference count.\n\nIf a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we\nwill face an invalid wait context warning.\nBecause xdp_unreg_mem_model() calls page_pool_destroy() with\nrcu_read_lock().\nThe page_pool_destroy() internally acquires mutex_lock().\n\nSplat looks like:\n=============================\n[ BUG: Invalid wait context ]\n6.10.0-rc6+ #4 Tainted: G W\n-----------------------------\nethtool/1806 is trying to lock:\nffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150\nother info that might help us debug this:\ncontext-{5:5}\n3 locks held by ethtool/1806:\nstack backtrace:\nCPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed\nHardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021\nCall Trace:\n<TASK>\ndump_stack_lvl+0x7e/0xc0\n__lock_acquire+0x1681/0x4de0\n? _printk+0x64/0xe0\n? __pfx_mark_lock.part.0+0x10/0x10\n? __pfx___lock_acquire+0x10/0x10\nlock_acquire+0x1b3/0x580\n? mem_allocator_disconnect+0x73/0x150\n? __wake_up_klogd.part.0+0x16/0xc0\n? __pfx_lock_acquire+0x10/0x10\n? dump_stack_lvl+0x91/0xc0\n__mutex_lock+0x15c/0x1690\n? mem_allocator_disconnect+0x73/0x150\n? __pfx_prb_read_valid+0x10/0x10\n? mem_allocator_disconnect+0x73/0x150\n? __pfx_llist_add_batch+0x10/0x10\n? console_unlock+0x193/0x1b0\n? lockdep_hardirqs_on+0xbe/0x140\n? __pfx___mutex_lock+0x10/0x10\n? tick_nohz_tick_stopped+0x16/0x90\n? __irq_work_queue_local+0x1e5/0x330\n? irq_work_queue+0x39/0x50\n? __wake_up_klogd.part.0+0x79/0xc0\n? mem_allocator_disconnect+0x73/0x150\nmem_allocator_disconnect+0x73/0x150\n? __pfx_mem_allocator_disconnect+0x10/0x10\n? mark_held_locks+0xa5/0xf0\n? rcu_is_watching+0x11/0xb0\npage_pool_release+0x36e/0x6d0\npage_pool_destroy+0xd7/0x440\nxdp_unreg_mem_model+0x1a7/0x2a0\n? __pfx_xdp_unreg_mem_model+0x10/0x10\n? kfree+0x125/0x370\n? bnxt_free_ring.isra.0+0x2eb/0x500\n? bnxt_free_mem+0x5ac/0x2500\nxdp_rxq_info_unreg+0x4a/0xd0\nbnxt_free_mem+0x1356/0x2500\nbnxt_close_nic+0xf0/0x3b0\n? __pfx_bnxt_close_nic+0x10/0x10\n? ethnl_parse_bit+0x2c6/0x6d0\n? __pfx___nla_validate_parse+0x10/0x10\n? __pfx_ethnl_parse_bit+0x10/0x10\nbnxt_set_features+0x2a8/0x3e0\n__netdev_update_features+0x4dc/0x1370\n? ethnl_parse_bitset+0x4ff/0x750\n? __pfx_ethnl_parse_bitset+0x10/0x10\n? __pfx___netdev_update_features+0x10/0x10\n? mark_held_locks+0xa5/0xf0\n? _raw_spin_unlock_irqrestore+0x42/0x70\n? __pm_runtime_resume+0x7d/0x110\nethnl_set_features+0x32d/0xa20\n\nTo fix this problem, it uses rhashtable_lookup_fast() instead of\nrhashtable_lookup() with rcu_read_lock().\nUsing xa without rcu_read_lock() here is safe.\nxa is freed by __xdp_mem_allocator_rcu_free() and this is called by\ncall_rcu() of mem_xa_remove().\nThe mem_xa_remove() is called by page_pool_destroy() if a reference\ncount reaches 0.\nThe xa is already protected by the reference count mechanism well in the\ncontrol plane.\nSo removing rcu_read_lock() for page_pool_destroy() is safe."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/12144069209eec7f2090ce9afa15acdcc2c2a537",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3fc1be360b99baeea15cdee3cf94252cd3a72d26",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/59a931c5b732ca5fc2ca727f5a72aeabaafa85ec",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/bf0ce5aa5f2525ed1b921ba36de96e458e77f482",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43835.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43835.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43835",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.183",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.183",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: Fix napi_skb_cache_put warning\n\nAfter the commit bdacf3e34945 (\"net: Use nested-BH locking for\nnapi_alloc_cache.\") was merged, the following warning began to appear:\n\n\t WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0\n\n\t __warn+0x12f/0x340\n\t napi_skb_cache_put+0x82/0x4b0\n\t napi_skb_cache_put+0x82/0x4b0\n\t report_bug+0x165/0x370\n\t handle_bug+0x3d/0x80\n\t exc_invalid_op+0x1a/0x50\n\t asm_exc_invalid_op+0x1a/0x20\n\t __free_old_xmit+0x1c8/0x510\n\t napi_skb_cache_put+0x82/0x4b0\n\t __free_old_xmit+0x1c8/0x510\n\t __free_old_xmit+0x1c8/0x510\n\t __pfx___free_old_xmit+0x10/0x10\n\nThe issue arises because virtio is assuming it's running in NAPI context\neven when it's not, such as in the netpoll case.\n\nTo resolve this, modify virtnet_poll_tx() to only set NAPI when budget\nis available. Same for virtnet_poll_cleantx(), which always assumed that\nit was in a NAPI context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/468a729b78895893d0e580ceea49bed8ada2a2bd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f8321fa75102246d7415a6af441872f6637c93ab",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43836.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43836.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43836",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.250",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.250",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethtool: pse-pd: Fix possible null-deref\n\nFix a possible null dereference when a PSE supports both c33 and PoDL, but\nonly one of the netlink attributes is specified. The c33 or PoDL PSE\ncapabilities are already validated in the ethnl_set_pse_validate() call."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4cddb0f15ea9c62f81b4889ea69a99368cc63a86",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e187690b125a297499eadeec53c32c5ed6d7436a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43837.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43837.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43837",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.320",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.320",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix null pointer dereference in resolve_prog_type() for BPF_PROG_TYPE_EXT\n\nWhen loading a EXT program without specifying `attr->attach_prog_fd`,\nthe `prog->aux->dst_prog` will be null. At this time, calling\nresolve_prog_type() anywhere will result in a null pointer dereference.\n\nExample stack trace:\n\n[ 8.107863] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004\n[ 8.108262] Mem abort info:\n[ 8.108384] ESR = 0x0000000096000004\n[ 8.108547] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 8.108722] SET = 0, FnV = 0\n[ 8.108827] EA = 0, S1PTW = 0\n[ 8.108939] FSC = 0x04: level 0 translation fault\n[ 8.109102] Data abort info:\n[ 8.109203] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[ 8.109399] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 8.109614] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 8.109836] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101354000\n[ 8.110011] [0000000000000004] pgd=0000000000000000, p4d=0000000000000000\n[ 8.112624] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[ 8.112783] Modules linked in:\n[ 8.113120] CPU: 0 PID: 99 Comm: may_access_dire Not tainted 6.10.0-rc3-next-20240613-dirty #1\n[ 8.113230] Hardware name: linux,dummy-virt (DT)\n[ 8.113390] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 8.113429] pc : may_access_direct_pkt_data+0x24/0xa0\n[ 8.113746] lr : add_subprog_and_kfunc+0x634/0x8e8\n[ 8.113798] sp : ffff80008283b9f0\n[ 8.113813] x29: ffff80008283b9f0 x28: ffff800082795048 x27: 0000000000000001\n[ 8.113881] x26: ffff0000c0bb2600 x25: 0000000000000000 x24: 0000000000000000\n[ 8.113897] x23: ffff0000c1134000 x22: 000000000001864f x21: ffff0000c1138000\n[ 8.113912] x20: 0000000000000001 x19: ffff0000c12b8000 x18: ffffffffffffffff\n[ 8.113929] x17: 0000000000000000 x16: 0000000000000000 x15: 0720072007200720\n[ 8.113944] x14: 0720072007200720 x13: 0720072007200720 x12: 0720072007200720\n[ 8.113958] x11: 0720072007200720 x10: 0000000000f9fca4 x9 : ffff80008021f4e4\n[ 8.113991] x8 : 0101010101010101 x7 : 746f72705f6d656d x6 : 000000001e0e0f5f\n[ 8.114006] x5 : 000000000001864f x4 : ffff0000c12b8000 x3 : 000000000000001c\n[ 8.114020] x2 : 0000000000000002 x1 : 0000000000000000 x0 : 0000000000000000\n[ 8.114126] Call trace:\n[ 8.114159] may_access_direct_pkt_data+0x24/0xa0\n[ 8.114202] bpf_check+0x3bc/0x28c0\n[ 8.114214] bpf_prog_load+0x658/0xa58\n[ 8.114227] __sys_bpf+0xc50/0x2250\n[ 8.114240] __arm64_sys_bpf+0x28/0x40\n[ 8.114254] invoke_syscall.constprop.0+0x54/0xf0\n[ 8.114273] do_el0_svc+0x4c/0xd8\n[ 8.114289] el0_svc+0x3c/0x140\n[ 8.114305] el0t_64_sync_handler+0x134/0x150\n[ 8.114331] el0t_64_sync+0x168/0x170\n[ 8.114477] Code: 7100707f 54000081 f9401c00 f9403800 (b9400403)\n[ 8.118672] ---[ end trace 0000000000000000 ]---\n\nOne way to fix it is by forcing `attach_prog_fd` non-empty when\nbpf_prog_load(). But this will lead to `libbpf_probe_bpf_prog_type`\nAPI broken which use verifier log to probe prog type and will log\nnothing if we reject invalid EXT prog before bpf_check().\n\nAnother way is by adding null check in resolve_prog_type().\n\nThe issue was introduced by commit 4a9c7bbe2ed4 (\"bpf: Resolve to\nprog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT\") which wanted\nto correct type resolution for BPF_PROG_TYPE_TRACING programs. Before\nthat, the type resolution of BPF_PROG_TYPE_EXT prog actually follows\nthe logic below:\n\n prog->aux->dst_prog ? prog->aux->dst_prog->type : prog->type;\n\nIt implies that when EXT program is not yet attached to `dst_prog`,\nthe prog type should be EXT itself. This code worked fine in the past.\nSo just keep using it.\n\nFix this by returning `prog->type` for BPF_PROG_TYPE_EXT if `dst_prog`\nis not present in resolve_prog_type()."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9d40fd516aeae6779e3c84c6b96700ca76285847",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b29a880bb145e1f1c1df5ab88ed26b1495ff9f09",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f7866c35873377313ff94398f17d425b28b71de1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fcac5feb06f31ee4c88bca9bf98d8bc3ca7d2615",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43838.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43838.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43838",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.390",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.390",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix overflow check in adjust_jmp_off()\n\nadjust_jmp_off() incorrectly used the insn->imm field for all overflow check,\nwhich is incorrect as that should only be done or the BPF_JMP32 | BPF_JA case,\nnot the general jump instruction case. Fix it by using insn->off for overflow\ncheck in the general case."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/345652866a8869825a2a582ee5a28d75141f184a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4a04b4f0de59dd5c621e78f15803ee0b0544eeb8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43839.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43839.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43839",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.447",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.447",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbna: adjust 'name' buf size of bna_tcb and bna_ccb structures\n\nTo have enough space to write all possible sprintf() args. Currently\n'name' size is 16, but the first '%s' specifier may already need at\nleast 16 characters, since 'bnad->netdev->name' is used there.\n\nFor '%d' specifiers, assume that they require:\n * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8\n * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX\n is 16\n\nAnd replace sprintf with snprintf.\n\nDetected using the static analysis tool - Svace."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ab748dd10d8742561f2980fea08ffb4f0cacfdef",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b0ff0cd0847b03c0a0abe20cfa900eabcfcb9e43",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c9741a03dc8e491e57b95fba0058ab46b7e506da",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e0f48f51d55fb187400e9787192eda09fa200ff5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43840.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43840.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43840",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.517",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.517",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG\n\nWhen BPF_TRAMP_F_CALL_ORIG is set, the trampoline calls\n__bpf_tramp_enter() and __bpf_tramp_exit() functions, passing them\nthe struct bpf_tramp_image *im pointer as an argument in R0.\n\nThe trampoline generation code uses emit_addr_mov_i64() to emit\ninstructions for moving the bpf_tramp_image address into R0, but\nemit_addr_mov_i64() assumes the address to be in the vmalloc() space\nand uses only 48 bits. Because bpf_tramp_image is allocated using\nkzalloc(), its address can use more than 48-bits, in this case the\ntrampoline will pass an invalid address to __bpf_tramp_enter/exit()\ncausing a kernel crash.\n\nFix this by using emit_a64_mov_i64() in place of emit_addr_mov_i64()\nas it can work with addresses that are greater than 48-bits."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/19d3c179a37730caf600a97fed3794feac2b197b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6d218fcc707d6b2c3616b6cd24b948fd4825cfec",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43841.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43841.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43841",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.580",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.580",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: virt_wifi: avoid reporting connection success with wrong SSID\n\nWhen user issues a connection with a different SSID than the one\nvirt_wifi has advertised, the __cfg80211_connect_result() will\ntrigger the warning: WARN_ON(bss_not_found).\n\nThe issue is because the connection code in virt_wifi does not\ncheck the SSID from user space (it only checks the BSSID), and\nvirt_wifi will call cfg80211_connect_result() with WLAN_STATUS_SUCCESS\neven if the SSID is different from the one virt_wifi has advertised.\nEventually cfg80211 won't be able to find the cfg80211_bss and generate\nthe warning.\n\nFixed it by checking the SSID (from user space) in the connection code."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/36e92b5edc8e0daa18e9325674313802ce3fbc29",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/416d3c1538df005195721a200b0371d39636e05d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b5d14b0c6716fad7f0c94ac6e1d6f60a49f985c7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d3cc85a10abc8eae48988336cdd3689ab92581b3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43842.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43842.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43842",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.647",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.647",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()\n\nIn rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size.\nBut then 'rate->he_gi' is used as array index instead of 'status->he_gi'.\nThis can lead to go beyond array boundaries in case of 'rate->he_gi' is\nnot equal to 'status->he_gi' and is bigger than array size. Looks like\n\"copy-paste\" mistake.\n\nFix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43843.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43843.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43843",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.707",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.707",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Fix out-of-bounds issue when preparing trampoline image\n\nWe get the size of the trampoline image during the dry run phase and\nallocate memory based on that size. The allocated image will then be\npopulated with instructions during the real patch phase. But after\ncommit 26ef208c209a (\"bpf: Use arch_bpf_trampoline_size\"), the `im`\nargument is inconsistent in the dry run and real patch phase. This may\ncause emit_imm in RV64 to generate a different number of instructions\nwhen generating the 'im' address, potentially causing out-of-bounds\nissues. Let's emit the maximum number of instructions for the \"im\"\naddress during dry run to fix this problem."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3e6a1b1b179abb643ec3560c02bc3082bc92285f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9f1e16fb1fc9826001c69e0551d51fbbcd2d74e9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43844.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43844.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43844",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.763",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.763",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: wow: fix GTK offload H2C skbuff issue\n\nWe mistakenly put skb too large and that may exceed skb->end.\nTherefore, we fix it.\n\nskbuff: skb_over_panic: text:ffffffffc09e9a9d len:416 put:204 head:ffff8fba04eca780 data:ffff8fba04eca7e0 tail:0x200 end:0x140 dev:<NULL>\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:192!\ninvalid opcode: 0000 [#1] PREEMPT SMP PTI\nCPU: 1 PID: 4747 Comm: kworker/u4:44 Tainted: G O 6.6.30-02659-gc18865c4dfbd #1 86547039b47e46935493f615ee31d0b2d711d35e\nHardware name: HP Meep/Meep, BIOS Google_Meep.11297.262.0 03/18/2021\nWorkqueue: events_unbound async_run_entry_fn\nRIP: 0010:skb_panic+0x5d/0x60\nCode: c6 63 8b 8f bb 4c 0f 45 f6 48 c7 c7 4d 89 8b bb 48 89 ce 44 89 d1 41 56 53 41 53 ff b0 c8 00 00 00 e8 27 5f 23 00 48 83 c4 20 <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44\nRSP: 0018:ffffaa700144bad0 EFLAGS: 00010282\nRAX: 0000000000000089 RBX: 0000000000000140 RCX: 14432c5aad26c900\nRDX: 0000000000000000 RSI: 00000000ffffdfff RDI: 0000000000000001\nRBP: ffffaa700144bae0 R08: 0000000000000000 R09: ffffaa700144b920\nR10: 00000000ffffdfff R11: ffffffffbc28fbc0 R12: ffff8fba4e57a010\nR13: 0000000000000000 R14: ffffffffbb8f8b63 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8fba7bd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007999c4ad1000 CR3: 000000015503a000 CR4: 0000000000350ee0\nCall Trace:\n <TASK>\n ? __die_body+0x1f/0x70\n ? die+0x3d/0x60\n ? do_trap+0xa4/0x110\n ? skb_panic+0x5d/0x60\n ? do_error_trap+0x6d/0x90\n ? skb_panic+0x5d/0x60\n ? handle_invalid_op+0x30/0x40\n ? skb_panic+0x5d/0x60\n ? exc_invalid_op+0x3c/0x50\n ? asm_exc_invalid_op+0x16/0x20\n ? skb_panic+0x5d/0x60\n skb_put+0x49/0x50\n rtw89_fw_h2c_wow_gtk_ofld+0xbd/0x220 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]\n rtw89_wow_resume+0x31f/0x540 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]\n rtw89_ops_resume+0x2b/0xa0 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]\n ieee80211_reconfig+0x84/0x13e0 [mac80211 818a894e3b77da6298269c59ed7cdff065a4ed52]\n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]\n ? dev_printk_emit+0x51/0x70\n ? _dev_info+0x6e/0x90\n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]\n wiphy_resume+0x89/0x180 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]\n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]\n dpm_run_callback+0x3c/0x140\n device_resume+0x1f9/0x3c0\n ? __pfx_dpm_watchdog_handler+0x10/0x10\n async_resume+0x1d/0x30\n async_run_entry_fn+0x29/0xd0\n process_scheduled_works+0x1d8/0x3d0\n worker_thread+0x1fc/0x2f0\n kthread+0xed/0x110\n ? __pfx_worker_thread+0x10/0x10\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x38/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n </TASK>\nModules linked in: ccm 8021q r8153_ecm cdc_ether usbnet r8152 mii dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc uinput rfcomm cmac algif_hash rtw89_8922ae(O) algif_skcipher rtw89_8922a(O) af_alg rtw89_pci(O) rtw89_core(O) btusb(O) snd_soc_sst_bxt_da7219_max98357a btbcm(O) snd_soc_hdac_hdmi btintel(O) snd_soc_intel_hda_dsp_common snd_sof_probes btrtl(O) btmtk(O) snd_hda_codec_hdmi snd_soc_dmic uvcvideo videobuf2_vmalloc uvc videobuf2_memops videobuf2_v4l2 videobuf2_common snd_sof_pci_intel_apl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda soundwire_intel soundwire_generic_allocation snd_sof_intel_hda_mlink soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp mac80211 snd_soc_acpi_intel_match snd_soc_acpi snd_sof snd_sof_utils soundwire_bus snd_soc_max98357a snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_da7219 snd_hda_codec snd_hwdep snd_hda_core veth ip6table_nat xt_MASQUERADE xt_cgroup fuse bluetooth ecdh_generic\n cfg80211 ecc\ngsmi: Log Shutdown \n---truncated---"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/dda364c345913fe03ddbe4d5ae14a2754c100296",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ef0d9d2f0dc1133db3d3a1c5167190c6627146b2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43845.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43845.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43845",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.837",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.837",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix bogus checksum computation in udf_rename()\n\nSyzbot reports uninitialized memory access in udf_rename() when updating\nchecksum of '..' directory entry of a moved directory. This is indeed\ntrue as we pass on-stack diriter.fi to the udf_update_tag() and because\nthat has only struct fileIdentDesc included in it and not the impUse or\nname fields, the checksumming function is going to checksum random stack\ncontents beyond the end of the structure. This is actually harmless\nbecause the following udf_fiiter_write_fi() will recompute the checksum\nfrom on-disk buffers where everything is properly included. So all that\nis needed is just removing the bogus calculation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/27ab33854873e6fb958cb074681a0107cc2ecc4c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/40d7b3ed52449d36143bab8d3e70926aa61a60f4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43846.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43846.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43846",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.900",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.900",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib: objagg: Fix general protection fault\n\nThe library supports aggregation of objects into other objects only if\nthe parent object does not have a parent itself. That is, nesting is not\nsupported.\n\nAggregation happens in two cases: Without and with hints, where hints\nare a pre-computed recommendation on how to aggregate the provided\nobjects.\n\nNesting is not possible in the first case due to a check that prevents\nit, but in the second case there is no check because the assumption is\nthat nesting cannot happen when creating objects based on hints. The\nviolation of this assumption leads to various warnings and eventually to\na general protection fault [1].\n\nBefore fixing the root cause, error out when nesting happens and warn.\n\n[1]\ngeneral protection fault, probably for non-canonical address 0xdead000000000d90: 0000 [#1] PREEMPT SMP PTI\nCPU: 1 PID: 1083 Comm: kworker/1:9 Tainted: G W 6.9.0-rc6-custom-gd9b4f1cca7fb #7\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_entry_add+0x256/0x3c0\n mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0\n mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270\n mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1936fa05a180834c3b52e0439a6bddc07814d3eb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/499f742fed42e74f1321f4b12ca196a66a2b49fc",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5adc61d29bbb461d7f7c2b48dceaa90ecd182eb7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b4a3a89fffcdf09702b1f161b914e52abca1894d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43847.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43847.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43847",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:09.963",
|
||||||
|
"lastModified": "2024-08-17T10:15:09.963",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix invalid memory access while processing fragmented packets\n\nThe monitor ring and the reo reinject ring share the same ring mask index.\nWhen the driver receives an interrupt for the reo reinject ring, the\nmonitor ring is also processed, leading to invalid memory access. Since\nmonitor support is not yet enabled in ath12k, the ring mask for the monitor\nring should be removed.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/073f9f249eecd64ab9d59c91c4a23cfdcc02afe4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/36fc66a7d9ca3e5c6eac25362cac63f83df8bed6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8126f82dab7bd8b2e04799342b19fff0a1fd8575",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43848.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43848.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43848",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.023",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.023",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix TTLM teardown work\n\nThe worker calculates the wrong sdata pointer, so if it ever\nruns, it'll crash. Fix that."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2fe0a605d083b884490ee4de02be071b5b4291b1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9750899410c8478ef043c42029f4f6144c096eac",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43849.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43849.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43849",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.093",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.093",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: pdr: protect locator_addr with the main mutex\n\nIf the service locator server is restarted fast enough, the PDR can\nrewrite locator_addr fields concurrently. Protect them by placing\nmodification of those fields under the main pdr->lock."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/107924c14e3ddd85119ca43c26a4ee1056fa9b84",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3e815626d73e05152a8142f6e44aecc4133e6e08",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/475a77fb3f0e1d527f56c60b79f5879661df5b80",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8543269567e2fb3d976a8255c5e348aed14f98bc",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43850.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43850.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43850",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.157",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.157",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove\n\nThe following warning is seen during bwmon_remove due to refcount\nimbalance, fix this by releasing the OPPs after use.\n\nLogs:\nWARNING: at drivers/opp/core.c:1640 _opp_table_kref_release+0x150/0x158\nHardware name: Qualcomm Technologies, Inc. X1E80100 CRD (DT)\n...\nCall trace:\n_opp_table_kref_release+0x150/0x158\ndev_pm_opp_remove_table+0x100/0x1b4\ndevm_pm_opp_of_table_release+0x10/0x1c\ndevm_action_release+0x14/0x20\ndevres_release_all+0xa4/0x104\ndevice_unbind_cleanup+0x18/0x60\ndevice_release_driver_internal+0x1ec/0x228\ndriver_detach+0x50/0x98\nbus_remove_driver+0x6c/0xbc\ndriver_unregister+0x30/0x60\nplatform_driver_unregister+0x14/0x20\nbwmon_driver_exit+0x18/0x524 [icc_bwmon]\n__arm64_sys_delete_module+0x184/0x264\ninvoke_syscall+0x48/0x118\nel0_svc_common.constprop.0+0xc8/0xe8\ndo_el0_svc+0x20/0x2c\nel0_svc+0x34/0xdc\nel0t_64_sync_handler+0x13c/0x158\nel0t_64_sync+0x190/0x194\n--[ end trace 0000000000000000 ]---"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/24086640ab39396eb1a92d1cb1cd2f31b2677c52",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4100d4d019f8e140be1d4d3a9d8d93c1285f5d1c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/aad41f4c169bcb800ae88123799bdf8cdec3d366",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43851.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43851.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43851",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.230",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.230",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: xilinx: rename cpu_number1 to dummy_cpu_number\n\nThe per cpu variable cpu_number1 is passed to xlnx_event_handler as\nargument \"dev_id\", but it is not used in this function. So drop the\ninitialization of this variable and rename it to dummy_cpu_number.\nThis patch is to fix the following call trace when the kernel option\nCONFIG_DEBUG_ATOMIC_SLEEP is enabled:\n\nBUG: sleeping function called from invalid context at include/linux/sched/mm.h:274\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n preempt_count: 1, expected: 0\n CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53\n Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT)\n Call trace:\n dump_backtrace+0xd0/0xe0\n show_stack+0x18/0x40\n dump_stack_lvl+0x7c/0xa0\n dump_stack+0x18/0x34\n __might_resched+0x10c/0x140\n __might_sleep+0x4c/0xa0\n __kmem_cache_alloc_node+0xf4/0x168\n kmalloc_trace+0x28/0x38\n __request_percpu_irq+0x74/0x138\n xlnx_event_manager_probe+0xf8/0x298\n platform_probe+0x68/0xd8"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43852.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43852.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43852",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.310",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.310",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (ltc2991) re-order conditions to fix off by one bug\n\nLTC2991_T_INT_CH_NR is 4. The st->temp_en[] array has LTC2991_MAX_CHANNEL\n(4) elements. Thus if \"channel\" is equal to LTC2991_T_INT_CH_NR then we\nhave read one element beyond the end of the array. Flip the conditions\naround so that we check if \"channel\" is valid before using it as an array\nindex."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/99bf7c2eccff82760fa23ce967cc67c8c219c6a6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c180311c0a520692e2d0e9ca44dcd6c2ff1b41c4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43853.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43853.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43853",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.383",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.383",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup/cpuset: Prevent UAF in proc_cpuset_show()\n\nAn UAF can happen when /proc/cpuset is read as reported in [1].\n\nThis can be reproduced by the following methods:\n1.add an mdelay(1000) before acquiring the cgroup_lock In the\n cgroup_path_ns function.\n2.$cat /proc/<pid>/cpuset repeatly.\n3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/\n$umount /sys/fs/cgroup/cpuset/ repeatly.\n\nThe race that cause this bug can be shown as below:\n\n(umount)\t\t|\t(cat /proc/<pid>/cpuset)\ncss_release\t\t|\tproc_cpuset_show\ncss_release_work_fn\t|\tcss = task_get_css(tsk, cpuset_cgrp_id);\ncss_free_rwork_fn\t|\tcgroup_path_ns(css->cgroup, ...);\ncgroup_destroy_root\t|\tmutex_lock(&cgroup_mutex);\nrebind_subsystems\t|\ncgroup_free_root \t|\n\t\t\t|\t// cgrp was freed, UAF\n\t\t\t|\tcgroup_path_ns_locked(cgrp,..);\n\nWhen the cpuset is initialized, the root node top_cpuset.css.cgrp\nwill point to &cgrp_dfl_root.cgrp. In cgroup v1, the mount operation will\nallocate cgroup_root, and top_cpuset.css.cgrp will point to the allocated\n&cgroup_root.cgrp. When the umount operation is executed,\ntop_cpuset.css.cgrp will be rebound to &cgrp_dfl_root.cgrp.\n\nThe problem is that when rebinding to cgrp_dfl_root, there are cases\nwhere the cgroup_root allocated by setting up the root for cgroup v1\nis cached. This could lead to a Use-After-Free (UAF) if it is\nsubsequently freed. The descendant cgroups of cgroup v1 can only be\nfreed after the css is released. However, the css of the root will never\nbe released, yet the cgroup_root should be freed when it is unmounted.\nThis means that obtaining a reference to the css of the root does\nnot guarantee that css.cgrp->root will not be freed.\n\nFix this problem by using rcu_read_lock in proc_cpuset_show().\nAs cgroup_root is kfree_rcu after commit d23b5c577715\n(\"cgroup: Make operations on the cgroup root_list RCU safe\"),\ncss->cgroup won't be freed during the critical section.\nTo call cgroup_path_ns_locked, css_set_lock is needed, so it is safe to\nreplace task_get_css with task_css.\n\n[1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1be59c97c83ccd67a519d8a49486b3a8a73ca28a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/29a8d4e02fd4840028c38ceb1536cc8f82a257d4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/29ac1d238b3bf126af36037df80d7ecc4822341e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/96226fbed566f3f686f53a489a29846f2d538080",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43854.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43854.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43854",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.447",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.447",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: initialize integrity buffer to zero before writing it to media\n\nMetadata added by bio_integrity_prep is using plain kmalloc, which leads\nto random kernel memory being written media. For PI metadata this is\nlimited to the app tag that isn't used by kernel generated metadata,\nbut for non-PI metadata the entire buffer leaks kernel memory.\n\nFix this by adding the __GFP_ZERO flag to allocations for writes."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43855.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43855.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43855",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.527",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix deadlock between mddev_suspend and flush bio\n\nDeadlock occurs when mddev is being suspended while some flush bio is in\nprogress. It is a complex issue.\n\nT1. the first flush is at the ending stage, it clears 'mddev->flush_bio'\n and tries to submit data, but is blocked because mddev is suspended\n by T4.\nT2. the second flush sets 'mddev->flush_bio', and attempts to queue\n md_submit_flush_data(), which is already running (T1) and won't\n execute again if on the same CPU as T1.\nT3. the third flush inc active_io and tries to flush, but is blocked because\n 'mddev->flush_bio' is not NULL (set by T2).\nT4. mddev_suspend() is called and waits for active_io dec to 0 which is inc\n by T3.\n\n T1\t\tT2\t\tT3\t\tT4\n (flush 1)\t(flush 2)\t(third 3)\t(suspend)\n md_submit_flush_data\n mddev->flush_bio = NULL;\n .\n .\t \tmd_flush_request\n .\t \t mddev->flush_bio = bio\n .\t \t queue submit_flushes\n .\t\t .\n .\t\t .\t\tmd_handle_request\n .\t\t .\t\t active_io + 1\n .\t\t .\t\t md_flush_request\n .\t\t .\t\t wait !mddev->flush_bio\n .\t\t .\n .\t\t .\t\t\t\tmddev_suspend\n .\t\t .\t\t\t\t wait !active_io\n .\t\t .\n .\t\t submit_flushes\n .\t\t queue_work md_submit_flush_data\n .\t\t //md_submit_flush_data is already running (T1)\n .\n md_handle_request\n wait resume\n\nThe root issue is non-atomic inc/dec of active_io during flush process.\nactive_io is dec before md_submit_flush_data is queued, and inc soon\nafter md_submit_flush_data() run.\n md_flush_request\n active_io + 1\n submit_flushes\n active_io - 1\n md_submit_flush_data\n md_handle_request\n active_io + 1\n make_request\n active_io - 1\n\nIf active_io is dec after md_handle_request() instead of within\nsubmit_flushes(), make_request() can be called directly intead of\nmd_handle_request() in md_submit_flush_data(), and active_io will\nonly inc and dec once in the whole flush process. Deadlock will be\nfixed.\n\nAdditionally, the only difference between fixing the issue and before is\nthat there is no return error handling of make_request(). But after\nprevious patch cleaned md_write_start(), make_requst() only return error\nin raid5_make_request() by dm-raid, see commit 41425f96d7aa (\"dm-raid456,\nmd/raid456: fix a deadlock for dm-raid456 while io concurrent with\nreshape)\". Since dm always splits data and flush operation into two\nseparate io, io size of flush submitted by dm always is 0, make_request()\nwill not be called in md_submit_flush_data(). To prevent future\nmodifications from introducing issues, add WARN_ON to ensure\nmake_request() no error is returned in this context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2d0738a8322bf4e5bfe693d16b3111928a9ccfbf",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/32226070813140234b6c507084738e8e8385c5c6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/611d5cbc0b35a752e657a83eebadf40d814d006b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ca963eefbc3331222b6121baa696d49ba2008811",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43856.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43856.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43856",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.613",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.613",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma: fix call order in dmam_free_coherent\n\ndmam_free_coherent() frees a DMA allocation, which makes the\nfreed vaddr available for reuse, then calls devres_destroy()\nto remove and free the data structure used to track the DMA\nallocation. Between the two calls, it is possible for a\nconcurrent task to make an allocation with the same vaddr\nand add it to the devres list.\n\nIf this happens, there will be two entries in the devres list\nwith the same vaddr and devres_destroy() can free the wrong\nentry, triggering the WARN_ON() in dmam_match.\n\nFix by destroying the devres entry before freeing the DMA\nallocation.\n\n kokonut //net/encryption\n http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1fe97f68fce1ba24bf823bfb0eb0956003473130",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/22094f5f52e7bc16c5bf9613365049383650b02e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/28e8b7406d3a1f5329a03aa25a43aa28e087cb20",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f993a4baf6b622232e4c190d34c220179e5d61eb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-438xx/CVE-2024-43857.json
Normal file
25
CVE-2024/CVE-2024-438xx/CVE-2024-43857.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43857",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.687",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.687",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix null reference error when checking end of zone\n\nThis patch fixes a potentially null pointer being accessed by\nis_end_zone_blkaddr() that checks the last block of a zone\nwhen f2fs is mounted as a single device."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/381cbe85592c78fbaeb3e770e3e9f3bfa3e67efb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c82bc1ab2a8a5e73d9728e80c4c2ed87e8921a38",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43858.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43858.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43858",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.750",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.750",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix array-index-out-of-bounds in diFree"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6aa6892a90a5a7fabffe5692ab9f06a7a46c6e42",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8d8f9a477de0d7962342eedf2a599215b7c63d28",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f73f969b2eb39ad8056f6c7f3a295fa2f85e313a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ff14eadc278663cac69d57d3ca7fb2f394e1f8a7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-438xx/CVE-2024-43859.json
Normal file
29
CVE-2024/CVE-2024-438xx/CVE-2024-43859.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43859",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.817",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.817",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to truncate preallocated blocks in f2fs_file_open()\n\nchenyuwen reports a f2fs bug as below:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000011\n fscrypt_set_bio_crypt_ctx+0x78/0x1e8\n f2fs_grab_read_bio+0x78/0x208\n f2fs_submit_page_read+0x44/0x154\n f2fs_get_read_data_page+0x288/0x5f4\n f2fs_get_lock_data_page+0x60/0x190\n truncate_partial_data_page+0x108/0x4fc\n f2fs_do_truncate_blocks+0x344/0x5f0\n f2fs_truncate_blocks+0x6c/0x134\n f2fs_truncate+0xd8/0x200\n f2fs_iget+0x20c/0x5ac\n do_garbage_collect+0x5d0/0xf6c\n f2fs_gc+0x22c/0x6a4\n f2fs_disable_checkpoint+0xc8/0x310\n f2fs_fill_super+0x14bc/0x1764\n mount_bdev+0x1b4/0x21c\n f2fs_mount+0x20/0x30\n legacy_get_tree+0x50/0xbc\n vfs_get_tree+0x5c/0x1b0\n do_new_mount+0x298/0x4cc\n path_mount+0x33c/0x5fc\n __arm64_sys_mount+0xcc/0x15c\n invoke_syscall+0x60/0x150\n el0_svc_common+0xb8/0xf8\n do_el0_svc+0x28/0xa0\n el0_svc+0x24/0x84\n el0t_64_sync_handler+0x88/0xec\n\nIt is because inode.i_crypt_info is not initialized during below path:\n- mount\n - f2fs_fill_super\n - f2fs_disable_checkpoint\n - f2fs_gc\n - f2fs_iget\n - f2fs_truncate\n\nSo, let's relocate truncation of preallocated blocks to f2fs_file_open(),\nafter fscrypt_file_open()."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/298b1e4182d657c3e388adcc29477904e9600ed5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3ba0ae885215b325605ff7ebf6de12ac2adf204d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f44a25a8bfe0c15d33244539696cd9119cf44d18",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-438xx/CVE-2024-43860.json
Normal file
33
CVE-2024/CVE-2024-438xx/CVE-2024-43860.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43860",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-08-17T10:15:10.887",
|
||||||
|
"lastModified": "2024-08-17T10:15:10.887",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: imx_rproc: Skip over memory region when node value is NULL\n\nIn imx_rproc_addr_init() \"nph = of_count_phandle_with_args()\" just counts\nnumber of phandles. But phandles may be empty. So of_parse_phandle() in\nthe parsing loop (0 < a < nph) may return NULL which is later dereferenced.\nAdjust this issue by adding NULL-return check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[Fixed title to fit within the prescribed 70-75 charcters]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2fa26ca8b786888673689ccc9da6094150939982",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9a17cf8b2ce483fa75258bc2cdcf628f24bcf5f8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c877a5f5268d4ab8224b9c9fbce3d746e4e72bc9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-7709",
|
"id": "CVE-2024-7709",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-08-13T01:24:10.067",
|
"published": "2024-08-13T01:24:10.067",
|
||||||
"lastModified": "2024-08-13T12:58:25.437",
|
"lastModified": "2024-08-17T10:15:10.957",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, has been found in OcoMon 4.0. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component."
|
"value": "A vulnerability, which was classified as problematic, has been found in OcoMon 4.0RC1/4.0/5.0RC1. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad fue encontrada en OcoMon 4.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /includes/common/require_access_recovery.php del componente URL Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 4.0.1 y 5.0 puede solucionar este problema. Se recomienda actualizar el componente afectado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
60
README.md
60
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-17T10:00:17.181953+00:00
|
2024-08-17T12:00:17.056689+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-17T09:15:12.040000+00:00
|
2024-08-17T10:15:10.957000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,45 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
260334
|
260383
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `77`
|
Recently added CVEs: `49`
|
||||||
|
|
||||||
- [CVE-2024-42299](CVE-2024/CVE-2024-422xx/CVE-2024-42299.json) (`2024-08-17T09:15:10.293`)
|
- [CVE-2024-43836](CVE-2024/CVE-2024-438xx/CVE-2024-43836.json) (`2024-08-17T10:15:09.250`)
|
||||||
- [CVE-2024-42300](CVE-2024/CVE-2024-423xx/CVE-2024-42300.json) (`2024-08-17T09:15:10.360`)
|
- [CVE-2024-43837](CVE-2024/CVE-2024-438xx/CVE-2024-43837.json) (`2024-08-17T10:15:09.320`)
|
||||||
- [CVE-2024-42301](CVE-2024/CVE-2024-423xx/CVE-2024-42301.json) (`2024-08-17T09:15:10.423`)
|
- [CVE-2024-43838](CVE-2024/CVE-2024-438xx/CVE-2024-43838.json) (`2024-08-17T10:15:09.390`)
|
||||||
- [CVE-2024-42302](CVE-2024/CVE-2024-423xx/CVE-2024-42302.json) (`2024-08-17T09:15:10.487`)
|
- [CVE-2024-43839](CVE-2024/CVE-2024-438xx/CVE-2024-43839.json) (`2024-08-17T10:15:09.447`)
|
||||||
- [CVE-2024-42303](CVE-2024/CVE-2024-423xx/CVE-2024-42303.json) (`2024-08-17T09:15:10.560`)
|
- [CVE-2024-43840](CVE-2024/CVE-2024-438xx/CVE-2024-43840.json) (`2024-08-17T10:15:09.517`)
|
||||||
- [CVE-2024-42304](CVE-2024/CVE-2024-423xx/CVE-2024-42304.json) (`2024-08-17T09:15:10.617`)
|
- [CVE-2024-43841](CVE-2024/CVE-2024-438xx/CVE-2024-43841.json) (`2024-08-17T10:15:09.580`)
|
||||||
- [CVE-2024-42305](CVE-2024/CVE-2024-423xx/CVE-2024-42305.json) (`2024-08-17T09:15:10.690`)
|
- [CVE-2024-43842](CVE-2024/CVE-2024-438xx/CVE-2024-43842.json) (`2024-08-17T10:15:09.647`)
|
||||||
- [CVE-2024-42306](CVE-2024/CVE-2024-423xx/CVE-2024-42306.json) (`2024-08-17T09:15:10.777`)
|
- [CVE-2024-43843](CVE-2024/CVE-2024-438xx/CVE-2024-43843.json) (`2024-08-17T10:15:09.707`)
|
||||||
- [CVE-2024-42307](CVE-2024/CVE-2024-423xx/CVE-2024-42307.json) (`2024-08-17T09:15:10.843`)
|
- [CVE-2024-43844](CVE-2024/CVE-2024-438xx/CVE-2024-43844.json) (`2024-08-17T10:15:09.763`)
|
||||||
- [CVE-2024-42308](CVE-2024/CVE-2024-423xx/CVE-2024-42308.json) (`2024-08-17T09:15:10.920`)
|
- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2024-08-17T10:15:09.837`)
|
||||||
- [CVE-2024-42309](CVE-2024/CVE-2024-423xx/CVE-2024-42309.json) (`2024-08-17T09:15:10.987`)
|
- [CVE-2024-43846](CVE-2024/CVE-2024-438xx/CVE-2024-43846.json) (`2024-08-17T10:15:09.900`)
|
||||||
- [CVE-2024-42310](CVE-2024/CVE-2024-423xx/CVE-2024-42310.json) (`2024-08-17T09:15:11.067`)
|
- [CVE-2024-43847](CVE-2024/CVE-2024-438xx/CVE-2024-43847.json) (`2024-08-17T10:15:09.963`)
|
||||||
- [CVE-2024-42311](CVE-2024/CVE-2024-423xx/CVE-2024-42311.json) (`2024-08-17T09:15:11.147`)
|
- [CVE-2024-43848](CVE-2024/CVE-2024-438xx/CVE-2024-43848.json) (`2024-08-17T10:15:10.023`)
|
||||||
- [CVE-2024-42312](CVE-2024/CVE-2024-423xx/CVE-2024-42312.json) (`2024-08-17T09:15:11.240`)
|
- [CVE-2024-43849](CVE-2024/CVE-2024-438xx/CVE-2024-43849.json) (`2024-08-17T10:15:10.093`)
|
||||||
- [CVE-2024-42313](CVE-2024/CVE-2024-423xx/CVE-2024-42313.json) (`2024-08-17T09:15:11.320`)
|
- [CVE-2024-43850](CVE-2024/CVE-2024-438xx/CVE-2024-43850.json) (`2024-08-17T10:15:10.157`)
|
||||||
- [CVE-2024-42314](CVE-2024/CVE-2024-423xx/CVE-2024-42314.json) (`2024-08-17T09:15:11.397`)
|
- [CVE-2024-43851](CVE-2024/CVE-2024-438xx/CVE-2024-43851.json) (`2024-08-17T10:15:10.230`)
|
||||||
- [CVE-2024-42315](CVE-2024/CVE-2024-423xx/CVE-2024-42315.json) (`2024-08-17T09:15:11.470`)
|
- [CVE-2024-43852](CVE-2024/CVE-2024-438xx/CVE-2024-43852.json) (`2024-08-17T10:15:10.310`)
|
||||||
- [CVE-2024-42316](CVE-2024/CVE-2024-423xx/CVE-2024-42316.json) (`2024-08-17T09:15:11.547`)
|
- [CVE-2024-43853](CVE-2024/CVE-2024-438xx/CVE-2024-43853.json) (`2024-08-17T10:15:10.383`)
|
||||||
- [CVE-2024-42317](CVE-2024/CVE-2024-423xx/CVE-2024-42317.json) (`2024-08-17T09:15:11.633`)
|
- [CVE-2024-43854](CVE-2024/CVE-2024-438xx/CVE-2024-43854.json) (`2024-08-17T10:15:10.447`)
|
||||||
- [CVE-2024-42318](CVE-2024/CVE-2024-423xx/CVE-2024-42318.json) (`2024-08-17T09:15:11.700`)
|
- [CVE-2024-43855](CVE-2024/CVE-2024-438xx/CVE-2024-43855.json) (`2024-08-17T10:15:10.527`)
|
||||||
- [CVE-2024-42319](CVE-2024/CVE-2024-423xx/CVE-2024-42319.json) (`2024-08-17T09:15:11.767`)
|
- [CVE-2024-43856](CVE-2024/CVE-2024-438xx/CVE-2024-43856.json) (`2024-08-17T10:15:10.613`)
|
||||||
- [CVE-2024-42320](CVE-2024/CVE-2024-423xx/CVE-2024-42320.json) (`2024-08-17T09:15:11.833`)
|
- [CVE-2024-43857](CVE-2024/CVE-2024-438xx/CVE-2024-43857.json) (`2024-08-17T10:15:10.687`)
|
||||||
- [CVE-2024-42321](CVE-2024/CVE-2024-423xx/CVE-2024-42321.json) (`2024-08-17T09:15:11.917`)
|
- [CVE-2024-43858](CVE-2024/CVE-2024-438xx/CVE-2024-43858.json) (`2024-08-17T10:15:10.750`)
|
||||||
- [CVE-2024-42322](CVE-2024/CVE-2024-423xx/CVE-2024-42322.json) (`2024-08-17T09:15:11.977`)
|
- [CVE-2024-43859](CVE-2024/CVE-2024-438xx/CVE-2024-43859.json) (`2024-08-17T10:15:10.817`)
|
||||||
- [CVE-2024-7887](CVE-2024/CVE-2024-78xx/CVE-2024-7887.json) (`2024-08-17T09:15:12.040`)
|
- [CVE-2024-43860](CVE-2024/CVE-2024-438xx/CVE-2024-43860.json) (`2024-08-17T10:15:10.887`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-7886](CVE-2024/CVE-2024-78xx/CVE-2024-7886.json) (`2024-08-17T08:15:06.513`)
|
- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-17T10:15:10.957`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
207
_state.csv
207
_state.csv
@ -189105,7 +189105,7 @@ CVE-2022-1747,0,0,bafa5286a3494dd30b7fb882a00a0054ddc541eda9b16acbd255fa32e7fc8f
|
|||||||
CVE-2022-1748,0,0,9df97bde137dc4b46943a8a2305876d3589d355a4d2ec5d1e31f1fe75fadeeb2,2022-08-19T12:37:30.193000
|
CVE-2022-1748,0,0,9df97bde137dc4b46943a8a2305876d3589d355a4d2ec5d1e31f1fe75fadeeb2,2022-08-19T12:37:30.193000
|
||||||
CVE-2022-1749,0,0,bfca574a5bbc687200f1987d319d8606072dc3b1402f9c5cc06797de211631ac,2023-11-07T03:42:10.207000
|
CVE-2022-1749,0,0,bfca574a5bbc687200f1987d319d8606072dc3b1402f9c5cc06797de211631ac,2023-11-07T03:42:10.207000
|
||||||
CVE-2022-1750,0,0,a5e78d8fa2a4d9c9c15997691e2d6c3667c16a2ee8307fec39636869ba5accf8,2023-11-07T03:42:10.540000
|
CVE-2022-1750,0,0,a5e78d8fa2a4d9c9c15997691e2d6c3667c16a2ee8307fec39636869ba5accf8,2023-11-07T03:42:10.540000
|
||||||
CVE-2022-1751,1,1,3642c4fdacf9f230954d9ecb0d483398e87eda189a254c834273e48ea2abf997,2024-08-17T08:15:04.550000
|
CVE-2022-1751,0,0,3642c4fdacf9f230954d9ecb0d483398e87eda189a254c834273e48ea2abf997,2024-08-17T08:15:04.550000
|
||||||
CVE-2022-1752,0,0,c1d4b1bf0b200c4638ed25476cfe447e56a911a0358f47319a64769b57af5634,2022-05-26T16:07:43.420000
|
CVE-2022-1752,0,0,c1d4b1bf0b200c4638ed25476cfe447e56a911a0358f47319a64769b57af5634,2022-05-26T16:07:43.420000
|
||||||
CVE-2022-1753,0,0,83f18625c58eecde33f31db42ee2da387e9c1833fcc4a41c80cbe2db87654e6f,2022-05-25T18:05:02.210000
|
CVE-2022-1753,0,0,83f18625c58eecde33f31db42ee2da387e9c1833fcc4a41c80cbe2db87654e6f,2022-05-25T18:05:02.210000
|
||||||
CVE-2022-1754,0,0,b0ee839b017669398cf5ba5687a0b4b5b3dabcc1aa650bf8ad667f3206f68d83,2022-05-26T20:05:28.413000
|
CVE-2022-1754,0,0,b0ee839b017669398cf5ba5687a0b4b5b3dabcc1aa650bf8ad667f3206f68d83,2022-05-26T20:05:28.413000
|
||||||
@ -209855,7 +209855,7 @@ CVE-2022-45307,0,0,1c75b856042ed58ad1e0059604b1883fb7c284f3053ac7cc7a7a9ea393bac
|
|||||||
CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf59,2023-11-07T03:58:05.790000
|
CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf59,2023-11-07T03:58:05.790000
|
||||||
CVE-2022-45313,0,0,3bc77202e6a5789fac1103ba04dc8e1d47e78007a411f1344f4c97c4f82a8ed5,2023-02-03T19:54:40.713000
|
CVE-2022-45313,0,0,3bc77202e6a5789fac1103ba04dc8e1d47e78007a411f1344f4c97c4f82a8ed5,2023-02-03T19:54:40.713000
|
||||||
CVE-2022-45315,0,0,5b18cc99d9bdb1a2d4416fc75b91be9bf28bf95462a2044db270d8987fb0873f,2023-02-03T19:49:04.590000
|
CVE-2022-45315,0,0,5b18cc99d9bdb1a2d4416fc75b91be9bf28bf95462a2044db270d8987fb0873f,2023-02-03T19:49:04.590000
|
||||||
CVE-2022-4532,1,1,8a5dc9364560ee810be99cfb1ef41c8797558d05308dcfcb4ab01e15c6aef512,2024-08-17T08:15:04.887000
|
CVE-2022-4532,0,0,8a5dc9364560ee810be99cfb1ef41c8797558d05308dcfcb4ab01e15c6aef512,2024-08-17T08:15:04.887000
|
||||||
CVE-2022-45320,0,0,86332dd85b2cfbe963629398e0cf08bee0d12d85c646f1ab6ad9a2add7bda84e,2024-02-20T19:50:53.960000
|
CVE-2022-45320,0,0,86332dd85b2cfbe963629398e0cf08bee0d12d85c646f1ab6ad9a2add7bda84e,2024-02-20T19:50:53.960000
|
||||||
CVE-2022-45326,0,0,fe6a2e80df3508e3c963b0fb62f4bbda18000e14d7327c7cdf358306d46dda13,2022-12-08T16:34:51.260000
|
CVE-2022-45326,0,0,fe6a2e80df3508e3c963b0fb62f4bbda18000e14d7327c7cdf358306d46dda13,2022-12-08T16:34:51.260000
|
||||||
CVE-2022-45328,0,0,ba18c1e472ebe99fbb3cd9ab39fc2adf0e31fdeca86523f982b6d9dc58b6709e,2022-12-01T23:22:07.887000
|
CVE-2022-45328,0,0,ba18c1e472ebe99fbb3cd9ab39fc2adf0e31fdeca86523f982b6d9dc58b6709e,2022-12-01T23:22:07.887000
|
||||||
@ -213126,6 +213126,7 @@ CVE-2023-0710,0,0,fc71262cd59137de875ae82ba05b70e7c9c7d27b31d5606d1c76af7f52c08a
|
|||||||
CVE-2023-0711,0,0,a1418739382d7bde17b9c9d179327f4aa3dff8c1044468876d9de991d4aa25d3,2023-11-07T04:01:17.437000
|
CVE-2023-0711,0,0,a1418739382d7bde17b9c9d179327f4aa3dff8c1044468876d9de991d4aa25d3,2023-11-07T04:01:17.437000
|
||||||
CVE-2023-0712,0,0,326358a288151c3f5e0a92abd950742a03362ea426f1858b5445a7480f85c9cc,2023-11-07T04:01:17.660000
|
CVE-2023-0712,0,0,326358a288151c3f5e0a92abd950742a03362ea426f1858b5445a7480f85c9cc,2023-11-07T04:01:17.660000
|
||||||
CVE-2023-0713,0,0,76011df7b45740b9aa65706ee2efca0fafdc58b68b4839ae7abd5622a9348933,2023-11-07T04:01:17.897000
|
CVE-2023-0713,0,0,76011df7b45740b9aa65706ee2efca0fafdc58b68b4839ae7abd5622a9348933,2023-11-07T04:01:17.897000
|
||||||
|
CVE-2023-0714,1,1,551aa239844338fda71d69646d07517989015b21a62b2ae233789abeea4ef108,2024-08-17T10:15:06.147000
|
||||||
CVE-2023-0715,0,0,87b3681cf19880c423fe67be6ed53ae14cb7c713a5bdc9dfb13cf15619bc2184,2023-11-07T04:01:18.133000
|
CVE-2023-0715,0,0,87b3681cf19880c423fe67be6ed53ae14cb7c713a5bdc9dfb13cf15619bc2184,2023-11-07T04:01:18.133000
|
||||||
CVE-2023-0716,0,0,cc8df86f4a9bc60a687b2a96322af3b2df284fdfb3abaadc3de286c09c4e027b,2023-11-07T04:01:18.370000
|
CVE-2023-0716,0,0,cc8df86f4a9bc60a687b2a96322af3b2df284fdfb3abaadc3de286c09c4e027b,2023-11-07T04:01:18.370000
|
||||||
CVE-2023-0717,0,0,32ac51a487ccfcb6f3e12a577bdc42d2bd2fa6fea0e302d9d445c5bd2122ecb2,2023-11-07T04:01:18.610000
|
CVE-2023-0717,0,0,32ac51a487ccfcb6f3e12a577bdc42d2bd2fa6fea0e302d9d445c5bd2122ecb2,2023-11-07T04:01:18.610000
|
||||||
@ -213965,7 +213966,7 @@ CVE-2023-1598,0,0,1c1495006b9de8d8864ccf44820f14678e8ea7082f6a8ea6a9d5f0c0420b6b
|
|||||||
CVE-2023-1601,0,0,a197800a04fa354c0ee69bef1506beb9a7e709637011ceb8dd0f1bac1ab0a423,2023-11-07T04:04:16.583000
|
CVE-2023-1601,0,0,a197800a04fa354c0ee69bef1506beb9a7e709637011ceb8dd0f1bac1ab0a423,2023-11-07T04:04:16.583000
|
||||||
CVE-2023-1602,0,0,35d5c875de0e847f783b4dac031f79ad871a25cc2a7489b6adfd241e7d96116a,2023-11-07T04:04:16.930000
|
CVE-2023-1602,0,0,35d5c875de0e847f783b4dac031f79ad871a25cc2a7489b6adfd241e7d96116a,2023-11-07T04:04:16.930000
|
||||||
CVE-2023-1603,0,0,860914cd50b94eabebc47267e522646fa6003b85e7f22e7d16e0c36504552693,2023-11-07T04:04:17.163000
|
CVE-2023-1603,0,0,860914cd50b94eabebc47267e522646fa6003b85e7f22e7d16e0c36504552693,2023-11-07T04:04:17.163000
|
||||||
CVE-2023-1604,1,1,ba5bc2d70af7ab43c8833efaf44fa8d8a0a5d0c2e162e00ef5140c37d9d5b02a,2024-08-17T08:15:05.090000
|
CVE-2023-1604,0,0,ba5bc2d70af7ab43c8833efaf44fa8d8a0a5d0c2e162e00ef5140c37d9d5b02a,2024-08-17T08:15:05.090000
|
||||||
CVE-2023-1605,0,0,fcabbf26d7d0db52d0fea03cd81a7a98aae03e1d6c097c4b09729112bb17664e,2023-03-27T16:50:07.540000
|
CVE-2023-1605,0,0,fcabbf26d7d0db52d0fea03cd81a7a98aae03e1d6c097c4b09729112bb17664e,2023-03-27T16:50:07.540000
|
||||||
CVE-2023-1606,0,0,08cb7b9f327706ea0640fb1221365f0d147eb32d7717bd66c995078783bda3c1,2024-05-17T02:18:16.250000
|
CVE-2023-1606,0,0,08cb7b9f327706ea0640fb1221365f0d147eb32d7717bd66c995078783bda3c1,2024-05-17T02:18:16.250000
|
||||||
CVE-2023-1607,0,0,59f745dd897c89e58b1dedbcff50f3f34e22bee430e0febee2dd4e5fc60a0277,2024-05-17T02:18:16.363000
|
CVE-2023-1607,0,0,59f745dd897c89e58b1dedbcff50f3f34e22bee430e0febee2dd4e5fc60a0277,2024-05-17T02:18:16.363000
|
||||||
@ -225624,13 +225625,13 @@ CVE-2023-34062,0,0,23b49789fc99b3a90b878fc2a221bb655e99729acf0498141299a72aa3181
|
|||||||
CVE-2023-34063,0,0,55378ce49286eef30c7d0762b56a47accf9196242e001218a247dcbbe7e05de1,2024-01-25T16:22:30.063000
|
CVE-2023-34063,0,0,55378ce49286eef30c7d0762b56a47accf9196242e001218a247dcbbe7e05de1,2024-01-25T16:22:30.063000
|
||||||
CVE-2023-34064,0,0,5b6c84fd5a5a707691a7e0cb119196e47beb8273bb23711df2a51e8c4ede8def,2023-12-18T19:05:13.560000
|
CVE-2023-34064,0,0,5b6c84fd5a5a707691a7e0cb119196e47beb8273bb23711df2a51e8c4ede8def,2023-12-18T19:05:13.560000
|
||||||
CVE-2023-3407,0,0,b5091992742ffd4758915d15e1f052386dc245324095cd354c58e1b245c224cf,2023-11-07T04:18:42.190000
|
CVE-2023-3407,0,0,b5091992742ffd4758915d15e1f052386dc245324095cd354c58e1b245c224cf,2023-11-07T04:18:42.190000
|
||||||
CVE-2023-3408,1,1,4fc929ef50eee37ca505237cf85d52b3a46a06be9ca3187fd3ae6ebebfed5918,2024-08-17T09:15:06.420000
|
CVE-2023-3408,0,0,4fc929ef50eee37ca505237cf85d52b3a46a06be9ca3187fd3ae6ebebfed5918,2024-08-17T09:15:06.420000
|
||||||
CVE-2023-34085,0,0,4e0176862f189b8d490f4d6c14a6b06edcc5baa987c2f3186a032bc064db85ed,2023-10-31T15:19:06.623000
|
CVE-2023-34085,0,0,4e0176862f189b8d490f4d6c14a6b06edcc5baa987c2f3186a032bc064db85ed,2023-10-31T15:19:06.623000
|
||||||
CVE-2023-34086,0,0,ec127660c3a844fcef85225c3eae626eb02d80fcfbdd431c26f7186a78f71420,2023-11-07T04:15:28.970000
|
CVE-2023-34086,0,0,ec127660c3a844fcef85225c3eae626eb02d80fcfbdd431c26f7186a78f71420,2023-11-07T04:15:28.970000
|
||||||
CVE-2023-34087,0,0,0ca98264eaef85d7f16152b63bbd2190ff8c963e93456841deb385dec094b37a,2024-04-09T21:15:08.193000
|
CVE-2023-34087,0,0,0ca98264eaef85d7f16152b63bbd2190ff8c963e93456841deb385dec094b37a,2024-04-09T21:15:08.193000
|
||||||
CVE-2023-34088,0,0,e217740624213412291e8ac16471601a9f39dd697bee5fbd775e7b63b4996bd9,2023-06-08T01:43:01.050000
|
CVE-2023-34088,0,0,e217740624213412291e8ac16471601a9f39dd697bee5fbd775e7b63b4996bd9,2023-06-08T01:43:01.050000
|
||||||
CVE-2023-34089,0,0,bb90c4ff565553929058a6c5d3453cebb2203658fb65d87b16cfbc3b147e5742,2023-07-21T17:16:36.897000
|
CVE-2023-34089,0,0,bb90c4ff565553929058a6c5d3453cebb2203658fb65d87b16cfbc3b147e5742,2023-07-21T17:16:36.897000
|
||||||
CVE-2023-3409,1,1,fe60141c2cef9525439914676ba1d39c115698bc95ff67b08de0b6c3fe21b026,2024-08-17T09:15:06.790000
|
CVE-2023-3409,0,0,fe60141c2cef9525439914676ba1d39c115698bc95ff67b08de0b6c3fe21b026,2024-08-17T09:15:06.790000
|
||||||
CVE-2023-34090,0,0,a2430aade141392f0badee6d281f985c924ab8b206219174f295370c4f4b1a3b,2023-07-19T00:48:21.297000
|
CVE-2023-34090,0,0,a2430aade141392f0badee6d281f985c924ab8b206219174f295370c4f4b1a3b,2023-07-19T00:48:21.297000
|
||||||
CVE-2023-34091,0,0,73ec0ea051fb6a07d0405c6820aa8326f900a365b7eca85fbc1bcbd6ae439dfa,2023-06-09T15:18:11.957000
|
CVE-2023-34091,0,0,73ec0ea051fb6a07d0405c6820aa8326f900a365b7eca85fbc1bcbd6ae439dfa,2023-06-09T15:18:11.957000
|
||||||
CVE-2023-34092,0,0,dd10739e5ec1356dbe9482fe7bdd14e2f8714713fd2b99d968003fbee92af197,2023-06-09T16:03:07.037000
|
CVE-2023-34092,0,0,dd10739e5ec1356dbe9482fe7bdd14e2f8714713fd2b99d968003fbee92af197,2023-06-09T16:03:07.037000
|
||||||
@ -225705,6 +225706,7 @@ CVE-2023-34156,0,0,361646aa2d04d92372e5aa6931a49ce3d3814ed937de7aaff12f079256ecf
|
|||||||
CVE-2023-34157,0,0,ab458927849880eb23789db52be81ff28caf418ea577f8736ce905cdee85466f,2023-06-26T17:49:44.913000
|
CVE-2023-34157,0,0,ab458927849880eb23789db52be81ff28caf418ea577f8736ce905cdee85466f,2023-06-26T17:49:44.913000
|
||||||
CVE-2023-34158,0,0,c0a5e458697586fc87ea0037b8f6f271f0edc7fef2b7943c112445c664e9570b,2023-06-27T17:24:46.150000
|
CVE-2023-34158,0,0,c0a5e458697586fc87ea0037b8f6f271f0edc7fef2b7943c112445c664e9570b,2023-06-27T17:24:46.150000
|
||||||
CVE-2023-34159,0,0,8d2bf204f1093ed7eac20086a13d400716b7a9ca563d675cbe580ada05b2fa4b,2023-06-27T16:49:25.560000
|
CVE-2023-34159,0,0,8d2bf204f1093ed7eac20086a13d400716b7a9ca563d675cbe580ada05b2fa4b,2023-06-27T16:49:25.560000
|
||||||
|
CVE-2023-3416,1,1,a3bd3a668483907efdea9fde549d80ae7ae20df5efac45387aa556a884f7d943,2024-08-17T10:15:07.383000
|
||||||
CVE-2023-34160,0,0,f0dabd8ffaaef9cb2a392e8d9d50d048d123b7df9381d127e4f0daa9399f88a5,2023-06-27T17:21:54.847000
|
CVE-2023-34160,0,0,f0dabd8ffaaef9cb2a392e8d9d50d048d123b7df9381d127e4f0daa9399f88a5,2023-06-27T17:21:54.847000
|
||||||
CVE-2023-34161,0,0,bc639bd85fda2e5e706fe2f81ab64e96b1f2f278bc55b5164ae8fbd82548868a,2023-06-27T17:20:04.787000
|
CVE-2023-34161,0,0,bc639bd85fda2e5e706fe2f81ab64e96b1f2f278bc55b5164ae8fbd82548868a,2023-06-27T17:20:04.787000
|
||||||
CVE-2023-34162,0,0,803b91ebebd8206aae17131735891a538f8782a4a9257d2bdf1741148cc0d55d,2023-06-27T17:19:36.387000
|
CVE-2023-34162,0,0,803b91ebebd8206aae17131735891a538f8782a4a9257d2bdf1741148cc0d55d,2023-06-27T17:19:36.387000
|
||||||
@ -225737,6 +225739,7 @@ CVE-2023-34186,0,0,c601dee59d899685f4dac19bfea3727b06f03a27cdd0c5191a1823bf6439e
|
|||||||
CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000
|
CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000
|
||||||
CVE-2023-34188,0,0,01175c77514202c3e82378761747d0f87086971fab1640482ef765cb32978b91,2023-09-06T17:15:50.190000
|
CVE-2023-34188,0,0,01175c77514202c3e82378761747d0f87086971fab1640482ef765cb32978b91,2023-09-06T17:15:50.190000
|
||||||
CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000
|
CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000
|
||||||
|
CVE-2023-3419,1,1,28807846078f456e3e07430f3b06a53eb65ef5d18e352a6cfdaad50dc2e5820c,2024-08-17T10:15:07.633000
|
||||||
CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000
|
CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000
|
||||||
CVE-2023-34193,0,0,c5d535d9495369da6279fcf3fb8da0f00647a74dd484c1b255c3ebe7c8f6a0c4,2023-07-12T23:13:27.507000
|
CVE-2023-34193,0,0,c5d535d9495369da6279fcf3fb8da0f00647a74dd484c1b255c3ebe7c8f6a0c4,2023-07-12T23:13:27.507000
|
||||||
CVE-2023-34194,0,0,1a3c07999d3a36c510bbde6565d2311ece29330ff7105b560648c31e8d154314,2024-01-12T03:15:08.950000
|
CVE-2023-34194,0,0,1a3c07999d3a36c510bbde6565d2311ece29330ff7105b560648c31e8d154314,2024-01-12T03:15:08.950000
|
||||||
@ -230218,8 +230221,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55
|
|||||||
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
|
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
|
||||||
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
|
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
|
||||||
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
|
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
|
||||||
CVE-2023-4024,1,1,912bbccc5244809995024289db84e273cd4afeb7f397de3e5b516d55f33342d6,2024-08-17T08:15:05.300000
|
CVE-2023-4024,0,0,912bbccc5244809995024289db84e273cd4afeb7f397de3e5b516d55f33342d6,2024-08-17T08:15:05.300000
|
||||||
CVE-2023-4025,1,1,7e495539bd25b758a259169ea68d03d93ad27eefca23ed46ea52af496ccd4e4b,2024-08-17T08:15:05.500000
|
CVE-2023-4025,0,0,7e495539bd25b758a259169ea68d03d93ad27eefca23ed46ea52af496ccd4e4b,2024-08-17T08:15:05.500000
|
||||||
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
|
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
|
||||||
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
|
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
|
||||||
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
|
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
|
||||||
@ -230235,7 +230238,7 @@ CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6
|
|||||||
CVE-2023-40265,0,0,b59c543cc5b09af03e01ed9b9f3f9838d7903e246783bb57b9f4b1acf6f0f4cf,2024-02-15T16:00:56.367000
|
CVE-2023-40265,0,0,b59c543cc5b09af03e01ed9b9f3f9838d7903e246783bb57b9f4b1acf6f0f4cf,2024-02-15T16:00:56.367000
|
||||||
CVE-2023-40266,0,0,8a54bbbbfd159b9c6bdc998a626464ca6764bb6d908665f4cc16e35354912fcf,2024-02-15T16:00:49.647000
|
CVE-2023-40266,0,0,8a54bbbbfd159b9c6bdc998a626464ca6764bb6d908665f4cc16e35354912fcf,2024-02-15T16:00:49.647000
|
||||||
CVE-2023-40267,0,0,56572919214891c41bf23bf9a2a8facbc146568509a54758466f00ffb956e391,2023-11-07T04:20:10.150000
|
CVE-2023-40267,0,0,56572919214891c41bf23bf9a2a8facbc146568509a54758466f00ffb956e391,2023-11-07T04:20:10.150000
|
||||||
CVE-2023-4027,1,1,15c8039e0b5d6c36339a154f67558f2b5434eb3555dc0e0d25ec93bba01be00e,2024-08-17T08:15:05.703000
|
CVE-2023-4027,0,0,15c8039e0b5d6c36339a154f67558f2b5434eb3555dc0e0d25ec93bba01be00e,2024-08-17T08:15:05.703000
|
||||||
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
|
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
|
||||||
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
|
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
|
||||||
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
|
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
|
||||||
@ -233564,7 +233567,7 @@ CVE-2023-45066,0,0,d6c4e8b6c8b2e1bac7675016363e8e25d32bbad9b32534c2d6249ff3f0045
|
|||||||
CVE-2023-45067,0,0,5d97623a4100b7d0e00752e506f64a139ac52192a9ab8be70afcd683faf209d7,2023-10-25T17:22:34.010000
|
CVE-2023-45067,0,0,5d97623a4100b7d0e00752e506f64a139ac52192a9ab8be70afcd683faf209d7,2023-10-25T17:22:34.010000
|
||||||
CVE-2023-45068,0,0,bcde9760ebbda802f167ff6cedb2179d52cc93c258a8b4b45024759955a2268a,2023-10-16T12:56:22.313000
|
CVE-2023-45068,0,0,bcde9760ebbda802f167ff6cedb2179d52cc93c258a8b4b45024759955a2268a,2023-10-16T12:56:22.313000
|
||||||
CVE-2023-45069,0,0,a9eec7499abdfdee457d527a01b8e3c6debfeb291c7b43b4330189f834e6b3d4,2023-11-10T04:17:41.553000
|
CVE-2023-45069,0,0,a9eec7499abdfdee457d527a01b8e3c6debfeb291c7b43b4330189f834e6b3d4,2023-11-10T04:17:41.553000
|
||||||
CVE-2023-4507,1,1,026f0edfbc2392f92f37d3e57639c97280f64d3116977baabe6bb573304d359b,2024-08-17T08:15:05.893000
|
CVE-2023-4507,0,0,026f0edfbc2392f92f37d3e57639c97280f64d3116977baabe6bb573304d359b,2024-08-17T08:15:05.893000
|
||||||
CVE-2023-45070,0,0,c26ffa13be35d248c0e1832b2ac48bd698fc60d0353f1948516d8c16750dfc46,2023-10-25T13:41:05.087000
|
CVE-2023-45070,0,0,c26ffa13be35d248c0e1832b2ac48bd698fc60d0353f1948516d8c16750dfc46,2023-10-25T13:41:05.087000
|
||||||
CVE-2023-45071,0,0,88b8b2e754e5c29013e26508076b4e0110f2b03ad3733108b49fa5d3fa273501,2023-10-25T13:42:31.590000
|
CVE-2023-45071,0,0,88b8b2e754e5c29013e26508076b4e0110f2b03ad3733108b49fa5d3fa273501,2023-10-25T13:42:31.590000
|
||||||
CVE-2023-45072,0,0,d85032bde0e818aa28bd2a89dc434e6e9612bce975bfeacc171a30489f46d888,2023-10-25T01:23:28.640000
|
CVE-2023-45072,0,0,d85032bde0e818aa28bd2a89dc434e6e9612bce975bfeacc171a30489f46d888,2023-10-25T01:23:28.640000
|
||||||
@ -234250,7 +234253,7 @@ CVE-2023-46025,0,0,41c174447714a4adb49a251a1012506fc8ddf50176de8ae93c1dda84fa29e
|
|||||||
CVE-2023-46026,0,0,a40cd6f903cb53931660e7a3b944a815a6c3a2359ce9e5488db5b9e6d7bc85b7,2023-11-17T15:32:51.837000
|
CVE-2023-46026,0,0,a40cd6f903cb53931660e7a3b944a815a6c3a2359ce9e5488db5b9e6d7bc85b7,2023-11-17T15:32:51.837000
|
||||||
CVE-2023-4603,0,0,711972d0a23c9679b02e58cf615df1197d91a4f3021cf35a6ee55d6bb877b797,2023-11-17T16:21:24.260000
|
CVE-2023-4603,0,0,711972d0a23c9679b02e58cf615df1197d91a4f3021cf35a6ee55d6bb877b797,2023-11-17T16:21:24.260000
|
||||||
CVE-2023-46033,0,0,5b5fba7bfee847846705992b6896ce0ec26ea7d61c2e5359fa01e63798570ffe,2024-08-02T21:15:48.740000
|
CVE-2023-46033,0,0,5b5fba7bfee847846705992b6896ce0ec26ea7d61c2e5359fa01e63798570ffe,2024-08-02T21:15:48.740000
|
||||||
CVE-2023-4604,1,1,49d2ab72d043ffb4b4bb8c184399734eb3208095a0b512e0cbc29b3659337220,2024-08-17T08:15:06.097000
|
CVE-2023-4604,0,0,49d2ab72d043ffb4b4bb8c184399734eb3208095a0b512e0cbc29b3659337220,2024-08-17T08:15:06.097000
|
||||||
CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979ce0,2023-11-08T02:48:09.133000
|
CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979ce0,2023-11-08T02:48:09.133000
|
||||||
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
|
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
|
||||||
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
|
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
|
||||||
@ -235211,7 +235214,7 @@ CVE-2023-4728,0,0,462f401991468f894d0ec4a55630279e56d89f6ab848290fc983d738d901ca
|
|||||||
CVE-2023-47282,0,0,8665c3cbb25e2795a74c32b46946c120e821aa6fc7cfe00e8166e449e7fb5d1d,2024-07-03T01:42:12.093000
|
CVE-2023-47282,0,0,8665c3cbb25e2795a74c32b46946c120e821aa6fc7cfe00e8166e449e7fb5d1d,2024-07-03T01:42:12.093000
|
||||||
CVE-2023-47283,0,0,8db33bd11e918a07400e84b7b8d4eb29512b9346b66d81374c1d9c48b021c95c,2023-11-22T00:05:40.857000
|
CVE-2023-47283,0,0,8db33bd11e918a07400e84b7b8d4eb29512b9346b66d81374c1d9c48b021c95c,2023-11-22T00:05:40.857000
|
||||||
CVE-2023-4729,0,0,6ea560d336752c6a04e22c43ae51e76f83f631c9a0c6e119a81fe0f814550aec,2024-03-12T12:40:13.500000
|
CVE-2023-4729,0,0,6ea560d336752c6a04e22c43ae51e76f83f631c9a0c6e119a81fe0f814550aec,2024-03-12T12:40:13.500000
|
||||||
CVE-2023-4730,1,1,5b22eee600e1196346e82136c45b29b4e2a8c56375b99f3649309a40ebb372c6,2024-08-17T08:15:06.297000
|
CVE-2023-4730,0,0,5b22eee600e1196346e82136c45b29b4e2a8c56375b99f3649309a40ebb372c6,2024-08-17T08:15:06.297000
|
||||||
CVE-2023-47304,0,0,7848b55d0144c33568c97dc80f5c6967de2ed56ebb7cdf7fe68e2642598f4b46,2023-12-11T15:37:02.707000
|
CVE-2023-47304,0,0,7848b55d0144c33568c97dc80f5c6967de2ed56ebb7cdf7fe68e2642598f4b46,2023-12-11T15:37:02.707000
|
||||||
CVE-2023-47307,0,0,45911642a90c07b4ace6c9592e45e015565cd3054a32b54567e4fcec790f171e,2023-12-06T19:29:24.250000
|
CVE-2023-47307,0,0,45911642a90c07b4ace6c9592e45e015565cd3054a32b54567e4fcec790f171e,2023-12-06T19:29:24.250000
|
||||||
CVE-2023-47308,0,0,2f7dabe660f1d813c209edd4a0cfe31a0e73c2c17800b142f9e36486554777f5,2023-11-21T20:14:36.287000
|
CVE-2023-47308,0,0,2f7dabe660f1d813c209edd4a0cfe31a0e73c2c17800b142f9e36486554777f5,2023-11-21T20:14:36.287000
|
||||||
@ -239190,7 +239193,7 @@ CVE-2023-52885,0,0,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028a
|
|||||||
CVE-2023-52886,0,0,99e5616b05810a67fbbeb83e14605ae0bcc6396fe4a66dbd84bd39d8703d92a9,2024-07-16T13:43:58.773000
|
CVE-2023-52886,0,0,99e5616b05810a67fbbeb83e14605ae0bcc6396fe4a66dbd84bd39d8703d92a9,2024-07-16T13:43:58.773000
|
||||||
CVE-2023-52887,0,0,cb846ee4e76e369153e430accd03bef53983c1edb90492817231cbcbd98213a5,2024-07-29T16:21:52.517000
|
CVE-2023-52887,0,0,cb846ee4e76e369153e430accd03bef53983c1edb90492817231cbcbd98213a5,2024-07-29T16:21:52.517000
|
||||||
CVE-2023-52888,0,0,22b49aaad0de331d634875ed02b1dd2b64a739107c93a24ad94d1777a415da3c,2024-07-30T13:32:45.943000
|
CVE-2023-52888,0,0,22b49aaad0de331d634875ed02b1dd2b64a739107c93a24ad94d1777a415da3c,2024-07-30T13:32:45.943000
|
||||||
CVE-2023-52889,1,1,5d6c18d586e6df43ef899dd1c5adbf46ef96a9f11376607f17b11a6f20fa0296,2024-08-17T09:15:07.073000
|
CVE-2023-52889,0,0,5d6c18d586e6df43ef899dd1c5adbf46ef96a9f11376607f17b11a6f20fa0296,2024-08-17T09:15:07.073000
|
||||||
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
|
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
|
||||||
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
|
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
|
||||||
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
|
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
|
||||||
@ -239398,7 +239401,7 @@ CVE-2023-5498,0,0,ad10fd66ccdd65635c75e985037f078ef3abfd75d4e4f042e85904be3e1d36
|
|||||||
CVE-2023-5499,0,0,bc341529426b6bc0e9dd12cb79263ad7ba410642a228bc2a5635c1016503a909,2023-12-19T15:15:08.913000
|
CVE-2023-5499,0,0,bc341529426b6bc0e9dd12cb79263ad7ba410642a228bc2a5635c1016503a909,2023-12-19T15:15:08.913000
|
||||||
CVE-2023-5500,0,0,94d18d2c438bc7177f3d4dc59e8c52f930e35fe60adbbcb8e5df69fdd4993e21,2023-12-13T21:54:04.667000
|
CVE-2023-5500,0,0,94d18d2c438bc7177f3d4dc59e8c52f930e35fe60adbbcb8e5df69fdd4993e21,2023-12-13T21:54:04.667000
|
||||||
CVE-2023-5504,0,0,feb7d66a85276af03391d4cde881608a47e60f620e15c602708788efc6d92bd9,2024-01-17T19:50:57.557000
|
CVE-2023-5504,0,0,feb7d66a85276af03391d4cde881608a47e60f620e15c602708788efc6d92bd9,2024-01-17T19:50:57.557000
|
||||||
CVE-2023-5505,1,1,6aadc935eea2f1d913f57c5c118a73e68b2ccabe08e6ec87293c78971a640132,2024-08-17T09:15:07.160000
|
CVE-2023-5505,0,0,6aadc935eea2f1d913f57c5c118a73e68b2ccabe08e6ec87293c78971a640132,2024-08-17T09:15:07.160000
|
||||||
CVE-2023-5506,0,0,4a819ffee45ee7d761f4f48a0852d93918b97febe8e9988a52dc77f7e084536b,2023-11-14T18:29:39.297000
|
CVE-2023-5506,0,0,4a819ffee45ee7d761f4f48a0852d93918b97febe8e9988a52dc77f7e084536b,2023-11-14T18:29:39.297000
|
||||||
CVE-2023-5507,0,0,babac9ce1d7a5676d7781f32fbf531871fe6bb6a58782c9834b6906354d8bfe0,2023-11-14T18:18:29.137000
|
CVE-2023-5507,0,0,babac9ce1d7a5676d7781f32fbf531871fe6bb6a58782c9834b6906354d8bfe0,2023-11-14T18:18:29.137000
|
||||||
CVE-2023-5509,0,0,3887752b6e302dbb0c9b2a6040c35baff21a350d14464ea60fa6849c96153106,2023-11-27T16:32:16.477000
|
CVE-2023-5509,0,0,3887752b6e302dbb0c9b2a6040c35baff21a350d14464ea60fa6849c96153106,2023-11-27T16:32:16.477000
|
||||||
@ -257390,72 +257393,72 @@ CVE-2024-42257,0,0,069b5a4e96675c66db46a639aa141686ff5530ef6ed9e06efaaa21582e67a
|
|||||||
CVE-2024-42258,0,0,6b21eaebf58128d72e1ceab7d48900d2d3972b04dba8579ddc705c6be6f5d3cd,2024-08-14T14:15:27.727000
|
CVE-2024-42258,0,0,6b21eaebf58128d72e1ceab7d48900d2d3972b04dba8579ddc705c6be6f5d3cd,2024-08-14T14:15:27.727000
|
||||||
CVE-2024-42259,0,0,debbaed414f8f2e41e1c8075db51ba3b2e7b695cbdeba23af0eae9f006b4978d,2024-08-14T17:49:14.177000
|
CVE-2024-42259,0,0,debbaed414f8f2e41e1c8075db51ba3b2e7b695cbdeba23af0eae9f006b4978d,2024-08-14T17:49:14.177000
|
||||||
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
|
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-42260,1,1,73f522d23dbdcca67e55822b4ddcaecdb9a15be9ee9fb8c9a0fe4cea11fc7479,2024-08-17T09:15:07.530000
|
CVE-2024-42260,0,0,73f522d23dbdcca67e55822b4ddcaecdb9a15be9ee9fb8c9a0fe4cea11fc7479,2024-08-17T09:15:07.530000
|
||||||
CVE-2024-42261,1,1,84eb54991e951744c7546079f154425cc157a758e4ad9896f52c4c0296206b88,2024-08-17T09:15:07.600000
|
CVE-2024-42261,0,0,84eb54991e951744c7546079f154425cc157a758e4ad9896f52c4c0296206b88,2024-08-17T09:15:07.600000
|
||||||
CVE-2024-42262,1,1,c2e991f6609c1428331d9dccc2427bcf37cc0f5e5b3ed48bd378da854ed470f1,2024-08-17T09:15:07.680000
|
CVE-2024-42262,0,0,c2e991f6609c1428331d9dccc2427bcf37cc0f5e5b3ed48bd378da854ed470f1,2024-08-17T09:15:07.680000
|
||||||
CVE-2024-42263,1,1,bd2d4eca23c48e156fe97677265b9301805d915a25c735074312544b8a5a62a4,2024-08-17T09:15:07.770000
|
CVE-2024-42263,0,0,bd2d4eca23c48e156fe97677265b9301805d915a25c735074312544b8a5a62a4,2024-08-17T09:15:07.770000
|
||||||
CVE-2024-42264,1,1,ce72590bac8bce7457173889c516ee25e198e0613bb147064cb9d823926080e7,2024-08-17T09:15:07.833000
|
CVE-2024-42264,0,0,ce72590bac8bce7457173889c516ee25e198e0613bb147064cb9d823926080e7,2024-08-17T09:15:07.833000
|
||||||
CVE-2024-42265,1,1,8af87326b074966552f906089f526f16ad590ba021a007e4f640ebf883ff27b7,2024-08-17T09:15:07.893000
|
CVE-2024-42265,0,0,8af87326b074966552f906089f526f16ad590ba021a007e4f640ebf883ff27b7,2024-08-17T09:15:07.893000
|
||||||
CVE-2024-42266,1,1,d61d42f269653f06f2361a8350edc5d5d331091fe409b4adf27fae0ce0dc1d8e,2024-08-17T09:15:07.967000
|
CVE-2024-42266,0,0,d61d42f269653f06f2361a8350edc5d5d331091fe409b4adf27fae0ce0dc1d8e,2024-08-17T09:15:07.967000
|
||||||
CVE-2024-42267,1,1,0118fd436e83017a104cb2f7d6d383bad0811ab7726cf2f98219be461dc95a54,2024-08-17T09:15:08.047000
|
CVE-2024-42267,0,0,0118fd436e83017a104cb2f7d6d383bad0811ab7726cf2f98219be461dc95a54,2024-08-17T09:15:08.047000
|
||||||
CVE-2024-42268,1,1,d6ae5dd64b2de5cc7f455d5034e466dc8505d96d494dcd486640a03aaa2284be,2024-08-17T09:15:08.110000
|
CVE-2024-42268,0,0,d6ae5dd64b2de5cc7f455d5034e466dc8505d96d494dcd486640a03aaa2284be,2024-08-17T09:15:08.110000
|
||||||
CVE-2024-42269,1,1,aa6d90f7055a4711f4f645be991d62940f39076ac222eff8111647e6f8eba2f6,2024-08-17T09:15:08.177000
|
CVE-2024-42269,0,0,aa6d90f7055a4711f4f645be991d62940f39076ac222eff8111647e6f8eba2f6,2024-08-17T09:15:08.177000
|
||||||
CVE-2024-42270,1,1,b004a02d95603f4f5db8cec8481035e7bb839a6c72b697e15d06b86253656eb6,2024-08-17T09:15:08.240000
|
CVE-2024-42270,0,0,b004a02d95603f4f5db8cec8481035e7bb839a6c72b697e15d06b86253656eb6,2024-08-17T09:15:08.240000
|
||||||
CVE-2024-42271,1,1,5e295fab6d48f7784becaed6f364ce2e64f743649565379ff46d82c28b39cf16,2024-08-17T09:15:08.307000
|
CVE-2024-42271,0,0,5e295fab6d48f7784becaed6f364ce2e64f743649565379ff46d82c28b39cf16,2024-08-17T09:15:08.307000
|
||||||
CVE-2024-42272,1,1,2d71f1cda00932a077750858c80e5ba0298fbd164dd4e08bd895b5d4df6127c2,2024-08-17T09:15:08.370000
|
CVE-2024-42272,0,0,2d71f1cda00932a077750858c80e5ba0298fbd164dd4e08bd895b5d4df6127c2,2024-08-17T09:15:08.370000
|
||||||
CVE-2024-42273,1,1,f37e34e5d838cd6ef9205e4afd7dee90fc0247b19a493436798ec46b45776708,2024-08-17T09:15:08.450000
|
CVE-2024-42273,0,0,f37e34e5d838cd6ef9205e4afd7dee90fc0247b19a493436798ec46b45776708,2024-08-17T09:15:08.450000
|
||||||
CVE-2024-42274,1,1,627784ce8bef97adbfd0f915145890050616f639c934d877b43a91aae2ab31f4,2024-08-17T09:15:08.530000
|
CVE-2024-42274,0,0,627784ce8bef97adbfd0f915145890050616f639c934d877b43a91aae2ab31f4,2024-08-17T09:15:08.530000
|
||||||
CVE-2024-42275,1,1,75f5a05b52340e053e57018121c2af00a07bcfcba63420816ca8028c07bef433,2024-08-17T09:15:08.613000
|
CVE-2024-42275,0,0,75f5a05b52340e053e57018121c2af00a07bcfcba63420816ca8028c07bef433,2024-08-17T09:15:08.613000
|
||||||
CVE-2024-42276,1,1,b56807d9a944352f096e0ff3d62ef845ab07e327105a39fd2d2afe497353ffe9,2024-08-17T09:15:08.673000
|
CVE-2024-42276,0,0,b56807d9a944352f096e0ff3d62ef845ab07e327105a39fd2d2afe497353ffe9,2024-08-17T09:15:08.673000
|
||||||
CVE-2024-42277,1,1,509d37189b8e8dfcfec05f0b2c2c16b8703614c590a90444e57634a1b18cdd3f,2024-08-17T09:15:08.750000
|
CVE-2024-42277,0,0,509d37189b8e8dfcfec05f0b2c2c16b8703614c590a90444e57634a1b18cdd3f,2024-08-17T09:15:08.750000
|
||||||
CVE-2024-42278,1,1,20462a5cc1e229b3e5a64db8864f0eabd2f75e66fc5ad241eaa710dc54644e77,2024-08-17T09:15:08.813000
|
CVE-2024-42278,0,0,20462a5cc1e229b3e5a64db8864f0eabd2f75e66fc5ad241eaa710dc54644e77,2024-08-17T09:15:08.813000
|
||||||
CVE-2024-42279,1,1,627260882090a97983352e783eb18b0267fd44b4b61e03f75f3207a2ac8cb141,2024-08-17T09:15:08.880000
|
CVE-2024-42279,0,0,627260882090a97983352e783eb18b0267fd44b4b61e03f75f3207a2ac8cb141,2024-08-17T09:15:08.880000
|
||||||
CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000
|
CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-42280,1,1,fb081b55db375844e219a441a6f9e637a4c83fb2dc1e1662a8817e4b4a416e16,2024-08-17T09:15:08.943000
|
CVE-2024-42280,0,0,fb081b55db375844e219a441a6f9e637a4c83fb2dc1e1662a8817e4b4a416e16,2024-08-17T09:15:08.943000
|
||||||
CVE-2024-42281,1,1,3f1834463b1f73311b3f86c7eb6a3f3681b285c619b8368e877777acf1133079,2024-08-17T09:15:09.013000
|
CVE-2024-42281,0,0,3f1834463b1f73311b3f86c7eb6a3f3681b285c619b8368e877777acf1133079,2024-08-17T09:15:09.013000
|
||||||
CVE-2024-42282,1,1,d3e18207026e541167da7f9cb4d58ddeaa2610634212c29909ba0018542ba3b3,2024-08-17T09:15:09.090000
|
CVE-2024-42282,0,0,d3e18207026e541167da7f9cb4d58ddeaa2610634212c29909ba0018542ba3b3,2024-08-17T09:15:09.090000
|
||||||
CVE-2024-42283,1,1,8420d5349de7f90b35fdd45cc90cfc0cb875f19979e8ff6046b276a2ebf16851,2024-08-17T09:15:09.163000
|
CVE-2024-42283,0,0,8420d5349de7f90b35fdd45cc90cfc0cb875f19979e8ff6046b276a2ebf16851,2024-08-17T09:15:09.163000
|
||||||
CVE-2024-42284,1,1,ac70120fbed14301564ee7cf11f849da11d9950191c93a091d29c08f6b8371ad,2024-08-17T09:15:09.233000
|
CVE-2024-42284,0,0,ac70120fbed14301564ee7cf11f849da11d9950191c93a091d29c08f6b8371ad,2024-08-17T09:15:09.233000
|
||||||
CVE-2024-42285,1,1,4d2e48a3b1cdc9586b37313a28c9d907473a59c83bc5b24196b5fd43f8f64478,2024-08-17T09:15:09.300000
|
CVE-2024-42285,0,0,4d2e48a3b1cdc9586b37313a28c9d907473a59c83bc5b24196b5fd43f8f64478,2024-08-17T09:15:09.300000
|
||||||
CVE-2024-42286,1,1,27cb0d7227094adcb6d2c3e5aca7f495fdf1d8bda0b164f4a7544708987ab975,2024-08-17T09:15:09.380000
|
CVE-2024-42286,0,0,27cb0d7227094adcb6d2c3e5aca7f495fdf1d8bda0b164f4a7544708987ab975,2024-08-17T09:15:09.380000
|
||||||
CVE-2024-42287,1,1,ccd7c0096aec893db780ae2dde23cf7d4fcdd63d2c961ecf4082d7e284650d79,2024-08-17T09:15:09.453000
|
CVE-2024-42287,0,0,ccd7c0096aec893db780ae2dde23cf7d4fcdd63d2c961ecf4082d7e284650d79,2024-08-17T09:15:09.453000
|
||||||
CVE-2024-42288,1,1,2369d590786f1e1a363b1b22e641f4f77d76c875c4866ffbcc79b1519e0399b0,2024-08-17T09:15:09.523000
|
CVE-2024-42288,0,0,2369d590786f1e1a363b1b22e641f4f77d76c875c4866ffbcc79b1519e0399b0,2024-08-17T09:15:09.523000
|
||||||
CVE-2024-42289,1,1,a31cbe88442331b3b66183051ce63b71995b90214b3577f2ce33586ffe70c9bd,2024-08-17T09:15:09.590000
|
CVE-2024-42289,0,0,a31cbe88442331b3b66183051ce63b71995b90214b3577f2ce33586ffe70c9bd,2024-08-17T09:15:09.590000
|
||||||
CVE-2024-42290,1,1,7cec3d103ce0e205d6c5136d0c05bdac2e723a051ad8884c2d295589ea377174,2024-08-17T09:15:09.663000
|
CVE-2024-42290,0,0,7cec3d103ce0e205d6c5136d0c05bdac2e723a051ad8884c2d295589ea377174,2024-08-17T09:15:09.663000
|
||||||
CVE-2024-42291,1,1,cdff693a313559c7a1ef3c166e90df7ee5dc33e0cfdd777e35ba9eef436b30ca,2024-08-17T09:15:09.730000
|
CVE-2024-42291,0,0,cdff693a313559c7a1ef3c166e90df7ee5dc33e0cfdd777e35ba9eef436b30ca,2024-08-17T09:15:09.730000
|
||||||
CVE-2024-42292,1,1,b866b13204f5d7613fba45f13be230556ebd4a79f2628a9b9a19142e153753b3,2024-08-17T09:15:09.797000
|
CVE-2024-42292,0,0,b866b13204f5d7613fba45f13be230556ebd4a79f2628a9b9a19142e153753b3,2024-08-17T09:15:09.797000
|
||||||
CVE-2024-42293,1,1,89666f05561fb4eab085548c0385358e8f1fca94df5b4637b0f32593c2e895da,2024-08-17T09:15:09.867000
|
CVE-2024-42293,0,0,89666f05561fb4eab085548c0385358e8f1fca94df5b4637b0f32593c2e895da,2024-08-17T09:15:09.867000
|
||||||
CVE-2024-42294,1,1,bf820bb68924d280988e62607d01ba17c789d99be98efefea25cbe6487cac561,2024-08-17T09:15:09.947000
|
CVE-2024-42294,0,0,bf820bb68924d280988e62607d01ba17c789d99be98efefea25cbe6487cac561,2024-08-17T09:15:09.947000
|
||||||
CVE-2024-42295,1,1,2d7e5ef9ee3e99464b0b934371d4be8cbde8c0c3da7f16f9801be136f74508c6,2024-08-17T09:15:10.017000
|
CVE-2024-42295,0,0,2d7e5ef9ee3e99464b0b934371d4be8cbde8c0c3da7f16f9801be136f74508c6,2024-08-17T09:15:10.017000
|
||||||
CVE-2024-42296,1,1,84c6960327efcccb07f1bf6bacb7ec26afa8632cf2cf3c960970b6205f605cd6,2024-08-17T09:15:10.080000
|
CVE-2024-42296,0,0,84c6960327efcccb07f1bf6bacb7ec26afa8632cf2cf3c960970b6205f605cd6,2024-08-17T09:15:10.080000
|
||||||
CVE-2024-42297,1,1,12be703ca296d72588bb02f8692a9da565897d983365de96e4a54008e98ea684,2024-08-17T09:15:10.147000
|
CVE-2024-42297,0,0,12be703ca296d72588bb02f8692a9da565897d983365de96e4a54008e98ea684,2024-08-17T09:15:10.147000
|
||||||
CVE-2024-42298,1,1,ded811e43bb8f04ba5fea2c3629ad01f651e9a8521c904c8e12ebae0c707e4b7,2024-08-17T09:15:10.230000
|
CVE-2024-42298,0,0,ded811e43bb8f04ba5fea2c3629ad01f651e9a8521c904c8e12ebae0c707e4b7,2024-08-17T09:15:10.230000
|
||||||
CVE-2024-42299,1,1,ed536e5fa9d121aa8af06ecc5d7e0e10041289667cc061e663de14822c0e9dca,2024-08-17T09:15:10.293000
|
CVE-2024-42299,0,0,ed536e5fa9d121aa8af06ecc5d7e0e10041289667cc061e663de14822c0e9dca,2024-08-17T09:15:10.293000
|
||||||
CVE-2024-42300,1,1,981cd21d44a900a9d4d9532f94dbb584ede689307d948265b6f2542825889514,2024-08-17T09:15:10.360000
|
CVE-2024-42300,0,0,981cd21d44a900a9d4d9532f94dbb584ede689307d948265b6f2542825889514,2024-08-17T09:15:10.360000
|
||||||
CVE-2024-42301,1,1,c45e6101f91b5c5dca03e72398ea6b73d41ddf82f9847b6b51fc3d6ebdf90659,2024-08-17T09:15:10.423000
|
CVE-2024-42301,0,0,c45e6101f91b5c5dca03e72398ea6b73d41ddf82f9847b6b51fc3d6ebdf90659,2024-08-17T09:15:10.423000
|
||||||
CVE-2024-42302,1,1,e532e8c3e8dda3d0e84781e761d75d4c35df2a8ffc908a77749e369eb9493da1,2024-08-17T09:15:10.487000
|
CVE-2024-42302,0,0,e532e8c3e8dda3d0e84781e761d75d4c35df2a8ffc908a77749e369eb9493da1,2024-08-17T09:15:10.487000
|
||||||
CVE-2024-42303,1,1,10e707ce6f068abf275f64a2e0ecbd405571726eb6185b3f9c587f385cf21b26,2024-08-17T09:15:10.560000
|
CVE-2024-42303,0,0,10e707ce6f068abf275f64a2e0ecbd405571726eb6185b3f9c587f385cf21b26,2024-08-17T09:15:10.560000
|
||||||
CVE-2024-42304,1,1,8700105115b7c305f110812831ed1e5ce2d435af05679c77649ecdc7573fb83c,2024-08-17T09:15:10.617000
|
CVE-2024-42304,0,0,8700105115b7c305f110812831ed1e5ce2d435af05679c77649ecdc7573fb83c,2024-08-17T09:15:10.617000
|
||||||
CVE-2024-42305,1,1,dd7b912930c35aa06e5c6ce57a0873a4076357cf2f373a3783ebf7db32a79ea8,2024-08-17T09:15:10.690000
|
CVE-2024-42305,0,0,dd7b912930c35aa06e5c6ce57a0873a4076357cf2f373a3783ebf7db32a79ea8,2024-08-17T09:15:10.690000
|
||||||
CVE-2024-42306,1,1,30bba6c0adb6c419151f519bcf4b8b8b6690c8b043af0e11b02f3f8d69e08383,2024-08-17T09:15:10.777000
|
CVE-2024-42306,0,0,30bba6c0adb6c419151f519bcf4b8b8b6690c8b043af0e11b02f3f8d69e08383,2024-08-17T09:15:10.777000
|
||||||
CVE-2024-42307,1,1,8302c270c0bbed1a819acf6e9a3a3ce017d61b4b2956b79e7e869125e590f511,2024-08-17T09:15:10.843000
|
CVE-2024-42307,0,0,8302c270c0bbed1a819acf6e9a3a3ce017d61b4b2956b79e7e869125e590f511,2024-08-17T09:15:10.843000
|
||||||
CVE-2024-42308,1,1,c210dc774967104f361caa0fd7f6a78cec45c59997a83d5e8df3979b1fb2a7d5,2024-08-17T09:15:10.920000
|
CVE-2024-42308,0,0,c210dc774967104f361caa0fd7f6a78cec45c59997a83d5e8df3979b1fb2a7d5,2024-08-17T09:15:10.920000
|
||||||
CVE-2024-42309,1,1,2d04311c183227ce6164b510df346a3c7ecc9516ebf15262d6b107337a78e9c2,2024-08-17T09:15:10.987000
|
CVE-2024-42309,0,0,2d04311c183227ce6164b510df346a3c7ecc9516ebf15262d6b107337a78e9c2,2024-08-17T09:15:10.987000
|
||||||
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
||||||
CVE-2024-42310,1,1,7f26fd9b002a766a958ce05286908216363e789afc98149bbeff55133150bf3e,2024-08-17T09:15:11.067000
|
CVE-2024-42310,0,0,7f26fd9b002a766a958ce05286908216363e789afc98149bbeff55133150bf3e,2024-08-17T09:15:11.067000
|
||||||
CVE-2024-42311,1,1,965c1e5fea705c0a5c9301183e11f9de18f429bdd9ae8c6c56f8a04ff76a5ae5,2024-08-17T09:15:11.147000
|
CVE-2024-42311,0,0,965c1e5fea705c0a5c9301183e11f9de18f429bdd9ae8c6c56f8a04ff76a5ae5,2024-08-17T09:15:11.147000
|
||||||
CVE-2024-42312,1,1,2ff17a1613e17d0871fa7f06705d6979718ece9bb1e138e48661184ef1323525,2024-08-17T09:15:11.240000
|
CVE-2024-42312,0,0,2ff17a1613e17d0871fa7f06705d6979718ece9bb1e138e48661184ef1323525,2024-08-17T09:15:11.240000
|
||||||
CVE-2024-42313,1,1,bdcbdbcc3a1334d752173a66bd0d92dfb80260bf5b0f3fe24e9d3045c279282f,2024-08-17T09:15:11.320000
|
CVE-2024-42313,0,0,bdcbdbcc3a1334d752173a66bd0d92dfb80260bf5b0f3fe24e9d3045c279282f,2024-08-17T09:15:11.320000
|
||||||
CVE-2024-42314,1,1,fae79bc6a62aebb94341bd0a34a4ffafb0c7b9e0b8c9de278d5a78cf72fd6fd5,2024-08-17T09:15:11.397000
|
CVE-2024-42314,0,0,fae79bc6a62aebb94341bd0a34a4ffafb0c7b9e0b8c9de278d5a78cf72fd6fd5,2024-08-17T09:15:11.397000
|
||||||
CVE-2024-42315,1,1,90ee9ee787d775411337eb3e919a718f1333926233a58c375d402d02c9e4c0c9,2024-08-17T09:15:11.470000
|
CVE-2024-42315,0,0,90ee9ee787d775411337eb3e919a718f1333926233a58c375d402d02c9e4c0c9,2024-08-17T09:15:11.470000
|
||||||
CVE-2024-42316,1,1,0316f29b9e5674024065f15a396c2f0f43f9d0fd7a88eb256049471822787f1c,2024-08-17T09:15:11.547000
|
CVE-2024-42316,0,0,0316f29b9e5674024065f15a396c2f0f43f9d0fd7a88eb256049471822787f1c,2024-08-17T09:15:11.547000
|
||||||
CVE-2024-42317,1,1,a165dce7f440276c020fbc7ed30fbfa07302c8b51e501fa3b5401c398a7adb57,2024-08-17T09:15:11.633000
|
CVE-2024-42317,0,0,a165dce7f440276c020fbc7ed30fbfa07302c8b51e501fa3b5401c398a7adb57,2024-08-17T09:15:11.633000
|
||||||
CVE-2024-42318,1,1,b2a3e5b9de93f119a4150d535567f7c4d24651dcf37cdded1eda0f502c4b7b34,2024-08-17T09:15:11.700000
|
CVE-2024-42318,0,0,b2a3e5b9de93f119a4150d535567f7c4d24651dcf37cdded1eda0f502c4b7b34,2024-08-17T09:15:11.700000
|
||||||
CVE-2024-42319,1,1,97b1d3ea5f63680e439731ebd74b0ad556f44f1414e1d4d3c15cefe3c1a3ca43,2024-08-17T09:15:11.767000
|
CVE-2024-42319,0,0,97b1d3ea5f63680e439731ebd74b0ad556f44f1414e1d4d3c15cefe3c1a3ca43,2024-08-17T09:15:11.767000
|
||||||
CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000
|
CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000
|
||||||
CVE-2024-42320,1,1,96d235ed83f196d3f890c63e30dba1ba25169caa48eb2246ebc6d5c788ad4506,2024-08-17T09:15:11.833000
|
CVE-2024-42320,0,0,96d235ed83f196d3f890c63e30dba1ba25169caa48eb2246ebc6d5c788ad4506,2024-08-17T09:15:11.833000
|
||||||
CVE-2024-42321,1,1,a4cefc053d872d76f367405d84e5d117d88eefba44ad2da7dc889be6f7e80764,2024-08-17T09:15:11.917000
|
CVE-2024-42321,0,0,a4cefc053d872d76f367405d84e5d117d88eefba44ad2da7dc889be6f7e80764,2024-08-17T09:15:11.917000
|
||||||
CVE-2024-42322,1,1,24993fd95d508c4b214b4780d56aca3b438fdd58c500bfcc3d1c5efb98797837,2024-08-17T09:15:11.977000
|
CVE-2024-42322,0,0,24993fd95d508c4b214b4780d56aca3b438fdd58c500bfcc3d1c5efb98797837,2024-08-17T09:15:11.977000
|
||||||
CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000
|
CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000
|
||||||
CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000
|
CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000
|
||||||
CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000
|
CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000
|
||||||
@ -257821,11 +257824,57 @@ CVE-2024-43808,0,0,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13e
|
|||||||
CVE-2024-43809,0,0,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
|
CVE-2024-43809,0,0,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
|
||||||
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
|
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
|
||||||
CVE-2024-43810,0,0,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
|
CVE-2024-43810,0,0,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
|
||||||
|
CVE-2024-43815,1,1,5958e611758ec405d6a7d92ed6f6567564a20fe85fea62419dcb3df4272beca7,2024-08-17T10:15:07.870000
|
||||||
|
CVE-2024-43816,1,1,3e0adcf5dc7087bfdd5bac4ce8c268b2e308a1f74ecd22e1efe6dacf09cb795b,2024-08-17T10:15:07.950000
|
||||||
|
CVE-2024-43817,1,1,dfaf882292b8b18d13ab26baed268eeffaa0263b6f6fa383d2834516b6d4b7d3,2024-08-17T10:15:08.010000
|
||||||
|
CVE-2024-43818,1,1,31dea6e0403c1cde69477abea4de848c87c459c99a62de9b3e48224730c923c2,2024-08-17T10:15:08.080000
|
||||||
|
CVE-2024-43819,1,1,40d627814ed160551993bed82f5e84130d38a8141b1ea14e04f82d0a7ace1668,2024-08-17T10:15:08.147000
|
||||||
CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000
|
CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000
|
||||||
|
CVE-2024-43820,1,1,8fdc28f421c8cbb54fa92866ac213af7ef0be38cc9d80d3cb1b5e0eaa0365a60,2024-08-17T10:15:08.207000
|
||||||
|
CVE-2024-43821,1,1,0d6c4b7da0a5aaf1c16e93b0ac761c15279ac7f9f2c50789cc5aed0cb9a6f086,2024-08-17T10:15:08.277000
|
||||||
|
CVE-2024-43822,1,1,d215543ace06d98a50c34bef1221089fbaa58881871aa08fd38112316b9832d2,2024-08-17T10:15:08.340000
|
||||||
|
CVE-2024-43823,1,1,ba48baa3d8332db5d9e0ea3b7e20709e7b28e647b084435ede163d5c026a37fb,2024-08-17T10:15:08.400000
|
||||||
|
CVE-2024-43824,1,1,d2fd4d0dcd31e120fec951bc7b422c9ab2b83a92f06d8f37020cf2fc551ea207,2024-08-17T10:15:08.477000
|
||||||
|
CVE-2024-43825,1,1,45be5249eb053271f384acb23e0a820e4bd499120090bb0674651c6c2a464fcd,2024-08-17T10:15:08.533000
|
||||||
|
CVE-2024-43826,1,1,b7dc63f6a60f3b29f8a86b4069ca26fc269023545dd065822af150a6d938ef81,2024-08-17T10:15:08.593000
|
||||||
|
CVE-2024-43827,1,1,5bba8cb844beec3855d91be66e351c977bb5dd6ea09e17df303914501d7c10cf,2024-08-17T10:15:08.653000
|
||||||
|
CVE-2024-43828,1,1,479675bb96cbe036f5c6166aa991dac626cf1c556941bb740b43e137e0347038,2024-08-17T10:15:08.720000
|
||||||
|
CVE-2024-43829,1,1,f7f269a88e2b6c6b417706e48fcd1e3db063bcabd9737a844ddb8926868f1777,2024-08-17T10:15:08.787000
|
||||||
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
|
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
|
||||||
|
CVE-2024-43830,1,1,9590d85fc6a48941b01755686bcd67a2d855fa5d472ea0a46aadd13a785e9c83,2024-08-17T10:15:08.857000
|
||||||
|
CVE-2024-43831,1,1,a3743c2c205eb8a11aaf0f268517a984f492921d87e9998b3593d3835defc5ae,2024-08-17T10:15:08.917000
|
||||||
|
CVE-2024-43832,1,1,c1d6d2ca6da5878045c7ca147cdde6da7670b690e97e735cddac302e174627cb,2024-08-17T10:15:08.980000
|
||||||
|
CVE-2024-43833,1,1,5877ba9a91d7fb740663a4f997d23eba7a9fb89ad069fd5537422e749e834a99,2024-08-17T10:15:09.040000
|
||||||
|
CVE-2024-43834,1,1,b5a502220ae15106ebf152ebc61402aeb4d4d7bb563fca63219bd0ae37f36e18,2024-08-17T10:15:09.113000
|
||||||
|
CVE-2024-43835,1,1,fb59125e4183c198af97c7f9b3ca9dee26d8ca6bc869971810652bba668380c0,2024-08-17T10:15:09.183000
|
||||||
|
CVE-2024-43836,1,1,d14a67068e9e2e2e7a1794762ff0c1262574ab2d4aa8fa2d8c242ff06c33f64d,2024-08-17T10:15:09.250000
|
||||||
|
CVE-2024-43837,1,1,86c4079e911a1b54d98552a37d0c033ee50a7eb97398191b562c8792915f2336,2024-08-17T10:15:09.320000
|
||||||
|
CVE-2024-43838,1,1,939b82e1e9859006575b6d49abeefa47e2c09f3e6cb3085a86020f3183912a86,2024-08-17T10:15:09.390000
|
||||||
|
CVE-2024-43839,1,1,c4e3a31b2406a764cd75f0bfe93e522b2ea7ff14fcb6d7557c329376dbb81d4d,2024-08-17T10:15:09.447000
|
||||||
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
|
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
|
||||||
|
CVE-2024-43840,1,1,03fd9b8dfbac09a14143993860859fc6545bdd64240be2f208556889fbb1cbae,2024-08-17T10:15:09.517000
|
||||||
|
CVE-2024-43841,1,1,013238980112dbaed3b270e341d116f20287a2b705fb7f3b627fd50c1f1c2aee,2024-08-17T10:15:09.580000
|
||||||
|
CVE-2024-43842,1,1,007b9bcaf653ce329918730fd89468a2b2c59a2d7815db62c10aab61559a1d29,2024-08-17T10:15:09.647000
|
||||||
|
CVE-2024-43843,1,1,47523823371a4d78c13100329a6afb408e131c45ff0fca8712331af66bb8c689,2024-08-17T10:15:09.707000
|
||||||
|
CVE-2024-43844,1,1,1d3d5113926c9ef2ddd54ab8a8d8a055d5fb3270ca5027901dfc7ab6abe3a186,2024-08-17T10:15:09.763000
|
||||||
|
CVE-2024-43845,1,1,acb52478527e75cbf18f204697d48e2be9bc575a93923db51517782d1012305f,2024-08-17T10:15:09.837000
|
||||||
|
CVE-2024-43846,1,1,4a495082195a08e08ad6cce793cf68ed38a87a063b536049de62d0343ff8c089,2024-08-17T10:15:09.900000
|
||||||
|
CVE-2024-43847,1,1,aac0dfd1c3413ef5d79f159437e3cca3508de9988a5f5d42df472265c39a5aed,2024-08-17T10:15:09.963000
|
||||||
|
CVE-2024-43848,1,1,212116d47b7220aeb2e4a642c8b55b4ca0e6100750b1a68da5db676665550522,2024-08-17T10:15:10.023000
|
||||||
|
CVE-2024-43849,1,1,877bc4526a13251a17aa7870cbde492a83740745205a1de57450a68680239561,2024-08-17T10:15:10.093000
|
||||||
CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ecd2,2024-05-16T13:03:05.353000
|
CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ecd2,2024-05-16T13:03:05.353000
|
||||||
|
CVE-2024-43850,1,1,7a2f9699d5445927391bec0628c955389dcfc09fca785f3b70a9f5c416b2b251,2024-08-17T10:15:10.157000
|
||||||
|
CVE-2024-43851,1,1,fcba62b3d70bebd0a060f24f77b51cdefd254c1420b50bb9ba3e8fbeeb2b07f4,2024-08-17T10:15:10.230000
|
||||||
|
CVE-2024-43852,1,1,7042edc62b21263c2c3df8d3649a0cb5260d317e2661baa642df623c19c1ba83,2024-08-17T10:15:10.310000
|
||||||
|
CVE-2024-43853,1,1,01e23a3cef051e9294f0d3be787cd5c13027b1d953b37d0a24b8797d0b3e1746,2024-08-17T10:15:10.383000
|
||||||
|
CVE-2024-43854,1,1,3fccbfa26e688b2c7848c88ab0e6fc2503b92cf32b348d6c59078889698509de,2024-08-17T10:15:10.447000
|
||||||
|
CVE-2024-43855,1,1,af3d5a954c3988b4b8ee6878f8507f2562c34463641f7634739e642094d2f0de,2024-08-17T10:15:10.527000
|
||||||
|
CVE-2024-43856,1,1,542abe02f3a8b96396e92a09d65aa8be350b0e12a4f835f3797b18028e01ef55,2024-08-17T10:15:10.613000
|
||||||
|
CVE-2024-43857,1,1,ba91fda923ebae8d6423ede0c03ebb4b81c7abd1bffff97d1a141c0ef3d4e0cc,2024-08-17T10:15:10.687000
|
||||||
|
CVE-2024-43858,1,1,09a2a2176435bb19ba237969879f68068b2930d6043e14f1c6bebecd29440cd9,2024-08-17T10:15:10.750000
|
||||||
|
CVE-2024-43859,1,1,83bfeca2da8fdb47dd46df68ca4383f413227622da7a471e4b8209f5a070f922,2024-08-17T10:15:10.817000
|
||||||
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
||||||
|
CVE-2024-43860,1,1,b188578049df6cd1b5b75b9af054c1670fdc24d80595d1c5bd181f1a124ad4a4,2024-08-17T10:15:10.887000
|
||||||
CVE-2024-4387,0,0,e174205a853415a731f22788a3c678b3fe9a7067078ee3c331ab7c9e4e787abd,2024-06-11T10:15:13.637000
|
CVE-2024-4387,0,0,e174205a853415a731f22788a3c678b3fe9a7067078ee3c331ab7c9e4e787abd,2024-06-11T10:15:13.637000
|
||||||
CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000
|
CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000
|
||||||
CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000
|
CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000
|
||||||
@ -260274,7 +260323,7 @@ CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c
|
|||||||
CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
|
CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
|
CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
|
CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
|
CVE-2024-7709,0,1,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000
|
||||||
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
|
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
|
||||||
CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000
|
CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000
|
||||||
CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000
|
CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000
|
||||||
@ -260331,5 +260380,5 @@ CVE-2024-7853,0,0,ef852cb5b512c1135859e82139cbfc9c3676d14eb1435795734c924ea925f3
|
|||||||
CVE-2024-7866,0,0,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
|
CVE-2024-7866,0,0,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
|
||||||
CVE-2024-7867,0,0,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
|
CVE-2024-7867,0,0,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
|
||||||
CVE-2024-7868,0,0,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
|
CVE-2024-7868,0,0,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
|
||||||
CVE-2024-7886,0,1,45f54d90a7aa89ae9a274103c6e9a744cb42d24d027ba685f689100664718925,2024-08-17T08:15:06.513000
|
CVE-2024-7886,0,0,45f54d90a7aa89ae9a274103c6e9a744cb42d24d027ba685f689100664718925,2024-08-17T08:15:06.513000
|
||||||
CVE-2024-7887,1,1,0cc8732c4631d2aa1a6367f7c1a5d02dc864e1739975805f280194214c7ebaec,2024-08-17T09:15:12.040000
|
CVE-2024-7887,0,0,0cc8732c4631d2aa1a6367f7c1a5d02dc864e1739975805f280194214c7ebaec,2024-08-17T09:15:12.040000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user