mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-05-25T16:00:38.507125+00:00
This commit is contained in:
parent
5f9260c5b4
commit
b0f2d07fd3
@ -2,23 +2,14 @@
|
||||
"id": "CVE-2021-47411",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T15:15:26.617",
|
||||
"lastModified": "2024-05-21T16:54:26.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:50.770",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: allow conditional reschedule for intensive iterators\n\nIf we have a lot of threads and rings, the tctx list can get quite big.\nThis is especially true if we keep creating new threads and rings.\nLikewise for the provided buffers list. Be nice and insert a conditional\nreschedule point while iterating the nodes for deletion."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48655",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-28T13:15:07.623",
|
||||
"lastModified": "2024-04-30T15:25:10.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-25T15:15:08.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -83,6 +83,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
@ -96,6 +100,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52434",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-20T18:15:50.790",
|
||||
"lastModified": "2024-03-15T14:21:29.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-25T15:15:08.477",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -111,6 +111,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52585",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-06T07:15:07.290",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-05-25T15:15:08.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,33 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26583",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-21T15:15:09.373",
|
||||
"lastModified": "2024-03-15T13:05:03.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-25T15:15:08.700",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -111,6 +111,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26584",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-21T15:15:09.420",
|
||||
"lastModified": "2024-04-30T19:35:07.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-25T15:15:08.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -91,6 +91,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26952",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-01T06:15:11.350",
|
||||
"lastModified": "2024-05-23T19:14:05.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-25T15:15:08.950",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,6 +90,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27420",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:13.993",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:51.757",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_link_fails_count\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27421",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:14.217",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:51.860",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_routing_control\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27422",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:14.437",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:51.940",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27423",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:14.670",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.053",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_requested_window_size\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27424",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:14.910",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.140",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_busy_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27425",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:15.137",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.253",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_acknowledge_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27426",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:15.380",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.420",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_maximum_tries\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27427",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:15.600",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.570",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27428",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:15.750",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.687",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_netrom_network_ttl_initialiser\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2024-27430",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:16.200",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.803",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_default_path_quality\n\nWe need to protect the reader reading sysctl_netrom_default_path_quality\nbecause the value can be changed concurrently."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,27 +2,14 @@
|
||||
"id": "CVE-2024-35820",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T14:15:17.137",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:52.920",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix io_queue_proc modifying req->flags\n\nWith multiple poll entries __io_queue_proc() might be running in\nparallel with poll handlers and possibly task_work, we should not be\ncarelessly modifying req->flags there. io_poll_double_prepare() handles\na similar case with locking but it's much easier to move it into\n__io_arm_poll_handler()."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,31 +2,14 @@
|
||||
"id": "CVE-2024-35923",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-19T11:15:48.587",
|
||||
"lastModified": "2024-05-20T13:00:04.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-25T14:15:53.013",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: clear opcode specific data for an early failure\n\nIf failure happens before the opcode prep handler is called, ensure that\nwe clear the opcode specific area of the request, which holds data\nspecific to that request type. This prevents errors where opcode\nhandlers either don't get to clear per-request private data since prep\nisn't even called."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36013",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-23T07:15:08.987",
|
||||
"lastModified": "2024-05-24T01:15:30.977",
|
||||
"lastModified": "2024-05-25T15:15:09.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n ? mutex_lock(&conn->chan_lock);\n ? chan = pchan->ops->new_connection(pchan); <- alloc chan\n ? __l2cap_chan_add(conn, chan);\n ? l2cap_chan_hold(chan);\n ? list_add(&chan->list, &conn->chan_l); ... (1)\n ? mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n? mutex_lock(&conn->chan_lock);\n? foreach chan in conn->chan_l: ... (2)\n? l2cap_chan_put(chan);\n? l2cap_chan_destroy\n? kfree(chan) ... (3) <- chan freed\n? mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311"
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n \u250c mutex_lock(&conn->chan_lock);\n \u2502 chan = pchan->ops->new_connection(pchan); <- alloc chan\n \u2502 __l2cap_chan_add(conn, chan);\n \u2502 l2cap_chan_hold(chan);\n \u2502 list_add(&chan->list, &conn->chan_l); ... (1)\n \u2514 mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n\u250c mutex_lock(&conn->chan_lock);\n\u2502 foreach chan in conn->chan_l: ... (2)\n\u2502 l2cap_chan_put(chan);\n\u2502 l2cap_chan_destroy\n\u2502 kfree(chan) ... (3) <- chan freed\n\u2514 mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige slab-use-after-free en l2cap_connect() Amplia una secci\u00f3n cr\u00edtica para evitar que chan se libere anticipadamente. Tambi\u00e9n anule el tipo de retorno l2cap_connect(). Nada utiliza el valor devuelto, pero es feo devolver un puntero potencialmente liberado. Anularlo ayudar\u00e1 con los backports porque los kernels anteriores usaban el valor de retorno. Ahora la compilaci\u00f3n se interrumpir\u00e1 en los n\u00facleos en los que este parche no sea una soluci\u00f3n completa. Resumen de la pila de llamadas: [usar] l2cap_bredr_sig_cmd l2cap_connect ? mutex_lock(&conn->chan_lock); ? chan = pchan->ops->new_connection(pchan); <-alloc chan? __l2cap_chan_add(conexi\u00f3n, chan); ? l2cap_chan_hold(chan); ? list_add(&chan->lista, &conn->chan_l); ... (1) ? mutex_unlock(&conn->chan_lock); chan->conf_state... (4) <- usar despu\u00e9s de gratis [gratis] l2cap_conn_del? mutex_lock(&conn->chan_lock); ? foreach chan en conn->chan_l: ... (2)? l2cap_chan_put(chan); ? l2cap_chan_destroy? kfree(chan) ... (3) <- chan liberado? mutex_unlock(&conn->chan_lock); ==================================================== ================ ERROR: KASAN: slab-use-after-free en instrument_atomic_read include/linux/instrumented.h:68 [en l\u00ednea] ERROR: KASAN: slab-use-after -free en _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [en l\u00ednea] ERROR: KASAN: slab-use-after-free en l2cap_connect+0xa67/0x11a0 net/bluetooth/l2cap_core.c:4260 Lectura del tama\u00f1o 8 en addr ffff88810bf040a0 por tarea kworker/u3:1/311"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -15,6 +19,14 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4d7b41c0e43995b0e992b9f8903109275744b658",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/826af9d2f69567c646ff46d10393d47e30ad23c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfe560c7050bfb37b0d2491bbe7cd8b59e77fdc5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-53xx/CVE-2024-5336.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5336.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5336",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-25T15:15:09.150",
|
||||
"lastModified": "2024-05-25T15:15:09.150",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Ruijie RG-UAC up to 20240516 and classified as critical. This vulnerability affects the function addVlan of the file /view/networkConfig/vlan/vlan_add_commit.php. The manipulation of the argument phyport leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266242 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-vlan%3Avlan_add_commit.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266242",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266242",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.336031",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-53xx/CVE-2024-5337.json
Normal file
92
CVE-2024/CVE-2024-53xx/CVE-2024-5337.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5337",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-25T15:15:09.943",
|
||||
"lastModified": "2024-05-25T15:15:09.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240516 and classified as critical. This issue affects some unknown processing of the file /view/systemConfig/sys_user/user_commit.php. The manipulation of the argument email2/user_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266243. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-sys_user%3Auser_commit.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.266243",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.266243",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.336032",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
33
README.md
33
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-25T10:00:37.890498+00:00
|
||||
2024-05-25T16:00:38.507125+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-25T08:15:08.223000+00:00
|
||||
2024-05-25T15:15:09.943000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251773
|
||||
251775
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-5336](CVE-2024/CVE-2024-53xx/CVE-2024-5336.json) (`2024-05-25T15:15:09.150`)
|
||||
- [CVE-2024-5337](CVE-2024/CVE-2024-53xx/CVE-2024-5337.json) (`2024-05-25T15:15:09.943`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
- [CVE-2023-52656](CVE-2023/CVE-2023-526xx/CVE-2023-52656.json) (`2024-05-25T08:15:08.223`)
|
||||
- [CVE-2021-47411](CVE-2021/CVE-2021-474xx/CVE-2021-47411.json) (`2024-05-25T14:15:50.770`)
|
||||
- [CVE-2022-48655](CVE-2022/CVE-2022-486xx/CVE-2022-48655.json) (`2024-05-25T15:15:08.133`)
|
||||
- [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-05-25T15:15:08.477`)
|
||||
- [CVE-2023-52585](CVE-2023/CVE-2023-525xx/CVE-2023-52585.json) (`2024-05-25T15:15:08.607`)
|
||||
- [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-05-25T15:15:08.700`)
|
||||
- [CVE-2024-26584](CVE-2024/CVE-2024-265xx/CVE-2024-26584.json) (`2024-05-25T15:15:08.847`)
|
||||
- [CVE-2024-26952](CVE-2024/CVE-2024-269xx/CVE-2024-26952.json) (`2024-05-25T15:15:08.950`)
|
||||
- [CVE-2024-27420](CVE-2024/CVE-2024-274xx/CVE-2024-27420.json) (`2024-05-25T14:15:51.757`)
|
||||
- [CVE-2024-27421](CVE-2024/CVE-2024-274xx/CVE-2024-27421.json) (`2024-05-25T14:15:51.860`)
|
||||
- [CVE-2024-27422](CVE-2024/CVE-2024-274xx/CVE-2024-27422.json) (`2024-05-25T14:15:51.940`)
|
||||
- [CVE-2024-27423](CVE-2024/CVE-2024-274xx/CVE-2024-27423.json) (`2024-05-25T14:15:52.053`)
|
||||
- [CVE-2024-27424](CVE-2024/CVE-2024-274xx/CVE-2024-27424.json) (`2024-05-25T14:15:52.140`)
|
||||
- [CVE-2024-27425](CVE-2024/CVE-2024-274xx/CVE-2024-27425.json) (`2024-05-25T14:15:52.253`)
|
||||
- [CVE-2024-27426](CVE-2024/CVE-2024-274xx/CVE-2024-27426.json) (`2024-05-25T14:15:52.420`)
|
||||
- [CVE-2024-27427](CVE-2024/CVE-2024-274xx/CVE-2024-27427.json) (`2024-05-25T14:15:52.570`)
|
||||
- [CVE-2024-27428](CVE-2024/CVE-2024-274xx/CVE-2024-27428.json) (`2024-05-25T14:15:52.687`)
|
||||
- [CVE-2024-27430](CVE-2024/CVE-2024-274xx/CVE-2024-27430.json) (`2024-05-25T14:15:52.803`)
|
||||
- [CVE-2024-35820](CVE-2024/CVE-2024-358xx/CVE-2024-35820.json) (`2024-05-25T14:15:52.920`)
|
||||
- [CVE-2024-35923](CVE-2024/CVE-2024-359xx/CVE-2024-35923.json) (`2024-05-25T14:15:53.013`)
|
||||
- [CVE-2024-36013](CVE-2024/CVE-2024-360xx/CVE-2024-36013.json) (`2024-05-25T15:15:09.070`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
44
_state.csv
44
_state.csv
@ -187199,7 +187199,7 @@ CVE-2021-47407,0,0,c09d6e551a5c12f305828cb7ab01a3431bf460f9ffebbfd4bdc0eabd4381f
|
||||
CVE-2021-47408,0,0,f13fa1f625479c9ceb1eca31878d390a370bf6be16a53f94f69450d189bc685d,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47409,0,0,efc056664e9da8be4ad86787f1fbadbd6f0fa50ebc36e2ebb3e4e3b22a295845,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47410,0,0,2a7bb71c7da3bda4c4b7f36e272cc229b86175b5eda810e893c27240c8b6ddff,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47411,0,0,79cae18ed4c969130385781e0598fb004edae2e6b80fce716a83f7ced2a4072c,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47411,0,1,20acb81d77364aabbf2c6277c12e29e99715fd6eda8851bf2a58ddb2c536c1dc,2024-05-25T14:15:50.770000
|
||||
CVE-2021-47412,0,0,83cd7bf818bdc7107aa51fbfdf7bb6b09994ad86f743fd40cf0d2887bf052858,2024-05-21T16:53:56.550000
|
||||
CVE-2021-47413,0,0,32a888e17d8f971bb7018619ca999ce68b48e1c088b5c22b13cb3fe07cf96996,2024-05-21T16:53:56.550000
|
||||
CVE-2021-47414,0,0,a9db430f77894869cc5dd7faf22551781bcbd5878bc21de7f87048f2998bbbdc,2024-05-21T16:53:56.550000
|
||||
@ -211957,7 +211957,7 @@ CVE-2022-48651,0,0,be0472f45e5b93bc292c90b67bea0d9edc1843d7532460583b02ee998a6d3
|
||||
CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48654,0,0,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000
|
||||
CVE-2022-48655,0,0,a65ec4eff6e7afc837074b4f9b8c00743a2af576677e13905af003a1a4ac6cec,2024-04-30T15:25:10.210000
|
||||
CVE-2022-48655,0,1,37cd795d730e6ea04dee936f7f3db8a497c73d0cdbcf55ad835a95ae413d10e9,2024-05-25T15:15:08.133000
|
||||
CVE-2022-48656,0,0,421f7ed2ce5f328d5dde3dd7f4b4775d8fed8db494e073ab5ceefd90d9745ccb,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48657,0,0,53792d17e92b7b0bb22b3f0ca741148607168d1927a6cc7adf210f04916eea6b,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48658,0,0,fea65c2de99597dc1d2d5a29bcf40302a5535ba0b6839e73e33083e36b201790,2024-04-30T15:07:59.460000
|
||||
@ -237914,7 +237914,7 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f
|
||||
CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000
|
||||
CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e333,2024-03-05T13:41:01.900000
|
||||
CVE-2023-52433,0,0,1ff15e0b84ada10d9fe85644e2eeee231a8e039de83865a18bc59793995bf899,2024-04-04T14:15:09.057000
|
||||
CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000
|
||||
CVE-2023-52434,0,1,61043d97db51beaa03b996bb515a81849feb688380f3650e2c9c091ff1e57ad5,2024-05-25T15:15:08.477000
|
||||
CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000
|
||||
CVE-2023-52436,0,0,6d56e388f92b7bd2842826d2d59561c86dc788acb9eb3d8b7e587b1b2a1d9fee,2024-04-19T17:36:10.083000
|
||||
CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000
|
||||
@ -238077,7 +238077,7 @@ CVE-2023-52581,0,0,fdddc64857d5bf65ab9bfb96aee4514d9d51008719a9a6bda751a9c4e1ddd
|
||||
CVE-2023-52582,0,0,af72e59c52b97139ded26cd2d75f3c2f4c5f30802b950ea3345cee3766393993,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52583,0,0,707bfceaab0b7f8849b42babcb612e0b81d64266f51c8cf81d5b3b70a8510929,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52584,0,0,294fd6cdb995cc1ce891fb09ba4fe5675061ff59f0b22f574ca6870ee520db80,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52585,0,0,e6ffd30561172f7d12f490d7f7a1b6b3372765a4b360eaf6b127506376fab205,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52585,0,1,e3c90b6844fbbec3158204b41d669e3e864244fecfce923284a114b6a90d14e4,2024-05-25T15:15:08.607000
|
||||
CVE-2023-52586,0,0,8e65ea7716873e2221da12e8eb2b0f2ae0fd71da3242e0f481a3cde4357c6304,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52587,0,0,beecd55f2955d4e763d5b12dba7b2a4e02b864009bee51706357ab7fe0fbb9ae,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52588,0,0,e70c44839baafdcc20e51cbf2dfc77df48c28605a1eba7f685512a034ccad0e9,2024-03-06T15:18:08.093000
|
||||
@ -238155,7 +238155,7 @@ CVE-2023-52652,0,0,ed03963bdef12b852fe6af3857f553344579f66b34ec0a7fe56b0c4bc4c55
|
||||
CVE-2023-52653,0,0,7229f3f01c830ab44bfdb842a01e7ef5c67953cbcae8c7257136f273e959a27d,2024-05-01T19:50:25.633000
|
||||
CVE-2023-52654,0,0,abb3623b53332c4c96cad8f4f887f39c06cad17656d62a949aae3c2a2fe665b5,2024-05-14T16:13:02.773000
|
||||
CVE-2023-52655,0,0,9acbaabbe37bbd08db0f3ae545fb80311202c279b18a4a3e1513aaa1eeecff85,2024-05-14T16:13:02.773000
|
||||
CVE-2023-52656,0,1,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000
|
||||
CVE-2023-52656,0,0,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000
|
||||
CVE-2023-52657,0,0,6871aa0fb754fcbbce38b0cff6cc198d2d0b546cfe2e7169aa642874b62e47d2,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52658,0,0,87615be2efefa2d7f9c0691bc4114693dd1c252c8d17f20c83498f63f31cb8b2,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52659,0,0,fa6fa9193666cfc6033a63c7c7e7dbe88d0e984a1034cd085ef674d3d981b566,2024-05-17T18:35:35.070000
|
||||
@ -245536,8 +245536,8 @@ CVE-2024-26579,0,0,e7e26cc1ec25e8460fedd94204ae0712ef15a288f9146dfe2ddd8ae344f5e
|
||||
CVE-2024-26580,0,0,e93e326bf874d6375913aabe9e4eb74306f223b50ee60aec567361b7229e49cb,2024-05-01T18:15:15.603000
|
||||
CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000
|
||||
CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
|
||||
CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000
|
||||
CVE-2024-26584,0,0,66b388a0a910522be9a0047ed118af49c4e847fe6cb3d187782320bcf2a1a2fe,2024-04-30T19:35:07.273000
|
||||
CVE-2024-26583,0,1,726c656148cecec3b16f282d95f5aca539c8bc49aecec4a2f82789f7170513fd,2024-05-25T15:15:08.700000
|
||||
CVE-2024-26584,0,1,e994a49c5784c2aa8e8a90a399cf2df45b03aad3977326b5cb0304543fe56747,2024-05-25T15:15:08.847000
|
||||
CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000
|
||||
CVE-2024-26586,0,0,d050b6a287d721bbbe29b94ce0748dfe771bab6092597ff9abd41f70e3acfd0b,2024-04-26T16:10:22.843000
|
||||
CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000
|
||||
@ -245939,7 +245939,7 @@ CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643
|
||||
CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3f8c,2024-05-23T19:13:56.890000
|
||||
CVE-2024-26950,0,0,8a29b231f495865acff77b1b51be2dd640990aa84617667fdf843369759a9352,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26951,0,0,66c5bd7c9276a41301f8c77e377af720392726a767d5d35afa945139b0225875,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26952,0,0,32734f4565aee2dd8cb7fb62ec448945bd1b887fa26309c982717007450ca20c,2024-05-23T19:14:05.133000
|
||||
CVE-2024-26952,0,1,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000
|
||||
CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26955,0,0,193de4cb2f5cc3de46a39ac33254bf215f8ca416fe0c9caf2ed526032a4a7a8a,2024-05-01T13:02:20.750000
|
||||
@ -246316,17 +246316,17 @@ CVE-2024-27417,0,0,b2766b3650ac8104bfdee8ebf6a912290217638a628c7afc8d2ea9a1ca14b
|
||||
CVE-2024-27418,0,0,2c99bf5f2d1d6ce1c50cc04d895bfadd85422cd83a8ee05f8cab0ce0a1020c44,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27419,0,0,50761c737493cbe77b9d5e44c63f6bfa4c6dc88baaa2cc6b9d7962e16b7508ae,2024-05-17T18:35:35.070000
|
||||
CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27420,0,0,ede0ff3119ad05d5744d52c39431be10b6d2287e26160e031ede179dc0256110,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27421,0,0,b0c96ff437fc0f3af46f2b36453c3a24d64b760924801257997f1a85b83329b5,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27422,0,0,ffcb6a325681882edb1ad091bd806064bb4d6915e287b002bf3899d2e60ed4c2,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27423,0,0,2fbbd5c4e171342a636889250d4512512f00f1c6e479439a80076f28d04dd2ba,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27424,0,0,91631aca5a2342a6b06bc848d202b65e00bdefebba4821ef996cc80f27ca4e68,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27425,0,0,d0a4ffb6c3bf483877d807ce93a2bf457a3e48dcbd591aa9eb21daeaa8f4b191,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27426,0,0,57e38d7dceba5b71a29b640162436c1c309ee40709b10bbffab5c3e7969a0a54,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27427,0,0,bb326f8d2c317b1381ef1a208cce48e3f05fc1fe29abb10b3a72c8773d4e0e06,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27428,0,0,45ec47cd7e59c8b20509beb3278a988ffcb4ae77198fddb8f7f996e7f4c6589e,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27420,0,1,181bdc7540bc7698c88f0e235087c87857818089b7c468c56a4c1750b675fe97,2024-05-25T14:15:51.757000
|
||||
CVE-2024-27421,0,1,3f5cb49ca23dfe67b37abe045ba080b6865eb0a621835198c7a6ca4ab5d107cd,2024-05-25T14:15:51.860000
|
||||
CVE-2024-27422,0,1,e4ef21ddd4c210d4e953951ceb14b3707bc316929c46f6da97bbe6e4e063bbe8,2024-05-25T14:15:51.940000
|
||||
CVE-2024-27423,0,1,9a7efd29f62b1b2e6088625d2d6a712ece7b528ef6cf4568f271b722595f613c,2024-05-25T14:15:52.053000
|
||||
CVE-2024-27424,0,1,ee57faf4ad53312b6473da0ccfdb1a7543978ee7f6310d2031276b585004f4ff,2024-05-25T14:15:52.140000
|
||||
CVE-2024-27425,0,1,e1f16a2fc6f9e6a8c1f01dafc74670e5d211cec431697a2743237ffe75cf508a,2024-05-25T14:15:52.253000
|
||||
CVE-2024-27426,0,1,435e4404658d4100f2722648feb9cb89e6fd6eefdeb8fa41c2b707833275cbb6,2024-05-25T14:15:52.420000
|
||||
CVE-2024-27427,0,1,a5e0bb1eb9dddbe621a76038e97dbb5a1e22ad2d3eee07e0a566bbc8af043e2e,2024-05-25T14:15:52.570000
|
||||
CVE-2024-27428,0,1,ea78bb280f9a53a6b506787004b62c38d567896934657d8b3f5126f855f09118,2024-05-25T14:15:52.687000
|
||||
CVE-2024-27429,0,0,ec3689eecc91e5ba4faa53ce00f63d5adc063318e2e0b4f5ade93be78bdbcd4a,2024-05-21T15:15:28.810000
|
||||
CVE-2024-27430,0,0,026b94daf24f9db7ecf42d62273aa75e4704304effd4682559aae82145d407f6,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27430,0,1,e8f5f3c3f666b15261835cea03a1b31ed58b3552a000ce08076960981f5e6ac3,2024-05-25T14:15:52.803000
|
||||
CVE-2024-27431,0,0,58046c19ffe8e1a8cb4e455715aebacc798178fa987f07fdf3bb32369a7106d3,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27432,0,0,303d8fec7893c92fbe0b58ad82f9d188208387d6d70b4e295af407f67151acae,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27433,0,0,ecc2b695acde4ece19084b28107224cc10655ef20eed95b85bbb2419ae723f0b,2024-05-17T18:35:35.070000
|
||||
@ -250556,7 +250556,7 @@ CVE-2024-35817,0,0,3f6dfe54139432f03cd619e4e40e379e37a174ec1ba2b8d0f90ceac557498
|
||||
CVE-2024-35818,0,0,1c8a7406c5c632a58ccdb4564dcecb6c857d2c152f060fa49f66293477dc4f8d,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35819,0,0,3295f9166021d2564b44ae9fadc77a3bc471ee9f121c3bceee79d30ae9d32a8e,2024-05-17T18:35:35.070000
|
||||
CVE-2024-3582,0,0,ccff8970706a85d3ee495e91ff392c6a7172ea5fbc74c301c7707e7f9af29a61,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35820,0,0,e4717e17f1a1b57fff3f7e8f5254368184572ef97ca3bdda78844610885add1a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35820,0,1,ef8937a48788ed835bd3f34798690b95d243eba50ca3caf796662dedc6c777fe,2024-05-25T14:15:52.920000
|
||||
CVE-2024-35821,0,0,b0fb494ea3f10cdbafda65c46c16a49f4922e072628cf82db77622ec4dcdfa8a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35822,0,0,f7f34e75e2491a508adbce5579397b331e438106a48cb1abc97468ad42cc7dfd,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35823,0,0,2299a87a9179587e4570a57ed30df64d45d7bd7081565fd383e88a9fa8d0ae70,2024-05-17T18:35:35.070000
|
||||
@ -250663,7 +250663,7 @@ CVE-2024-35919,0,0,568854d104b254315bb97c71b3664db3efeb4fc7ff9d4725619ba1a490fe1
|
||||
CVE-2024-35920,0,0,41ef2c7fa1f0ede5e558a1b35264c9b265e53851d1147a1d8d6cb10042a6885e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35921,0,0,498fd64cc206eb6b9a3fa96962a2750766d89f1d9401b68c98535a528845d314,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35922,0,0,da39c851dac73a381a9181aa35a8add26cbe66ce1bcb8227343d24c9c33bc3dd,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35923,0,0,f59915d1fc888a07a38d0bd25f92d0d27d72abfd25ee65a7680f1624a532c98f,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35923,0,1,83568754b2120c0dff38d3f5c97b39d0649d1b51c262a9dde7a7dfb26eda9e24,2024-05-25T14:15:53.013000
|
||||
CVE-2024-35924,0,0,01bf473a0ba0b0344e0fa3eed5e09649334fa4de4558bf979bfd7ddb6835fc8b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35925,0,0,4d115cfa199be842c351f116d81b0768cb5d310e84edcb243459b43b7873c104,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35926,0,0,0353eb736a807d9c4877ede1824705474fe3b6e1931359c3f7d97f253e19c738,2024-05-20T13:00:04.957000
|
||||
@ -250759,7 +250759,7 @@ CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb
|
||||
CVE-2024-36010,0,0,6f643d760193939acd403776f35d8094295a237f49299303e96b8a627d329d0e,2024-05-22T12:46:53.887000
|
||||
CVE-2024-36011,0,0,8c075216dcc359a31d2e8fafeb4a14485ec06edc9e34318ac3163ece10feb507,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36012,0,0,e4a88f8c3148ef3f19ebbe7f0a3b85cbde15492e4b96066a314f6e02d213b9b2,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36013,0,0,3ed463efc3a9b6f1e3cbae47b6793c5b9c3b1edddebf581d08e570b29b9e1478,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36013,0,1,1251c8e9d1d9ec0619ca01193822062d3235b343811763ddc34f761263e594d9,2024-05-25T15:15:09.070000
|
||||
CVE-2024-36039,0,0,7819448caea04349894603b655b7a026f4a20175e41e6c559f30343634b66d20,2024-05-21T16:53:56.550000
|
||||
CVE-2024-36043,0,0,8d68423d5fd19f184b1028d7213d8202af063db8832c1e9d8a6916cceea3f12f,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,0,b5cb97f8eb2dd5aaf745035f8a3442137591158895420be0c263c765fd00e4a2,2024-05-20T13:00:04.957000
|
||||
@ -251772,3 +251772,5 @@ CVE-2024-5312,0,0,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a
|
||||
CVE-2024-5314,0,0,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5315,0,0,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5318,0,0,23557c413419809da6545b8c1445586f3837718f3430ace9eed52e7e734c5a9b,2024-05-24T18:09:20.027000
|
||||
CVE-2024-5336,1,1,d1380b18449dc8c8c34e22c1b2a107ea89ee46ba4b9dd6f93e49bbe4388f53ae,2024-05-25T15:15:09.150000
|
||||
CVE-2024-5337,1,1,3d998f1cc9e000a28c5e2cf47948314577814d30a2ab7663340a4bad3cb9838f,2024-05-25T15:15:09.943000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user