mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-19T14:01:10.133728+00:00
This commit is contained in:
parent
d7a9e2e973
commit
9c199e9877
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4539",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-31T10:15:04.257",
|
||||
"lastModified": "2024-09-03T12:59:02.453",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T13:27:53.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3055548/web-application-firewall/trunk/helper/utility.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.3",
|
||||
"matchCriteriaId": "673D0DED-8B1F-4967-8EEB-B8955B0FFD4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3055548/web-application-firewall/trunk/helper/utility.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1798",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-27T02:15:09.800",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T13:53:02.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -36,10 +36,40 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tutor-lms-migration-tool/trunk/classes/LPtoTutorMigration.php#L762",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cb67f55-6d21-4a4e-9651-fcf671788d16?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeum:tutor_lms_-_migration_tool:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "2CEF8B0D-E778-43C3-B9BB-C2C4DF5A978D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tutor-lms-migration-tool/trunk/classes/LPtoTutorMigration.php#L762",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cb67f55-6d21-4a4e-9651-fcf671788d16?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1804",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-27T02:15:10.060",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T13:57:02.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -36,10 +36,40 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tutor-lms-migration-tool/trunk/classes/LPtoTutorMigration.php#L579",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a49a22e-d54e-461d-83c2-8278494eac13?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeum:tutor_lms_-_migration_tool:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "2CEF8B0D-E778-43C3-B9BB-C2C4DF5A978D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tutor-lms-migration-tool/trunk/classes/LPtoTutorMigration.php#L579",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a49a22e-d54e-461d-83c2-8278494eac13?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20440",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-09-04T17:15:13.517",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T13:42:41.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:smart_license_utility:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF65619C-5372-4141-9919-3A7E13D8D557"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:smart_license_utility:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0FAD450-9306-4ECB-BC8B-7CE19CCC4353"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:smart_license_utility:2.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46259FBD-210E-4DD4-866A-A0F4FF485BC2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38568",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T14:15:16.950",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:24:27.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers/perf: hisi: hns3: corrige el acceso fuera de los l\u00edmites cuando el grupo de eventos es v\u00e1lido. La herramienta perf permite a los usuarios crear grupos de eventos mediante el siguiente cmd [1], pero el controlador no comprueba si el \u00edndice de la matriz est\u00e1 fuera de los l\u00edmites al escribir datos en la matriz event_group. Si el n\u00famero de eventos en un event_group es mayor que HNS3_PMU_MAX_HW_EVENTS, se produce un desbordamiento de escritura en la memoria de la matriz event_group. Agregue la verificaci\u00f3n del \u00edndice de la matriz para corregir la posible infracci\u00f3n de la matriz fuera de los l\u00edmites y regrese directamente cuando se escriban nuevos eventos en los l\u00edmites de la matriz. Hay 9 eventos diferentes en un grupo de eventos. [1] estad\u00edstica de rendimiento -e '{pmu/event1/, ...,pmu/event9/}"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.93",
|
||||
"matchCriteriaId": "ED79E4A4-4141-4FBC-B01D-4EB8ADBA1958"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.12",
|
||||
"matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.3",
|
||||
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38569",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T14:15:17.060",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:23:09.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers/perf: hisi_pcie: corrige el acceso fuera de los l\u00edmites cuando el grupo de eventos es v\u00e1lido. La herramienta perf permite a los usuarios crear grupos de eventos mediante el siguiente cmd [1], pero el controlador no compruebe si el \u00edndice de la matriz est\u00e1 fuera de los l\u00edmites al escribir datos en la matriz event_group. Si el n\u00famero de eventos en un event_group es mayor que HISI_PCIE_MAX_COUNTERS, se produce un desbordamiento de escritura en la memoria de la matriz event_group. Agregue la verificaci\u00f3n del \u00edndice de la matriz para corregir la posible infracci\u00f3n de la matriz fuera de los l\u00edmites y regrese directamente cuando se escriban nuevos eventos en los l\u00edmites de la matriz. Hay 9 eventos diferentes en un grupo de eventos. [1] estad\u00edstica de rendimiento -e '{pmu/event1/, ...,pmu/event9/}'"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d1face00ebb7996842aee4214d7d0fb0c77b1e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/567d34626c22b36579ec0abfdf5eda2949044220",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/77fce82678ea5fd51442e62febec2004f79e041b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e9aab2492178f25372f1820bfd9289fbd74efd0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff48247144d13a3a0817127703724256008efa78",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "6.1.93",
|
||||
"matchCriteriaId": "899D7A4F-A23D-4FA2-84B4-4BAA03F98BBC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.12",
|
||||
"matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.3",
|
||||
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d1face00ebb7996842aee4214d7d0fb0c77b1e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/567d34626c22b36579ec0abfdf5eda2949044220",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/77fce82678ea5fd51442e62febec2004f79e041b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e9aab2492178f25372f1820bfd9289fbd74efd0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff48247144d13a3a0817127703724256008efa78",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38584",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T14:15:18.530",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:19:59.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ti: icssg_prueth: corrige la desreferencia del puntero NULL en prueth_probe() En la funci\u00f3n prueth_probe(), si una de las llamadas a emac_phy_connect() falla debido a que of_phy_connect() devuelve NULL , entonces la llamada posterior a phy_attached_info() eliminar\u00e1 la referencia a un puntero NULL. Verifique el c\u00f3digo de retorno de emac_phy_connect y falle limpiamente si hay un error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e1d5bd7f4682e6925dd960aba2a1aa1d93da53a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5cd17f0e74cb99d209945b9f1f06d411aa667eb1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b0a82ebabbdc4c307f781bb0e5cd617949a3900d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b31c7e78086127a7fcaa761e8d336ee855a920c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "53BC60D9-65A5-4D8F-96C8-149F09214DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.12",
|
||||
"matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.3",
|
||||
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e1d5bd7f4682e6925dd960aba2a1aa1d93da53a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5cd17f0e74cb99d209945b9f1f06d411aa667eb1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b0a82ebabbdc4c307f781bb0e5cd617949a3900d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b31c7e78086127a7fcaa761e8d336ee855a920c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38588",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T14:15:18.907",
|
||||
"lastModified": "2024-07-05T08:15:03.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:19:13.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,124 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ftrace: Solucionar posible problema de use-after-free en ftrace_location() KASAN informa un error: ERROR: KASAN: use-after-free en ftrace_location+0x90/0x120 Lectura de tama\u00f1o 8 en addr ffff888141d40010 por tarea insmod/424 CPU: 8 PID: 424 Comm: insmod Tainted: GW 6.9.0-rc2+ [...] Rastreo de llamadas: dump_stack_lvl+0x68/0xa0 print_report+0xcf/0x610 kasan_report+0xb5/ 0xe0 ftrace_location+0x90/0x120 Register_kprobe+0x14b/0xa40 kprobe_init+0x2d/0xff0 [kprobe_example] do_one_initcall+0x8f/0x2d0 do_init_module+0x13a/0x3c0 load_module+0x3082/0x33d0 init_module_from _file+0xd2/0x130 __x64_sys_finit_module+0x306/0x440 do_syscall_64+0x68/0x140 entrada_SYSCALL_64_after_hwframe +0x71/0x79 La causa principal es que, en lookup_rec(), el registro ftrace de alguna direcci\u00f3n se busca en las p\u00e1ginas ftrace de alg\u00fan m\u00f3dulo, pero esas p\u00e1ginas ftrace al mismo tiempo se liberan en ftrace_release_mod() como lo est\u00e1 el m\u00f3dulo correspondiente. siendo eliminado: CPU1 | CPU2 registro_kprobes() { | eliminar_m\u00f3dulo() { check_kprobe_address_safe() { | arch_check_ftrace_location() { | ftrace_ubicaci\u00f3n() { | lookup_rec() // \u00a1UTILIZAR! | ftrace_release_mod() // \u00a1Gratis! Para solucionar este problema: 1. Mantenga presionado rcu lock mientras accede a las p\u00e1ginas de ftrace en ftrace_location_range(); 2. Utilice ftrace_location_range() en lugar de lookup_rec() en ftrace_location(); 3. Llame a sincronizar_rcu() antes de liberar cualquier p\u00e1gina ftrace tanto en ftrace_process_locs()/ftrace_release_mod()/ftrace_free_mem()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31310e373f4c8c74e029d4326b283e757edabc0b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66df065b3106964e667b37bf8f7e55ec69d0c1f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7b4881da5b19f65709f5c18c1a4d8caa2e496461",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ea8ef5e42173560ac510e92a1cc797ffeea8831",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dbff5f0bfb2416b8b55c105ddbcd4f885e98fada",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e60b613df8b6253def41215402f72986fee3fc8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.7",
|
||||
"versionEndExcluding": "6.1.93",
|
||||
"matchCriteriaId": "40927E07-D355-4FC7-8DC6-C969BC9C7CE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.12",
|
||||
"matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.3",
|
||||
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31310e373f4c8c74e029d4326b283e757edabc0b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66df065b3106964e667b37bf8f7e55ec69d0c1f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7b4881da5b19f65709f5c18c1a4d8caa2e496461",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ea8ef5e42173560ac510e92a1cc797ffeea8831",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dbff5f0bfb2416b8b55c105ddbcd4f885e98fada",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e60b613df8b6253def41215402f72986fee3fc8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38590",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T14:15:19.113",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:18:23.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Modifique el nivel de impresi\u00f3n del error CQE. Demasiada impresi\u00f3n puede provocar p\u00e1nico en el kernel. Cambie ibdev_err() a ibdev_err_ratelimited() y cambie el nivel de impresi\u00f3n del volcado cqe al nivel de depuraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06cf121346bbd3d83a5eea05bb87666c6b279990",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/17f3741c65c4a042ae8ba094068b07a4b77e213c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/349e859952285ab9689779fb46de163f13f18f43",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45b31be4dd22827903df15c548b97b416790139b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f541a89ced8305da459e3ab0006e7528cf7da7b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/817a10a6df9354e67561922d2b7fce48dfbebc55",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc699b7eb2bc963c12ffcd37f80f45330d2924bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.219",
|
||||
"matchCriteriaId": "A3C0D860-7856-4982-83DA-17AFB1195E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.161",
|
||||
"matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.93",
|
||||
"matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.12",
|
||||
"matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.3",
|
||||
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06cf121346bbd3d83a5eea05bb87666c6b279990",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/17f3741c65c4a042ae8ba094068b07a4b77e213c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/349e859952285ab9689779fb46de163f13f18f43",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45b31be4dd22827903df15c548b97b416790139b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f541a89ced8305da459e3ab0006e7528cf7da7b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/817a10a6df9354e67561922d2b7fce48dfbebc55",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc699b7eb2bc963c12ffcd37f80f45330d2924bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40904",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.770",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:17:13.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,174 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: USB: clase: cdc-wdm: soluciona el bloqueo de la CPU causado por mensajes de registro excesivos. El syzbot fuzzer descubri\u00f3 que la devoluci\u00f3n de llamada de finalizaci\u00f3n de interrupci\u00f3n-URB en el controlador cdc-wdm estaba tardando demasiado y el reenv\u00edo inmediato por parte del controlador de las URB de interrupci\u00f3n con estado -EPROTO combinado con la emulaci\u00f3n ficticia-hcd para provocar un bloqueo de la CPU: cdc_wdm 1-1:1.0: estado de urb distinto de cero recibido: -71 cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#0 bloqueada durante 26 segundos! [syz-executor782:6625] CPU#0 Utilizaci\u00f3n cada 4 segundos durante el bloqueo: #1: 98% sistema, 0% softirq, 3% hardirq, 0% inactivo #2: 98% sistema, 0% softirq, 3% hardirq, 0 % inactivo #3: 98% sistema, 0% softirq, 3% hardirq, 0% inactivo #4: 98% sistema, 0% softirq, 3% hardirq, 0% inactivo #5: 98% sistema, 1% softirq, 3 % hardirq, 0% inactivo M\u00f3dulos vinculados en: irq event stamp: 73096 hardirqs habilitado por \u00faltima vez en (73095): [] console_emit_next_record kernel/printk/printk.c:2935 [inline] hardirqs habilitado por \u00faltima vez en (73095): [ ] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994 hardirqs deshabilitado por \u00faltima vez en (73096): [] __el1_irq arch/arm64/kernel/entry-common.c:533 [en l\u00ednea] hardirqs \u00faltimo deshabilitado en (73096): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs habilitado por \u00faltima vez en (73048): [] softirq_handle_end kernel/softirq.c:400 [en l\u00ednea] softirqs habilitados por \u00faltima vez en (73048): [] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582 softirqs deshabilitados por \u00faltima vez en (73043): [] __do_softirq+0x14/0x20 kernel/softirq. c:588 CPU: 0 PID: 6625 Comm: syz-executor782 Contaminado: GW 6.10.0-rc2-syzkaller-g8867bbd4a056 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/04/2024 Las pruebas mostraron que el problema no se produjo si se eliminaron los dos mensajes de error (las dos primeras l\u00edneas anteriores); aparentemente agregar material al registro del kernel lleva una cantidad de tiempo sorprendentemente grande. En cualquier caso, el mejor enfoque para prevenir estos bloqueos y evitar enviar spam al registro con miles de mensajes de error por segundo es limitar la velocidad de las dos llamadas dev_err(). Por eso los reemplazamos con dev_err_ratelimited()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.28",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "379E23C3-E298-4CEF-AEA8-B94BD1CA55BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40905",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.847",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:16:03.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,155 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: corrige posible ejecuci\u00f3n en __fib6_drop_pcpu_from() syzbot encontr\u00f3 una ejecuci\u00f3n en __fib6_drop_pcpu_from() [1] Si el compilador lee m\u00e1s de una vez (*ppcpu_rt), la segunda lectura podr\u00eda leer NULL, si otra CPU borra el valor en rt6_get_pcpu_route(). Agregue un READ_ONCE() para evitar esta ejecuci\u00f3n. Agregue tambi\u00e9n rcu_read_lock()/rcu_read_unlock() porque confiamos en la protecci\u00f3n de RCU al eliminar la referencia a pcpu_rt. [1] Ups: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x0000000000000090-0x0000000000000097] CPU: 0 PID: 7543 Comm: trabajador/ u8:17 No contaminado 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/04/2024 Cola de trabajo: netns cleanup_net RIP: 0010:__fib6_drop_pcpu_from.part.0 +0x10a/0x370 net/ipv6/ip6_fib.c:984 C\u00f3digo: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48 RSP: 0018:ffffc900040df070 EFLAGS: 00010206 X: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16 RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091 RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007 R10: 0000001 R11: 0000000000000006 R12: ffff88807fa080b8 R13: ffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001 FS: 0000000000000000(00 00) GS:ffff8880b9200000(0000) knlGS:0000000000000000CS : 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001B32C26000 CR3: 000000005D56E000 CR4: 00000000003526F0 DR0: 00000000000000000000000000000000000000000000000000000000SET 0000000000FFFE0FF0 DR7: 000000000000000400 TRACE DE LLAMADA: __fib6_drop_pcpu_from net/ipv6/ip6_fib .c:966 [en l\u00ednea] fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [en l\u00ednea] fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038 fib6_del_route net/ipv6/ip6_fib.c:1998 [en l\u00ednea] fib6_del+0xa70 /0x17b0 net/ipv6/ip6_fib.c:2043 fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205 fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127 fib6_walk+0x182/0x370 /ip6_fib. c:2175 fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255 __fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271 rt6_sync_down_dev net/ipv6/route.c:4906 [en l\u00ednea] /0xa00 neto /ipv6/route.c:4911 addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855 addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778 notifier_call_chain+0xb9/0x410 kernel/notifier.c :93 call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992 call_netdevice_notifiers_extack net/core/dev.c:2030 [en l\u00ednea] call_netdevice_notifiers net/core/dev.c:2044 [en l\u00ednea] dev_close_many+0x333/0x6a0 net/core /dev.c:1585 unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193 unregister_netdevice_many net/core/dev.c:11276 [en l\u00ednea] default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759 ops_exit_list+0x 128 /0x180 net/core/net_namespace.c:178 cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640 Process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231 Process_scheduled_works kernel/workqueue.c:3312 [en l\u00ednea] work_thread+ 0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64 .S:244"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/09e5a5a80e205922151136069e440477d6816914",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2498960dac9b6fc49b6d1574f7cd1a4872744adf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e796c3fefa8b17b30e7252886ae8cffacd2b9ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0bc020592b54a8f3fa2b7f244b6e39e526c2e12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b01e1c030770ff3b4fe37fc7cc6bca03f594133f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c693698787660c97950bc1f93a8dd19d8307153d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c90af1cced2f669a7b2304584be4ada495eaa0e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "802905B7-3C3C-4770-AD1D-F0B2C1CE526F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/09e5a5a80e205922151136069e440477d6816914",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2498960dac9b6fc49b6d1574f7cd1a4872744adf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e796c3fefa8b17b30e7252886ae8cffacd2b9ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0bc020592b54a8f3fa2b7f244b6e39e526c2e12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b01e1c030770ff3b4fe37fc7cc6bca03f594133f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c693698787660c97950bc1f93a8dd19d8307153d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c90af1cced2f669a7b2304584be4ada495eaa0e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-463xx/CVE-2024-46382.json
Normal file
21
CVE-2024/CVE-2024-463xx/CVE-2024-46382.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T13:15:04.007",
|
||||
"lastModified": "2024-09-19T13:15:04.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/linlinjava/litemall/issues/552",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46701",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.127",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:40:27.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,90 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: libfs: arregla lecturas de directorio infinitas para el directorio offset Despu\u00e9s de cambiar las operaciones de directorio tmpfs de simple_dir_operations a simple_offset_dir_operations, cada cambio de nombre que se produzca llenar\u00e1 new dentry en el \u00e1rbol de maple del directorio de destino (&SHMEM_I(inode)->dir_offsets->mt) con una clave libre que comienza con octx->newx_offset, y luego establece newx_offset igual a la clave libre + 1. Esto provocar\u00e1 una combinaci\u00f3n de lectura de directorio infinita con el cambio de nombre ocurrido al mismo tiempo, lo que falla generic/736 en xfstests (los detalles se muestran a continuaci\u00f3n). 1. crear 5000 archivos (1 2 3...) bajo un directorio 2. llamar a readdir(man 3 readdir) una vez, y obtener una entrada 3. renombrar(entrada, \"TEMPFILE\"), luego renombrar(\"TEMPFILE\", entrada) 4. repetir 2~3 veces, hasta que readdir no devuelva nada o repetimos demasiadas veces (tmpfs interrumpe la prueba con la segunda condici\u00f3n) Elegimos la misma l\u00f3gica que el commit 9b378f6ad48cf (\"btrfs: arregla lecturas infinitas de directorio\") para arreglarlo, registrar el last_index cuando abrimos el directorio, y no emitir la entrada cuyo \u00edndice >= last_index. El file->private_data que ahora se usa en el directorio de desplazamiento se puede usar directamente para hacer esto, y tambi\u00e9n actualizamos el last_index cuando buscamos el archivo dir. [brauner: solo actualizamos last_index despu\u00e9s de la b\u00fasqueda cuando el desplazamiento es cero como sugiri\u00f3 Jan]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "FC206D9C-CA64-401C-AA0C-3DC0DA769B2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/308b4fc2403b335894592ee9dc212a5e58bb309f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46702",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.217",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:35:58.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: thunderbolt: marcar XDomain como desconectado cuando se quita el enrutador Not\u00e9 que cuando hacemos una actualizaci\u00f3n NVM del enrutador de host discreto y se elimina en caliente del lado PCIe como resultado de la autenticaci\u00f3n del firmware NVM, si hay otro host conectado con rutas habilitadas, nos quedamos sin desmantelarlos. Esto se debe al hecho de que el controlador de red Thunderbolt tambi\u00e9n intenta limpiar las rutas y termina bloqueando en tb_disconnect_xdomain_paths() esperando el bloqueo del dominio. Sin embargo, en este punto ya limpiamos las rutas en tb_stop(), por lo que realmente no hay necesidad de que tb_disconnect_xdomain_paths() haga eso m\u00e1s. Adem\u00e1s, ya verifica si el XDomain est\u00e1 desconectado y se retira temprano, as\u00ed que aproveche eso y marque el XDomain como desconectado cuando eliminemos el enrutador principal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/18b3ad2a3cc877dd4b16f48d84aa27b78d53bf1d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23ce6ba3b95488a2b9e9f6d43b340da0c15395dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/747bc154577de6e6af4bc99abfa859b8419bb4d8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ca24cf9163c112bb6b580c6fb57c04a1f8b76e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80ac8d194831eca0c2f4fd862f7925532fda320c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2006140ad2e01a02ed0aff49cc2ae3ceeb11f8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.225",
|
||||
"matchCriteriaId": "8F0D241D-4DAA-47F2-A87F-FBB28B3DA898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.166",
|
||||
"matchCriteriaId": "913ED6CD-8ACF-48AF-AA18-7880881DD402"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.107",
|
||||
"matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.48",
|
||||
"matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/18b3ad2a3cc877dd4b16f48d84aa27b78d53bf1d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23ce6ba3b95488a2b9e9f6d43b340da0c15395dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/747bc154577de6e6af4bc99abfa859b8419bb4d8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ca24cf9163c112bb6b580c6fb57c04a1f8b76e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80ac8d194831eca0c2f4fd862f7925532fda320c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2006140ad2e01a02ed0aff49cc2ae3ceeb11f8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46703",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.317",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:33:57.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,90 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"serial: 8250_omap: Establecer la consola genpd siempre activada si no hay suspensi\u00f3n de consola\". Esto revierte el commit 68e6939ea9ec3d6579eadeab16060339cdeaf940. Kevin inform\u00f3 que esto provoca un bloqueo durante la suspensi\u00f3n en plataformas que no usan dominios de PM."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0863bffda1131fd2fa9c05b653ad9ee3d8db127e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/321aecb079e9ca8b1af90778068a6fb40f2bf22d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0863bffda1131fd2fa9c05b653ad9ee3d8db127e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/321aecb079e9ca8b1af90778068a6fb40f2bf22d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46704",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.397",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:32:39.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,95 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: workqueue: Fix spruious data race in __flush_work() Al vaciar un elemento de trabajo para su cancelaci\u00f3n, __flush_work() sabe que posee exclusivamente el elemento de trabajo a trav\u00e9s de su bit PENDING. 134874e2eee9 (\"workqueue: Allow cancel_work_sync() and disable_work() from atomic contexts on BH work items\") agreg\u00f3 una lectura de @work->data para determinar si se debe usar la espera activa para los elementos de trabajo de BH que se est\u00e1n cancelando. Si bien la lectura es segura cuando @from_cancel, @work->data se ley\u00f3 antes de probar @from_cancel para simplificar la estructura del c\u00f3digo: data = *work_data_bits(work); if (from_cancel && !WARN_ON_ONCE(data & WORK_STRUCT_PWQ) && (data & WORK_OFFQ_BH)) { Si bien los datos le\u00eddos nunca se usaron si !@from_cancel, esto podr\u00eda activar la detecci\u00f3n de ejecuci\u00f3n de datos de KCSAN de manera espuria: ====================================================================== ERROR: KCSAN: carrera de datos en __flush_work / __flush_work escribe en 0xffff8881223aa3e8 de 8 bytes por la tarea 3998 en la CPU 0: instrument_write include/linux/instrumented.h:41 [en l\u00ednea] ___set_bit include/asm-generic/bitops/instrumented-non-atomic.h:28 [en l\u00ednea] insert_wq_barrier kernel/workqueue.c:3790 [en l\u00ednea] start_flush_work kernel/workqueue.c:4142 [en l\u00ednea] __flush_work+0x30b/0x570 kernel/workqueue.c:4178 flush_work kernel/workqueue.c:4229 [en l\u00ednea] ... le\u00eddo hasta 0xffff8881223aa3e8 de 8 bytes por la tarea 50 en la CPU 1: __flush_work+0x42a/0x570 kernel/workqueue.c:4188 flush_work kernel/workqueue.c:4229 [en l\u00ednea] flush_delayed_work+0x66/0x70 kernel/workqueue.c:4251 ... valor cambiado: 0x0000000000400000 -> 0xffff88810006c00d Reorganice el c\u00f3digo para que @from_cancel se pruebe antes de acceder a @work->data. El \u00fanico problema es que se activa la detecci\u00f3n de KCSAN de manera espuria. Esto no deber\u00eda necesitar READ_ONCE() ni otros calificadores de acceso. No hay cambios funcionales."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8bc35475ef1a23b0e224f3242eb11c76cab0ea88",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/91d09642127a32fde231face2ff489af70eef316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8bc35475ef1a23b0e224f3242eb11c76cab0ea88",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/91d09642127a32fde231face2ff489af70eef316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46705",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.477",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:30:44.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: restablecer asignaciones mmio con devm Establezca nuestras diversas asignaciones mmio en NULL. Esto deber\u00eda facilitar la detecci\u00f3n de algo malicioso que intente alterar mmio despu\u00e9s de la eliminaci\u00f3n del dispositivo. Por ejemplo, podr\u00edamos desasignar todo y luego comenzar a acceder a alguna direcci\u00f3n mmio que ya haya sido desasignada por nosotros y luego reasignada por otra cosa, lo que causar\u00eda todo tipo de desastres."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b1c9fbed3884d3883021d699c7cdf5253a65543a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c7117419784f612d59ee565145f722e8b5541fe6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "F123760A-B6F5-46CB-A1C1-A68641C89E5C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b1c9fbed3884d3883021d699c7cdf5253a65543a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c7117419784f612d59ee565145f722e8b5541fe6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46707",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.643",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:29:46.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,150 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: Hacer que ICC_*SGI*_EL1 no est\u00e9 definido en ausencia de un vGICv3 En un sistema con un GICv3, si un invitado no se ha configurado con GICv3 y el host no es capaz de emular GICv2, una escritura en cualquiera de los registros ICC_*SGI*_EL1 se atrapa en EL2. Por lo tanto, intentamos emular el acceso a SGI, solo para encontrar un puntero NULL ya que no se asigna ninguna interrupci\u00f3n privada (no hay GIC, \u00bfrecuerdas?). La soluci\u00f3n obvia es darle al invitado lo que se merece, en forma de una excepci\u00f3n UNDEF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15818af2f7aa55eff375333cb7689df15d3f24ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2073132f6ed3079369e857a8deb33d11bdd983bc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e6245ebe7ef341639e9a7e402b3ade8ad45a19f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/96b076e8ee5bc3a1126848c8add0f74bd30dc9d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d7629bec5c3f80bd0e3bf8103c06a2f7046bd92",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.225",
|
||||
"matchCriteriaId": "8F0D241D-4DAA-47F2-A87F-FBB28B3DA898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.166",
|
||||
"matchCriteriaId": "913ED6CD-8ACF-48AF-AA18-7880881DD402"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.107",
|
||||
"matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.48",
|
||||
"matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15818af2f7aa55eff375333cb7689df15d3f24ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2073132f6ed3079369e857a8deb33d11bdd983bc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e6245ebe7ef341639e9a7e402b3ade8ad45a19f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/96b076e8ee5bc3a1126848c8add0f74bd30dc9d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d7629bec5c3f80bd0e3bf8103c06a2f7046bd92",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46708",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.717",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:28:49.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: qcom: x1e80100: Corregir desplazamientos de pines especiales Elimine el desplazamiento err\u00f3neo 0x100000 para evitar que las placas fallen en la configuraci\u00f3n del estado del pin, as\u00ed como para que los cambios de estado previstos surtan efecto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0197bf772f657fbdea5e9bdec5eea6e67d82cbde",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3692d95cc4d88114b070ee63cffc976f00f207f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "5A6BBF4B-B639-4CB9-BDD7-AA50ADB06181"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0197bf772f657fbdea5e9bdec5eea6e67d82cbde",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3692d95cc4d88114b070ee63cffc976f00f207f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46709",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.793",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:26:24.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,121 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: Corrige prime con b\u00faferes externos Aseg\u00farate de que el mapeo de b\u00faferes externos pase por la interfaz dma_buf en lugar de intentar acceder a las p\u00e1ginas directamente. Los b\u00faferes externos podr\u00edan no proporcionar acceso directo a p\u00e1ginas legibles/escribibles, as\u00ed que para asegurarse de que los bo creados a partir de dma_bufs externos puedan leerse, se debe usar la interfaz dma_buf. Corrige fallas en kms_prime de IGT con vgem. El uso regular del escritorio no activar\u00e1 esto debido al hecho de que las m\u00e1quinas virtuales no tendr\u00e1n m\u00faltiples GPU, pero permite una mejor cobertura de pruebas en IGT."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50f1199250912568606b3778dc56646c10cb7b04",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c12391ee1ab59cb2f3be3f1f5e6d0fc0c2dc854",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a9716bbbf3dd6b6cbefba3abcc89af8b72631f4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.29",
|
||||
"versionEndExcluding": "6.6.49",
|
||||
"matchCriteriaId": "D4F9B48B-A93A-4A89-852A-89E7C17CC905"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8.8",
|
||||
"versionEndExcluding": "6.9",
|
||||
"matchCriteriaId": "5816FBD4-3F69-480D-B4E4-8F653576EDEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "0BCC4AEF-4876-4CFA-B9D6-F98855E75E74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50f1199250912568606b3778dc56646c10cb7b04",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c12391ee1ab59cb2f3be3f1f5e6d0fc0c2dc854",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a9716bbbf3dd6b6cbefba3abcc89af8b72631f4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46710",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.880",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:14:58.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: evitar la desasignaci\u00f3n de b\u00faferes de lectura activos Las rutas kms mantienen activo un mapa persistente para leer y comparar el b\u00fafer del cursor. Estos mapas pueden competir entre s\u00ed en un escenario simple donde: a) b\u00fafer \"a\" mapeado para actualizaci\u00f3n b) b\u00fafer \"a\" mapeado para comparaci\u00f3n c) hacer la comparaci\u00f3n d) desasignar \"a\" para comparaci\u00f3n e) actualizar el cursor f) desasignar \"a\" para actualizaci\u00f3n En el paso \"e\", el b\u00fafer ha sido desasignado y el contenido de lectura es falso. Evite la desasignaci\u00f3n de b\u00faferes de lectura activos simplemente llevando un recuento de cu\u00e1ntas rutas tienen mapas activos actualmente y desasign\u00e1ndolos solo cuando el recuento llegue a 0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aba07b9a0587f50e5d3346eaa19019cf3f86c0ea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d5228d158e4c0b1663b3983044913c15c3d0135e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.19",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "DA05BB16-4465-46ED-A5AB-5CDE73240EA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aba07b9a0587f50e5d3346eaa19019cf3f86c0ea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d5228d158e4c0b1663b3983044913c15c3d0135e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46711",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:05.953",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:12:30.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,128 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: pm: se corrige el uso de ID 0 endp despu\u00e9s de m\u00faltiples recreaciones. 'local_addr_used' y 'add_addr_accepted' se decrementan para direcciones no relacionadas con el subflujo inicial (ID0), porque las direcciones de origen y destino de los subflujos iniciales se conocen desde el principio: no cuentan como \"direcci\u00f3n local adicional en uso\" o \"ADD_ADDR aceptada\". Luego, se requiere no incrementarlas cuando el punto de entrada utilizado por el subflujo inicial se elimina y se vuelve a agregar durante una conexi\u00f3n. Sin esta modificaci\u00f3n, este punto de entrada no se puede eliminar y volver a agregar m\u00e1s de una vez."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/119806ae4e46cf239db8e6ad92bc2fd3daae86dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53e2173172d26c0617b29dd83618b71664bed1fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9366922adc6a71378ca01f898c41be295309f044",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c9c744666f7308a4daba520191e29d395260bcfe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.109",
|
||||
"matchCriteriaId": "2284EA65-3542-42FF-A764-62B7192384D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.49",
|
||||
"matchCriteriaId": "1191B7F1-F275-45F5-9E82-A012FF517BFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "1B5D46C3-56A4-4380-9309-27BF73DF29A7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/119806ae4e46cf239db8e6ad92bc2fd3daae86dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53e2173172d26c0617b29dd83618b71664bed1fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9366922adc6a71378ca01f898c41be295309f044",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c9c744666f7308a4daba520191e29d395260bcfe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46712",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T07:15:06.030",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:09:22.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,95 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: Deshabilitar los b\u00faferes dumb coherentes sin 3d Las superficies coherentes solo tienen sentido si el host las renderiza usando apis aceleradas. Sin 3d, todo el contenido de los b\u00faferes tontos permanece en el invitado, lo que hace que todo el trabajo adicional que est\u00e1n haciendo para sincronizar entre el invitado y el host sea in\u00fatil. Las configuraciones sin 3d tambi\u00e9n tienden a ejecutarse con l\u00edmites de memoria gr\u00e1fica muy bajos. El fb de la consola fija, los cursores mob y el administrador de inicio de sesi\u00f3n gr\u00e1fico tienden a quedarse sin la memoria gr\u00e1fica de 16 MB que usan esos invitados. Arr\u00e9glelo asegur\u00e1ndose de que los b\u00faferes dumb coherentes solo se usen en configuraciones con 3d habilitado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10.4",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "A9E96A86-D22B-477E-BCB3-D47165518111"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6656",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-09-13T09:15:14.487",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T13:05:44.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1466",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tnbmobil:cockpit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.13",
|
||||
"matchCriteriaId": "E484796B-7183-4F77-BA2A-0F06B280373B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1466",
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8108",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-31T09:15:07.937",
|
||||
"lastModified": "2024-09-03T12:59:02.453",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T13:37:32.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,30 +71,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/class-sti-gutenberg-init.php#L127",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L146",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L42",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3144334/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/share-this-image/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cb5368f-99b1-43e3-a2e4-67e90c8edfcf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:share_this_image_project:share_this_image:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.02",
|
||||
"matchCriteriaId": "7F839D16-E163-498F-A15A-A6F868EC998E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/class-sti-gutenberg-init.php#L127",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L146",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.01/includes/modules/gutenberg/sti-gutenberg-buttons.js#L42",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3144334/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/share-this-image/#developers",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cb5368f-99b1-43e3-a2e4-67e90c8edfcf?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-19T12:00:18.325901+00:00
|
||||
2024-09-19T14:01:10.133728+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-19T11:44:30.770000+00:00
|
||||
2024-09-19T13:57:02.667000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,42 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263434
|
||||
263435
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2024-8354](CVE-2024/CVE-2024-83xx/CVE-2024-8354.json) (`2024-09-19T11:15:10.440`)
|
||||
- [CVE-2024-8986](CVE-2024/CVE-2024-89xx/CVE-2024-8986.json) (`2024-09-19T11:15:10.913`)
|
||||
- [CVE-2024-46382](CVE-2024/CVE-2024-463xx/CVE-2024-46382.json) (`2024-09-19T13:15:04.007`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `24`
|
||||
|
||||
- [CVE-2018-15580](CVE-2018/CVE-2018-155xx/CVE-2018-15580.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-15581](CVE-2018/CVE-2018-155xx/CVE-2018-15581.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-15582](CVE-2018/CVE-2018-155xx/CVE-2018-15582.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-15583](CVE-2018/CVE-2018-155xx/CVE-2018-15583.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-15584](CVE-2018/CVE-2018-155xx/CVE-2018-15584.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-15585](CVE-2018/CVE-2018-155xx/CVE-2018-15585.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18668](CVE-2018/CVE-2018-186xx/CVE-2018-18668.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18669](CVE-2018/CVE-2018-186xx/CVE-2018-18669.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18670](CVE-2018/CVE-2018-186xx/CVE-2018-18670.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18671](CVE-2018/CVE-2018-186xx/CVE-2018-18671.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18672](CVE-2018/CVE-2018-186xx/CVE-2018-18672.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18673](CVE-2018/CVE-2018-186xx/CVE-2018-18673.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18674](CVE-2018/CVE-2018-186xx/CVE-2018-18674.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18675](CVE-2018/CVE-2018-186xx/CVE-2018-18675.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18676](CVE-2018/CVE-2018-186xx/CVE-2018-18676.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2018-18678](CVE-2018/CVE-2018-186xx/CVE-2018-18678.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2020-18661](CVE-2020/CVE-2020-186xx/CVE-2020-18661.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2020-18662](CVE-2020/CVE-2020-186xx/CVE-2020-18662.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2020-18663](CVE-2020/CVE-2020-186xx/CVE-2020-18663.json) (`2024-09-19T11:42:43.340`)
|
||||
- [CVE-2022-1252](CVE-2022/CVE-2022-12xx/CVE-2022-1252.json) (`2024-09-19T11:44:30.770`)
|
||||
- [CVE-2022-3963](CVE-2022/CVE-2022-39xx/CVE-2022-3963.json) (`2024-09-19T11:44:30.770`)
|
||||
- [CVE-2022-4539](CVE-2022/CVE-2022-45xx/CVE-2022-4539.json) (`2024-09-19T13:27:53.407`)
|
||||
- [CVE-2024-1798](CVE-2024/CVE-2024-17xx/CVE-2024-1798.json) (`2024-09-19T13:53:02.563`)
|
||||
- [CVE-2024-1804](CVE-2024/CVE-2024-18xx/CVE-2024-1804.json) (`2024-09-19T13:57:02.667`)
|
||||
- [CVE-2024-20440](CVE-2024/CVE-2024-204xx/CVE-2024-20440.json) (`2024-09-19T13:42:41.017`)
|
||||
- [CVE-2024-38568](CVE-2024/CVE-2024-385xx/CVE-2024-38568.json) (`2024-09-19T13:24:27.560`)
|
||||
- [CVE-2024-38569](CVE-2024/CVE-2024-385xx/CVE-2024-38569.json) (`2024-09-19T13:23:09.203`)
|
||||
- [CVE-2024-38584](CVE-2024/CVE-2024-385xx/CVE-2024-38584.json) (`2024-09-19T13:19:59.523`)
|
||||
- [CVE-2024-38588](CVE-2024/CVE-2024-385xx/CVE-2024-38588.json) (`2024-09-19T13:19:13.213`)
|
||||
- [CVE-2024-38590](CVE-2024/CVE-2024-385xx/CVE-2024-38590.json) (`2024-09-19T13:18:23.443`)
|
||||
- [CVE-2024-40904](CVE-2024/CVE-2024-409xx/CVE-2024-40904.json) (`2024-09-19T13:17:13.123`)
|
||||
- [CVE-2024-40905](CVE-2024/CVE-2024-409xx/CVE-2024-40905.json) (`2024-09-19T13:16:03.533`)
|
||||
- [CVE-2024-46701](CVE-2024/CVE-2024-467xx/CVE-2024-46701.json) (`2024-09-19T13:40:27.817`)
|
||||
- [CVE-2024-46702](CVE-2024/CVE-2024-467xx/CVE-2024-46702.json) (`2024-09-19T13:35:58.637`)
|
||||
- [CVE-2024-46703](CVE-2024/CVE-2024-467xx/CVE-2024-46703.json) (`2024-09-19T13:33:57.563`)
|
||||
- [CVE-2024-46704](CVE-2024/CVE-2024-467xx/CVE-2024-46704.json) (`2024-09-19T13:32:39.257`)
|
||||
- [CVE-2024-46705](CVE-2024/CVE-2024-467xx/CVE-2024-46705.json) (`2024-09-19T13:30:44.133`)
|
||||
- [CVE-2024-46707](CVE-2024/CVE-2024-467xx/CVE-2024-46707.json) (`2024-09-19T13:29:46.757`)
|
||||
- [CVE-2024-46708](CVE-2024/CVE-2024-467xx/CVE-2024-46708.json) (`2024-09-19T13:28:49.483`)
|
||||
- [CVE-2024-46709](CVE-2024/CVE-2024-467xx/CVE-2024-46709.json) (`2024-09-19T13:26:24.140`)
|
||||
- [CVE-2024-46710](CVE-2024/CVE-2024-467xx/CVE-2024-46710.json) (`2024-09-19T13:14:58.650`)
|
||||
- [CVE-2024-46711](CVE-2024/CVE-2024-467xx/CVE-2024-46711.json) (`2024-09-19T13:12:30.390`)
|
||||
- [CVE-2024-46712](CVE-2024/CVE-2024-467xx/CVE-2024-46712.json) (`2024-09-19T13:09:22.957`)
|
||||
- [CVE-2024-6656](CVE-2024/CVE-2024-66xx/CVE-2024-6656.json) (`2024-09-19T13:05:44.953`)
|
||||
- [CVE-2024-8108](CVE-2024/CVE-2024-81xx/CVE-2024-8108.json) (`2024-09-19T13:37:32.203`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
95
_state.csv
95
_state.csv
@ -115980,12 +115980,12 @@ CVE-2018-15573,0,0,af6bdff50ede07088972164fa5d08410a862d7b5d2861f250b58d8f4e37bd
|
||||
CVE-2018-15574,0,0,f0443392b4f4fe1a056ea32ad2973b9544a238a24f68da35ca77f9537843afe2,2024-08-05T10:15:29.190000
|
||||
CVE-2018-15576,0,0,6ff2eb04e3463255ea26501e824585cf0c3e835d65b7ebe5df6a7c510dd5afee,2020-08-24T17:37:01.140000
|
||||
CVE-2018-1558,0,0,18eebc5aa971048ddd01b9f4d8209e8fe1e1eba3680fdaae5c127d175ed1338e,2019-10-09T23:38:39.633000
|
||||
CVE-2018-15580,0,1,0ece479e57aef53143d4cc73e5cf9901ee55207027c4dfd4c6ee0f88138fcb5d,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15581,0,1,c7cbe47862be180bdb251f908b5b86389f45ad3bb97029cab9bd63d61062cace,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15582,0,1,f7200aaabf2375ebcb8bc5da1c0841593a4bb103280c825bcfeafd81e7304f87,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15583,0,1,4ce07976f51069c7112c582da90d0097db5510b2191fdeeed44d969619d5cf65,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15584,0,1,62ed3b2c57de02811b387d5cf65d22b9578936fc8a7d71c8b24c039a55becfe7,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15585,0,1,2b33e446f945f137706de886c5cd4f648c932bb1afe083ca0089e93e8a4e0e1f,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15580,0,0,0ece479e57aef53143d4cc73e5cf9901ee55207027c4dfd4c6ee0f88138fcb5d,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15581,0,0,c7cbe47862be180bdb251f908b5b86389f45ad3bb97029cab9bd63d61062cace,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15582,0,0,f7200aaabf2375ebcb8bc5da1c0841593a4bb103280c825bcfeafd81e7304f87,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15583,0,0,4ce07976f51069c7112c582da90d0097db5510b2191fdeeed44d969619d5cf65,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15584,0,0,62ed3b2c57de02811b387d5cf65d22b9578936fc8a7d71c8b24c039a55becfe7,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15585,0,0,2b33e446f945f137706de886c5cd4f648c932bb1afe083ca0089e93e8a4e0e1f,2024-09-19T11:42:43.340000
|
||||
CVE-2018-15586,0,0,36bb5207f6da3d0ad81705d79e423e221287883caadb14667854b2a452ac9a1a,2019-05-16T18:29:02.687000
|
||||
CVE-2018-15587,0,0,80dcbe9cc2f6eb4d9b823829389b5b250400083366bfabffdedffb77400e27a3,2019-06-10T07:29:00.803000
|
||||
CVE-2018-15588,0,0,1384c086eb29e84e5d7a857158350cbe9d1b75441b88f80d1c32d4d0fc54f76e,2019-10-03T00:03:26.223000
|
||||
@ -118575,16 +118575,16 @@ CVE-2018-18662,0,0,61d793824950e08659a5e6067b7a4377799331f5e3a37aee4b6613b9845db
|
||||
CVE-2018-18665,0,0,70c1af116dce7576ec784f49af161bada6890600c6b1e21dbd7fde5e1dd956e7,2019-01-11T20:34:45.270000
|
||||
CVE-2018-18666,0,0,e3dcf221645b96b703f55ecfece18d25dd77a568dd70673f2e5077e3497d1f50,2019-01-11T20:29:54.217000
|
||||
CVE-2018-18667,0,0,77d261c1562180793b28d4254dff8dafc7b1cc1d269d70dc354a393d3140f567,2019-01-11T20:14:03.017000
|
||||
CVE-2018-18668,0,1,5fb3022fe4e5c8aa9335f1b86405a26ae9993ed819ef61945914933a210a7bc5,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18669,0,1,7b51b8fc4369142b6e2240467c24fa9963207754496d0ad58c76db9c4ef7d158,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18670,0,1,c075206560a037d05cc29fc930df5327299c886b81837fe06a2e9cea09f96c77,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18671,0,1,0801bcccf2f7d1161dcd5cd2d6c0fc651825c1f572ccc5ee6a2af00000df7734,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18672,0,1,04ae6f38d9d9eaba495dcf554272f7196501da65fe226118440f6fe4e737f2c6,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18673,0,1,c3de3835d5539c9bd013c1c3062dba3b67dc9a9cd36cc751c9d04444cc4020a2,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18674,0,1,f0c1726e125f5feaf2f1002a56f823ac532c1d1d6363160c1a4e6f4edd1d4daa,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18675,0,1,f327fe68418bcd406af8153674366055e994f4e80091bb37d65107d7aac48099,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18676,0,1,3007baa3a46cf83ca0761608ec931431f9af52f4a3d101c3f4af8dc9336e8bae,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18678,0,1,ba2da7055756297a9152eb6c490615729f7cd452edd7d86f6a0cec45f6d41e82,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18668,0,0,5fb3022fe4e5c8aa9335f1b86405a26ae9993ed819ef61945914933a210a7bc5,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18669,0,0,7b51b8fc4369142b6e2240467c24fa9963207754496d0ad58c76db9c4ef7d158,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18670,0,0,c075206560a037d05cc29fc930df5327299c886b81837fe06a2e9cea09f96c77,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18671,0,0,0801bcccf2f7d1161dcd5cd2d6c0fc651825c1f572ccc5ee6a2af00000df7734,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18672,0,0,04ae6f38d9d9eaba495dcf554272f7196501da65fe226118440f6fe4e737f2c6,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18673,0,0,c3de3835d5539c9bd013c1c3062dba3b67dc9a9cd36cc751c9d04444cc4020a2,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18674,0,0,f0c1726e125f5feaf2f1002a56f823ac532c1d1d6363160c1a4e6f4edd1d4daa,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18675,0,0,f327fe68418bcd406af8153674366055e994f4e80091bb37d65107d7aac48099,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18676,0,0,3007baa3a46cf83ca0761608ec931431f9af52f4a3d101c3f4af8dc9336e8bae,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18678,0,0,ba2da7055756297a9152eb6c490615729f7cd452edd7d86f6a0cec45f6d41e82,2024-09-19T11:42:43.340000
|
||||
CVE-2018-18688,0,0,cdee1b9fc569fe17752b7b5c7a9407b9fed4cc2523e4586f6c23ce5c5c4bf805,2021-01-14T18:35:28.727000
|
||||
CVE-2018-18689,0,0,5057eb6c26a0d86fbd18bc3c635d94fa0f5fb2a7d159fa2742e7c714d746b31a,2021-01-15T17:07:25.060000
|
||||
CVE-2018-18690,0,0,9258f7618debf431e8113a21c127517f7e986e91f550023c49c1c9b653ec6b04,2019-10-03T00:03:26.223000
|
||||
@ -151993,9 +151993,9 @@ CVE-2020-18658,0,0,ede7fdc55fec3e21a5b3bc3c2d575e2977b64dc030e9b468a331081a8fa2d
|
||||
CVE-2020-18659,0,0,3fcfbc0cd2f91f4bb008dd3b46d254059afc11b3cd9f01a42958c01913f58d4c,2021-06-25T18:55:48.947000
|
||||
CVE-2020-1866,0,0,660264a4f88e120168c3d0396776d420354c3d93b7a09ae55f21c3b2d189d42b,2021-01-19T17:12:35.327000
|
||||
CVE-2020-18660,0,0,1117a6d76dac03634eaec1cf451e843f825b3976b451a7d6d028774fdbfb93eb,2021-06-28T19:51:00.250000
|
||||
CVE-2020-18661,0,1,b225474a121ad88da0764ccdc9278aa70d858832734791afb1b5ba8b7b70b318,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18662,0,1,a22da2d4c1d9cfe6733795a64cb0caff4b2a4d1056e45834541146a660ac34cb,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18663,0,1,507cb3295bc48aca7088bb1b47ac14491b450dd819188b0f2699b555d16078a3,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18661,0,0,b225474a121ad88da0764ccdc9278aa70d858832734791afb1b5ba8b7b70b318,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18662,0,0,a22da2d4c1d9cfe6733795a64cb0caff4b2a4d1056e45834541146a660ac34cb,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18663,0,0,507cb3295bc48aca7088bb1b47ac14491b450dd819188b0f2699b555d16078a3,2024-09-19T11:42:43.340000
|
||||
CVE-2020-18664,0,0,ccc98f4ff8bed4359475d3ba5782c6051eb91baa4a9632aeff9951506de16ea1,2021-07-20T15:14:08.867000
|
||||
CVE-2020-18665,0,0,485acd272eb45019f7d7914557e8a08be3bd3733ad437d1356f954640a2714dc,2021-07-20T14:38:30.357000
|
||||
CVE-2020-18666,0,0,fc072e3dd2bd52de766db37ff3bcefb26ef3ba307314582cd25394f8c8f923cc,2023-11-07T03:19:16.320000
|
||||
@ -188647,7 +188647,7 @@ CVE-2022-1248,0,0,ffd847671dbf9e768ed25562d6308c426c783ff20081485bf566dd400cf58e
|
||||
CVE-2022-1249,0,0,49a4d501f1951a4a814848ecbaf5c6f0c6e1328792259cc415977e52a4f47a5c,2022-05-11T15:18:34.363000
|
||||
CVE-2022-1250,0,0,f17f1e4cba543021b26f70d30792f9f99a2ec815a35101d461df9363c43f24b3,2022-05-09T14:18:47.507000
|
||||
CVE-2022-1251,0,0,868aebad64a3764311e562885ca30764c960428b169f55459e7a9b8b87e69ccf,2022-08-23T18:44:40.757000
|
||||
CVE-2022-1252,0,1,7f53ec6690e15c579ba7ee2825a46f9d49f567771c741e95db6a57623bebea91,2024-09-19T11:44:30.770000
|
||||
CVE-2022-1252,0,0,7f53ec6690e15c579ba7ee2825a46f9d49f567771c741e95db6a57623bebea91,2024-09-19T11:44:30.770000
|
||||
CVE-2022-1253,0,0,2bd88ddbf7d2e54e07a1adf16a645590178c43d0627f519c721a988322d961ca,2023-02-11T13:15:17.253000
|
||||
CVE-2022-1254,0,0,237c1fccad0afb6674956e0ab42ec9863ad87378815c9852006bacb33ce1048d,2023-11-16T03:13:51.517000
|
||||
CVE-2022-1255,0,0,80d98de0cab21d9a9ceb3bec98ea021a972fc4373603d30617d7fae6f04006c8,2022-05-09T14:08:27.740000
|
||||
@ -205687,7 +205687,7 @@ CVE-2022-3959,0,0,2c43056dcfa5d325ab29ff39ae6be3e116b4c565ded6b9e42561a74b690a3f
|
||||
CVE-2022-3960,0,0,751373602e8302d1f7444176cde613e72f3100b2cb73ab22d0205171b5ccbfa8,2023-11-07T03:52:01.530000
|
||||
CVE-2022-3961,0,0,4d090ef081505e5d2af28fd884b9345789c975ec241d237afeb35997db7a6ad8,2023-11-07T03:52:01.610000
|
||||
CVE-2022-3962,0,0,94888ed2b5359d2d4940d268120fb86748dcdd9ab262259935e742df8a499128,2023-11-07T03:52:01.700000
|
||||
CVE-2022-3963,0,1,9307a3801fa29f211f4c60f48566ecd89c867b97e074f4795b46a3df6b24a55e,2024-09-19T11:44:30.770000
|
||||
CVE-2022-3963,0,0,9307a3801fa29f211f4c60f48566ecd89c867b97e074f4795b46a3df6b24a55e,2024-09-19T11:44:30.770000
|
||||
CVE-2022-3964,0,0,ccfc91aeaedcdf9726dc003faaa695f6b1c48500b12a67f966b4d720af1ec4b7,2023-12-23T12:15:21.140000
|
||||
CVE-2022-3965,0,0,af14d3581a73920119ad18f286554c3cf674bcd8d1e9ab8733f5020747337264,2023-12-23T12:15:21.277000
|
||||
CVE-2022-3966,0,0,693e244bc9d02834769817f549841cdd11ddb63a883fa798ab2bd4f5ff32de3b,2023-11-07T03:52:02.183000
|
||||
@ -209967,7 +209967,7 @@ CVE-2022-45386,0,0,7b3446e3b3989f7e5ccd2e451b22b6d2cbea799c20d222a0225af4be098a7
|
||||
CVE-2022-45387,0,0,1b6789e5a2bdef3b9a51ef70a4247436faaf5b439c0647997f6a1acce747bded,2023-11-01T20:06:58.680000
|
||||
CVE-2022-45388,0,0,025e99a3e388d7350ff8d89fe0963e64ee80d9df4946f011c4812b3960606341,2023-11-01T20:07:03.127000
|
||||
CVE-2022-45389,0,0,28ab606bd595233a443b8b6100eb887bd3c045c4ef3770031f8142323e988fb1,2023-11-01T20:07:06.920000
|
||||
CVE-2022-4539,0,0,0c0f3cff031b4c4fdae91fcb91318dce287729d878d9331ad070d6728eae7b99,2024-09-03T12:59:02.453000
|
||||
CVE-2022-4539,0,1,608bef7fa4736b1d296be0dc163af166ce399c7c762cd93de22c63a40442b350,2024-09-19T13:27:53.407000
|
||||
CVE-2022-45390,0,0,522be8e59ecc6fb313b565933e898b531a2e8fd9d26765f1376bd7635ec4e38e,2023-11-01T20:00:12.127000
|
||||
CVE-2022-45391,0,0,dea9bedae939a1e5769a4fb06db662149e235d6b98bf5a315d9d10ecfa6eeacb,2023-11-01T20:00:33.640000
|
||||
CVE-2022-45392,0,0,7f7d171479370c686e9f40b4723d02c41bf5fe9746488e84f4e2ffc4060515ef,2023-11-01T20:00:38.270000
|
||||
@ -242830,13 +242830,13 @@ CVE-2024-1794,0,0,40da0cc463ac5fc4902001ace2561b684a562ea2a12f72533f59f289fe0586
|
||||
CVE-2024-1795,0,0,d5d165902ce8409982715be66577d28d51d22ea46335ac541aa9912164e0316e,2024-03-15T12:53:06.423000
|
||||
CVE-2024-1796,0,0,5301c3d7e9f365e1b5a5f5e299ba2d113b1c33fee6b3306d129a1acabe5fdb8b,2024-03-15T12:53:06.423000
|
||||
CVE-2024-1797,0,0,39f91857b2b1be64a82720d73863309c3dc5b27441bea6e624c8312a22cc243f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1798,0,0,8d83b203361d0fb7ddaa9d08e64ee7c348688a425c6b36a096b9c50c44671341,2024-07-29T14:12:08.783000
|
||||
CVE-2024-1798,0,1,349219891047173d934db9bfeb9d5b8b17accd7368b4e56eec7c70dddd11928b,2024-09-19T13:53:02.563000
|
||||
CVE-2024-1799,0,0,d8756bba8b4cdd006404bc895ba68b60db86af603abda3f30a56066ebbf50939,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1800,0,0,f53314859df2ff8acf8c284afd628cdf89b33b507d44df4413be063b7de5889f,2024-03-20T17:18:26.603000
|
||||
CVE-2024-1801,0,0,22b7a02f8400e6c62f43c0a6ce63e01f389097184cf969a99878bc2375a229fd,2024-03-20T17:18:26.603000
|
||||
CVE-2024-1802,0,0,eafa2bc95e957b2cc307b2ef3ea8ab2f6ff707f76feb1828d86248a34d07c668,2024-03-08T14:02:57.420000
|
||||
CVE-2024-1803,0,0,1c557f2ce0a4cd8d54c6792265dcc7db4327322cac90e90129dfd74fb33d96ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-1804,0,0,653a1f68ec5981d43f946e098164c483e4f0daed7dbf64d6b7fa68c1a192275c,2024-07-29T14:12:08.783000
|
||||
CVE-2024-1804,0,1,fdd130406c200efb67f1b9f52ef2b518b63fc73cb5917b48ca64ae31d90fd81c,2024-09-19T13:57:02.667000
|
||||
CVE-2024-1805,0,0,a59f77fcb7c175f76315db29f7dae82298e2a93dd560b6e6db85c2033c523f41,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1806,0,0,82e6efa46d251f73a9be3cd03b966fa1cb1b795203d9fde49109d804f438622d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1807,0,0,78623cd77b077abac19ec44fd2c28d4b51b5a06fa84f1112c2d264189280dc5a,2024-04-02T12:50:42.233000
|
||||
@ -243269,7 +243269,7 @@ CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227
|
||||
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
|
||||
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
|
||||
CVE-2024-20440,0,0,796ea7e1ab64fac2ef9b380c590f2427a9fe842892de6bd643e3b5e8c4f2805c,2024-09-05T12:53:21.110000
|
||||
CVE-2024-20440,0,1,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000
|
||||
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
|
||||
CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000
|
||||
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
|
||||
@ -256143,8 +256143,8 @@ CVE-2024-38564,0,0,6fd50c2edcba2a8aacaa9d9261d553e77f7ce6acf1928cffdd38a0bed6267
|
||||
CVE-2024-38565,0,0,7b0c7f68aea83caebfc83e01c484a69bdba5e7b4bbba4af7b03a82174b1cdde5,2024-07-15T07:15:09.853000
|
||||
CVE-2024-38566,0,0,07e8efbcf56c2fad52654e828f947f5e8fa61aae0f9977109691083c2a25c30b,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38567,0,0,0db207178438a78e78eea4389e4817c374880035b351a6d136db3e5973df6d48,2024-07-15T07:15:09.997000
|
||||
CVE-2024-38568,0,0,27a3b5688d2aa4a35cad367caa2d8b6341cab1992079d8905932a20d7c620e9b,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38569,0,0,27f91155c9b0983f7d7fabaea70cdbc499deb14d106d3168a92ae8a0b7e92129,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38568,0,1,455548b918245e347f34ce0aba45fcc009f8cce516e56e828f25a6be6cab8f3c,2024-09-19T13:24:27.560000
|
||||
CVE-2024-38569,0,1,f26fb431905997a4597a012413bc0e1ff25720be5fb59eea3b0bbf51b063bd6f,2024-09-19T13:23:09.203000
|
||||
CVE-2024-3857,0,0,73a9c1fe436176bbc730be669b62c208d33e2f84627732b864c38ba9014087a7,2024-07-03T02:06:46.957000
|
||||
CVE-2024-38570,0,0,baa11eae83e117a16485736ec5bc6c7958c127b45e946933d8906fb0fc60a35e,2024-08-01T20:25:42.533000
|
||||
CVE-2024-38571,0,0,a4572f3bde9a236cadd817d2ac7f556a56c7c3a4704a15bc0a720fe3d30dddb6,2024-08-01T20:23:59.530000
|
||||
@ -256161,14 +256161,14 @@ CVE-2024-38580,0,0,f767d8c72e121e64fa886da74166c0eb1f56d7af5ff19f167059ca44868c4
|
||||
CVE-2024-38581,0,0,163d2599f0d04bac3fcda8729bc91618b1a33a7c58994982f4ff41f06afb0603,2024-08-01T20:12:00.623000
|
||||
CVE-2024-38582,0,0,5bf2ab3765292126c7b2b3caf98adbacc937c1d69982e23478c39937ea0c9383,2024-07-15T07:15:10.780000
|
||||
CVE-2024-38583,0,0,3586ecafa0d1ca6e8a926d43c12025b855a9c710e7b8311423d413eb7650177a,2024-08-01T19:51:12.837000
|
||||
CVE-2024-38584,0,0,40569e97f735a283770c93570f3f79703098c273656df00d315b4c6ceac35636,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38584,0,1,866c0fab6737d5c632d2fe0d0fa84370c558b19a956e53ddad3dc439393e5215,2024-09-19T13:19:59.523000
|
||||
CVE-2024-38585,0,0,ac7ad3971d199dfa0ef80e1eb68414477e8c3ff2ccc08162bcbd892283ba3515,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38586,0,0,e1ff5c054b319f07de453ba910d18e7747a4a3215b30c879a6dd800b406a5cb1,2024-07-05T08:15:03.210000
|
||||
CVE-2024-38587,0,0,0b984db6b2a9d7bf09dd4f816f04bfd5bf979a0b9b75a21ee2fc29cf10ba66a9,2024-07-15T07:15:11.083000
|
||||
CVE-2024-38588,0,0,455a9b8a90760206a5fde630f5374c7117d3ca5dfaa729021f7df349dd4746eb,2024-07-05T08:15:03.283000
|
||||
CVE-2024-38588,0,1,0749318583b791a1cc1da3b09ffccc95edb5a582e38a4ca1e4fbe3e18caf1b49,2024-09-19T13:19:13.213000
|
||||
CVE-2024-38589,0,0,054b7c93b18a32102a19731b8b9f7b53136e29764718c76bb09302eaee6404d9,2024-07-15T07:15:11.207000
|
||||
CVE-2024-3859,0,0,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000
|
||||
CVE-2024-38590,0,0,5e1bf1fdf89348f141f9135cc15b76d863d47b4003bf5b9faeb1fa796664bf8e,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38590,0,1,e86d866c4a784c218f3833027c6ac202a6fe2ae81492fa7703f76f725c6070b1,2024-09-19T13:18:23.443000
|
||||
CVE-2024-38591,0,0,9995c38906c89d4c26c4d73a9253c7dc172d1edb03657ec8d80bc3d1b50a2d04,2024-08-27T18:36:09.777000
|
||||
CVE-2024-38592,0,0,37134037ea24ea3ecf9f937f4db71a7eaa477c8ce6aa02c104d4a8d758f347b0,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38593,0,0,5810f9929219cd255d4f41416ce4d085acded54a81aae5569c879799f8b25fb1,2024-06-20T12:44:01.637000
|
||||
@ -257424,8 +257424,8 @@ CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a379
|
||||
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40902,0,0,4e014392b4dbdf4c3eaa1eaf547c1f15e32d34ee0d2ed889e6560c95939bec29,2024-08-20T14:35:26.807000
|
||||
CVE-2024-40903,0,0,651b7373d15f2926785ce0de2df21ae36288d984de87f3f47e275557d5da218e,2024-07-24T19:01:54.317000
|
||||
CVE-2024-40904,0,0,9aa568b0e026595888acd360a993289314f39d24eb5e574eafaa70b28e216bd9,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40905,0,0,96eb254d5f8b6d07fa83b1d2229752059acc8f42da01741b8cbd4eaae04230ff,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40904,0,1,ac1cd0a4d2be5f0cd9b238a07ce532b6ae75604051fca83ba2cb37bf9a873ca4,2024-09-19T13:17:13.123000
|
||||
CVE-2024-40905,0,1,66518371415dcc07ccd7566fd6781f12e2703d4f1411d625f99f27d0929fcfb3,2024-09-19T13:16:03.533000
|
||||
CVE-2024-40906,0,0,e06807da66b955824f3da74667c1beb9d0fb817d00aa3f4618de93e654a43a9e,2024-08-29T14:48:18.870000
|
||||
CVE-2024-40907,0,0,95a9f96ca6af7331dbd0daf36905e29922cf13f1aa483339e6a94a1730bf2093,2024-08-29T14:48:30.593000
|
||||
CVE-2024-40908,0,0,6cdce7f53523afe33cba2998c01eb82605e728b8ccb05b039038c6b90e3df5fa,2024-07-12T16:34:58.687000
|
||||
@ -260094,6 +260094,7 @@ CVE-2024-46375,0,0,730d98d3aaa4abb9e447b131fb919e3dae3a5b289835231a6966b5aabf6d0
|
||||
CVE-2024-46376,0,0,ac9a130efd9c145121a32385750b88892d21a977504e015a23ff644e386cfd2c,2024-09-18T21:15:13.633000
|
||||
CVE-2024-46377,0,0,743dfdf9950fe16ad260454b679cb44037836809a4e697e1d2a1b0e0ed8a247a,2024-09-18T21:15:13.687000
|
||||
CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db703,2024-06-25T12:24:17.873000
|
||||
CVE-2024-46382,1,1,dd16ef975b8b7dfd9687f5f030a9fb4d7ba419a702b2160c4ad35317e99176d0,2024-09-19T13:15:04.007000
|
||||
CVE-2024-4639,0,0,d09b63781578ea43d80f90bc1869913d7850dd4433262c761e06a825045658ac,2024-09-18T15:46:04.960000
|
||||
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
|
||||
CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
|
||||
@ -260190,19 +260191,19 @@ CVE-2024-46698,0,0,dd18a350b42292bfa692742bfea20969ac387a40a6df6f50c4209832f6c49
|
||||
CVE-2024-46699,0,0,06698b262190134bec89f3644bb256a03fde8105e3a035b81d99b56d18cdb050,2024-09-13T16:53:10.620000
|
||||
CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000
|
||||
CVE-2024-46700,0,0,0809b1417331de171a8f18673376ec956a74775c6cc5273be5d5fb524451bf9f,2024-09-13T16:53:25.383000
|
||||
CVE-2024-46701,0,0,00ef4b690b753d27468f32de7dc6ae1f5e97c978874e00cf7537547b3b911fb6,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46702,0,0,f19741dbc540a742a05e706160b6bf10b2cb22b9c47496befe57c74bd446e7e5,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46703,0,0,992e0ca2ddef58cb8b7fff5f16727b6cca214cf315e98aa75f5989fcb7f1886e,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46704,0,0,1d82216d7de90d35ce65023913995501351d36395725464ca817e7681dbcb498,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46705,0,0,bab3821c8e0c4705858d9569dbae702751119528ae29c0dcb4c62605b2ae78c6,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46701,0,1,2b995ef47ed18687aeeb3049ab731c20fe24451709393a91f623b4847307d45c,2024-09-19T13:40:27.817000
|
||||
CVE-2024-46702,0,1,5aad35e2d7d1ccbb97d6a3251704aac50eabfd028ebefa2b04bd88e7e42de7b1,2024-09-19T13:35:58.637000
|
||||
CVE-2024-46703,0,1,e11c195a259f3df31398758ffb3ccf027e5548f4969c954514a9f4cce3608756,2024-09-19T13:33:57.563000
|
||||
CVE-2024-46704,0,1,f78588eb2f2a44341e8643254e6b27a014ea20b715f19c482965344be2a2c1ed,2024-09-19T13:32:39.257000
|
||||
CVE-2024-46705,0,1,90099fce686500ca9a4af7d5dad56b9132c185dd3789d400df5fe529ab883451,2024-09-19T13:30:44.133000
|
||||
CVE-2024-46706,0,0,0cc882eb33e85bee70be37cef817809cd5f968232da118a27c2d3b8b7b1492c8,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46707,0,0,48730e1cfd09d90e3d0a7d30629f6241dfd9f3189c56ae3deca76f8c7abcdb11,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46708,0,0,373d7fae9fc20a4735029e856673de5ccadcbc10213ea30b6beeee88644d3069,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46709,0,0,6ea9540d7cec37812637384e28b461a60d5e9456f9edcebff27a248afbee1460,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46707,0,1,74dcaf9ed923021710159c21f486f26a1f03ecaa0f7a649f40a6ffec6ab91290,2024-09-19T13:29:46.757000
|
||||
CVE-2024-46708,0,1,87dc269451b066b6993dbb5930897253927943ffe2fed7d96f86c37f09c45816,2024-09-19T13:28:49.483000
|
||||
CVE-2024-46709,0,1,4fbf8864408f806038214e80c57c5097ea72706b241ae096cb98bc0895ec0e4c,2024-09-19T13:26:24.140000
|
||||
CVE-2024-4671,0,0,185dc0ba34bc0f367bb40abcb8d9eaaa2a7101f2bad0c1d95e54ade99bea383c,2024-08-14T17:06:43.910000
|
||||
CVE-2024-46710,0,0,a4ebac24f77ec09b7dede285490ca9442896e0f636deada81f35080b17ed7f72,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46711,0,0,c3d885bd91fed12a5d6c801c0d7542eef9468260fad1d33236aa3beacba38072,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46712,0,0,74a79a6f4330ed1d1217cf13ada08cf4d1499d5777abdc6b1cc98655e080937d,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46710,0,1,99ad059fec6100ef5344b9476dea58e8105bf6e298abfd9609e18d1b32dd83fb,2024-09-19T13:14:58.650000
|
||||
CVE-2024-46711,0,1,91f6e71bff9276f1e56a88764fca11ade7e1d2c1501a9c829689237f0828b894,2024-09-19T13:12:30.390000
|
||||
CVE-2024-46712,0,1,225e28d58d121274afe8a67bb7e9b2a631f03521abd17c753d0a27bb12faae1a,2024-09-19T13:09:22.957000
|
||||
CVE-2024-46713,0,0,d8ee32a1d2f66a0382271f856af541b1f264ab38003525966195157bdf6c59dd,2024-09-13T16:37:22.997000
|
||||
CVE-2024-46714,0,0,b72ad44a954f2715ef56c9102a244a355debec6037b8929871f8785f000f2aa0,2024-09-18T07:15:03.060000
|
||||
CVE-2024-46715,0,0,7d56260d3c8e43c2b1103e17b191e44a00795874e8dfaaf69c4d53ea8d6e708a,2024-09-18T07:15:03.130000
|
||||
@ -262033,7 +262034,7 @@ CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555
|
||||
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6656,0,0,616dc8b6f073df02a90d7ae62f3ffb94d23696d7ecd1f3110e348ba00dad449c,2024-09-13T14:06:04.777000
|
||||
CVE-2024-6656,0,1,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000
|
||||
CVE-2024-6658,0,0,4a0156cfcbad8addf247acdc6afc3255d61748345b3487a1cd1e78328ed87392,2024-09-12T18:14:03.913000
|
||||
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
|
||||
CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000
|
||||
@ -263059,7 +263060,7 @@ CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5
|
||||
CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000
|
||||
CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000
|
||||
CVE-2024-8106,0,0,918839130e1d38968c976a0bfdbedb93d4d38744e55b3c51d6882ceb90663b73,2024-09-05T13:05:52.540000
|
||||
CVE-2024-8108,0,0,442f98decc0499e506f0b68f17d4f12c70850e9a42d2fcd7765e1202aaa5c426,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8108,0,1,8f1cde3e4e080de95c0957ccbabc0a49f644f40a04612484228affb54375e534,2024-09-19T13:37:32.203000
|
||||
CVE-2024-8110,0,0,70e34b8fb0e74179f102366e82bc6eb3331f20df821d46fd84d2bf4a81d1d1dd,2024-09-17T02:15:49.523000
|
||||
CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000
|
||||
CVE-2024-8113,0,0,955ebfeb47657ee688d94f4a91bdebad900106533d62e5ae0eb920a40b616cec,2024-09-12T18:21:30.677000
|
||||
@ -263214,7 +263215,7 @@ CVE-2024-8345,0,0,bea7763926b715c0e51801ea13b0e6641ca2b2321817703caee6bafdff4fc9
|
||||
CVE-2024-8346,0,0,b4457249ac6e42b712016be7384df47b946c6e796e6e27191d31db6f56c0933d,2024-09-04T16:37:22.077000
|
||||
CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3cb,2024-09-04T16:42:49.037000
|
||||
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
|
||||
CVE-2024-8354,1,1,7420c1c857038527c73a91c88aff8209c9653e6fba2044078da37c58273aab17,2024-09-19T11:15:10.440000
|
||||
CVE-2024-8354,0,0,7420c1c857038527c73a91c88aff8209c9653e6fba2044078da37c58273aab17,2024-09-19T11:15:10.440000
|
||||
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
|
||||
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
|
||||
CVE-2024-8364,0,0,3e721283ebe00934a928d8628eb31017a2df2ef87556569b7955e4303aeb1f1e,2024-09-19T04:15:06.270000
|
||||
@ -263432,4 +263433,4 @@ CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39a
|
||||
CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
|
||||
CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
|
||||
CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000
|
||||
CVE-2024-8986,1,1,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000
|
||||
CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user