diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47411.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47411.json index d26e87c595f..748172596db 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47411.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47411.json @@ -2,23 +2,14 @@ "id": "CVE-2021-47411", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:26.617", - "lastModified": "2024-05-21T16:54:26.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:50.770", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: allow conditional reschedule for intensive iterators\n\nIf we have a lot of threads and rings, the tctx list can get quite big.\nThis is especially true if we keep creating new threads and rings.\nLikewise for the provided buffers list. Be nice and insert a conditional\nreschedule point while iterating the nodes for deletion." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json index 58e01db5e8e..111be489ffd 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48655.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48655", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.623", - "lastModified": "2024-04-30T15:25:10.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-25T15:15:08.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -83,6 +83,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -96,6 +100,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json index 5f537d9a1da..6c6636f888f 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52434", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T18:15:50.790", - "lastModified": "2024-03-15T14:21:29.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-25T15:15:08.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -111,6 +111,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json index b600c59dd3e..931dfc3ceab 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52585.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52585", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:07.290", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-05-25T15:15:08.607", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,13 +16,33 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json index 46d5fced6de..86862d449b3 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T15:15:09.373", - "lastModified": "2024-03-15T13:05:03.220", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-25T15:15:08.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -111,6 +111,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json index 243b254090d..ce844fca15d 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26584", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T15:15:09.420", - "lastModified": "2024-04-30T19:35:07.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-25T15:15:08.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -91,6 +91,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json index a6edda01481..a0e773b9281 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26952", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.350", - "lastModified": "2024-05-23T19:14:05.133", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-25T15:15:08.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -90,6 +90,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27420.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27420.json index 02fd4bcc781..3a258f6b15c 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27420.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27420.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27420", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:13.993", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:51.757", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_link_fails_count\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27421.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27421.json index 2402e0ba619..cf3a46a233d 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27421.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27421.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27421", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:14.217", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:51.860", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_routing_control\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27422.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27422.json index a91ac22c377..3f025130d9b 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27422.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27422.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27422", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:14.437", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:51.940", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27423.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27423.json index 1a6b46b03cd..7414ac73c55 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27423.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27423.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27423", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:14.670", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.053", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_requested_window_size\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27424.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27424.json index 3173d6a2a26..bec52e959a4 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27424.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27424.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27424", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:14.910", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.140", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_busy_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27425.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27425.json index f753244dd16..f78c835080d 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27425.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27425.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27425", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:15.137", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.253", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_acknowledge_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27426.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27426.json index e422a87bb65..eb4718b2dc5 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27426.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27426.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27426", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:15.380", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.420", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_maximum_tries\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27427.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27427.json index cca7372a598..453f2330f28 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27427.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27427.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27427", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:15.600", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.570", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27428.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27428.json index c42f29dfec5..f1b9099f707 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27428.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27428.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27428", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:15.750", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.687", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_netrom_network_ttl_initialiser\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27430.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27430.json index 483630621c4..494ceb3e773 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27430.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27430.json @@ -2,47 +2,14 @@ "id": "CVE-2024-27430", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:16.200", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.803", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_default_path_quality\n\nWe need to protect the reader reading sysctl_netrom_default_path_quality\nbecause the value can be changed concurrently." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35820.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35820.json index 274f78bf9dd..132e463db3a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35820.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35820.json @@ -2,27 +2,14 @@ "id": "CVE-2024-35820", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:17.137", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:52.920", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix io_queue_proc modifying req->flags\n\nWith multiple poll entries __io_queue_proc() might be running in\nparallel with poll handlers and possibly task_work, we should not be\ncarelessly modifying req->flags there. io_poll_double_prepare() handles\na similar case with locking but it's much easier to move it into\n__io_arm_poll_handler()." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35923.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35923.json index 72aa547891b..d2ed70c9655 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35923.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35923.json @@ -2,31 +2,14 @@ "id": "CVE-2024-35923", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.587", - "lastModified": "2024-05-20T13:00:04.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-25T14:15:53.013", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: clear opcode specific data for an early failure\n\nIf failure happens before the opcode prep handler is called, ensure that\nwe clear the opcode specific area of the request, which holds data\nspecific to that request type. This prevents errors where opcode\nhandlers either don't get to clear per-request private data since prep\nisn't even called." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json index 433aca185e7..afe1fd1f687 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36013", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-23T07:15:08.987", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-05-25T15:15:09.070", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n ? mutex_lock(&conn->chan_lock);\n ? chan = pchan->ops->new_connection(pchan); <- alloc chan\n ? __l2cap_chan_add(conn, chan);\n ? l2cap_chan_hold(chan);\n ? list_add(&chan->list, &conn->chan_l); ... (1)\n ? mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n? mutex_lock(&conn->chan_lock);\n? foreach chan in conn->chan_l: ... (2)\n? l2cap_chan_put(chan);\n? l2cap_chan_destroy\n? kfree(chan) ... (3) <- chan freed\n? mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311" + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()\n\nExtend a critical section to prevent chan from early freeing.\nAlso make the l2cap_connect() return type void. Nothing is using the\nreturned value but it is ugly to return a potentially freed pointer.\nMaking it void will help with backports because earlier kernels did use\nthe return value. Now the compile will break for kernels where this\npatch is not a complete fix.\n\nCall stack summary:\n\n[use]\nl2cap_bredr_sig_cmd\n l2cap_connect\n \u250c mutex_lock(&conn->chan_lock);\n \u2502 chan = pchan->ops->new_connection(pchan); <- alloc chan\n \u2502 __l2cap_chan_add(conn, chan);\n \u2502 l2cap_chan_hold(chan);\n \u2502 list_add(&chan->list, &conn->chan_l); ... (1)\n \u2514 mutex_unlock(&conn->chan_lock);\n chan->conf_state ... (4) <- use after free\n\n[free]\nl2cap_conn_del\n\u250c mutex_lock(&conn->chan_lock);\n\u2502 foreach chan in conn->chan_l: ... (2)\n\u2502 l2cap_chan_put(chan);\n\u2502 l2cap_chan_destroy\n\u2502 kfree(chan) ... (3) <- chan freed\n\u2514 mutex_unlock(&conn->chan_lock);\n\n==================================================================\nBUG: KASAN: slab-use-after-free in instrument_atomic_read\ninclude/linux/instrumented.h:68 [inline]\nBUG: KASAN: slab-use-after-free in _test_bit\ninclude/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0\nnet/bluetooth/l2cap_core.c:4260\nRead of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige slab-use-after-free en l2cap_connect() Amplia una secci\u00f3n cr\u00edtica para evitar que chan se libere anticipadamente. Tambi\u00e9n anule el tipo de retorno l2cap_connect(). Nada utiliza el valor devuelto, pero es feo devolver un puntero potencialmente liberado. Anularlo ayudar\u00e1 con los backports porque los kernels anteriores usaban el valor de retorno. Ahora la compilaci\u00f3n se interrumpir\u00e1 en los n\u00facleos en los que este parche no sea una soluci\u00f3n completa. Resumen de la pila de llamadas: [usar] l2cap_bredr_sig_cmd l2cap_connect ? mutex_lock(&conn->chan_lock); ? chan = pchan->ops->new_connection(pchan); <-alloc chan? __l2cap_chan_add(conexi\u00f3n, chan); ? l2cap_chan_hold(chan); ? list_add(&chan->lista, &conn->chan_l); ... (1) ? mutex_unlock(&conn->chan_lock); chan->conf_state... (4) <- usar despu\u00e9s de gratis [gratis] l2cap_conn_del? mutex_lock(&conn->chan_lock); ? foreach chan en conn->chan_l: ... (2)? l2cap_chan_put(chan); ? l2cap_chan_destroy? kfree(chan) ... (3) <- chan liberado? mutex_unlock(&conn->chan_lock); ==================================================== ================ ERROR: KASAN: slab-use-after-free en instrument_atomic_read include/linux/instrumented.h:68 [en l\u00ednea] ERROR: KASAN: slab-use-after -free en _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [en l\u00ednea] ERROR: KASAN: slab-use-after-free en l2cap_connect+0xa67/0x11a0 net/bluetooth/l2cap_core.c:4260 Lectura del tama\u00f1o 8 en addr ffff88810bf040a0 por tarea kworker/u3:1/311" } ], "metrics": {}, @@ -15,6 +19,14 @@ { "url": "https://git.kernel.org/stable/c/4d7b41c0e43995b0e992b9f8903109275744b658", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/826af9d2f69567c646ff46d10393d47e30ad23c6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cfe560c7050bfb37b0d2491bbe7cd8b59e77fdc5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5336.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5336.json new file mode 100644 index 00000000000..a7a97a520de --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5336.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5336", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-25T15:15:09.150", + "lastModified": "2024-05-25T15:15:09.150", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Ruijie RG-UAC up to 20240516 and classified as critical. This vulnerability affects the function addVlan of the file /view/networkConfig/vlan/vlan_add_commit.php. The manipulation of the argument phyport leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266242 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-vlan%3Avlan_add_commit.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.266242", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.266242", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.336031", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5337.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5337.json new file mode 100644 index 00000000000..f4e907ecb3a --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5337.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5337", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-25T15:15:09.943", + "lastModified": "2024-05-25T15:15:09.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Ruijie RG-UAC up to 20240516 and classified as critical. This issue affects some unknown processing of the file /view/systemConfig/sys_user/user_commit.php. The manipulation of the argument email2/user_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266243. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/z%7CYVDv%7CHKA)*%5CdK!/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-sys_user%3Auser_commit.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.266243", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.266243", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.336032", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 679d52ffbfe..4e6c4eb2fd2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-25T10:00:37.890498+00:00 +2024-05-25T16:00:38.507125+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-25T08:15:08.223000+00:00 +2024-05-25T15:15:09.943000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251773 +251775 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +- [CVE-2024-5336](CVE-2024/CVE-2024-53xx/CVE-2024-5336.json) (`2024-05-25T15:15:09.150`) +- [CVE-2024-5337](CVE-2024/CVE-2024-53xx/CVE-2024-5337.json) (`2024-05-25T15:15:09.943`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `20` -- [CVE-2023-52656](CVE-2023/CVE-2023-526xx/CVE-2023-52656.json) (`2024-05-25T08:15:08.223`) +- [CVE-2021-47411](CVE-2021/CVE-2021-474xx/CVE-2021-47411.json) (`2024-05-25T14:15:50.770`) +- [CVE-2022-48655](CVE-2022/CVE-2022-486xx/CVE-2022-48655.json) (`2024-05-25T15:15:08.133`) +- [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-05-25T15:15:08.477`) +- [CVE-2023-52585](CVE-2023/CVE-2023-525xx/CVE-2023-52585.json) (`2024-05-25T15:15:08.607`) +- [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-05-25T15:15:08.700`) +- [CVE-2024-26584](CVE-2024/CVE-2024-265xx/CVE-2024-26584.json) (`2024-05-25T15:15:08.847`) +- [CVE-2024-26952](CVE-2024/CVE-2024-269xx/CVE-2024-26952.json) (`2024-05-25T15:15:08.950`) +- [CVE-2024-27420](CVE-2024/CVE-2024-274xx/CVE-2024-27420.json) (`2024-05-25T14:15:51.757`) +- [CVE-2024-27421](CVE-2024/CVE-2024-274xx/CVE-2024-27421.json) (`2024-05-25T14:15:51.860`) +- [CVE-2024-27422](CVE-2024/CVE-2024-274xx/CVE-2024-27422.json) (`2024-05-25T14:15:51.940`) +- [CVE-2024-27423](CVE-2024/CVE-2024-274xx/CVE-2024-27423.json) (`2024-05-25T14:15:52.053`) +- [CVE-2024-27424](CVE-2024/CVE-2024-274xx/CVE-2024-27424.json) (`2024-05-25T14:15:52.140`) +- [CVE-2024-27425](CVE-2024/CVE-2024-274xx/CVE-2024-27425.json) (`2024-05-25T14:15:52.253`) +- [CVE-2024-27426](CVE-2024/CVE-2024-274xx/CVE-2024-27426.json) (`2024-05-25T14:15:52.420`) +- [CVE-2024-27427](CVE-2024/CVE-2024-274xx/CVE-2024-27427.json) (`2024-05-25T14:15:52.570`) +- [CVE-2024-27428](CVE-2024/CVE-2024-274xx/CVE-2024-27428.json) (`2024-05-25T14:15:52.687`) +- [CVE-2024-27430](CVE-2024/CVE-2024-274xx/CVE-2024-27430.json) (`2024-05-25T14:15:52.803`) +- [CVE-2024-35820](CVE-2024/CVE-2024-358xx/CVE-2024-35820.json) (`2024-05-25T14:15:52.920`) +- [CVE-2024-35923](CVE-2024/CVE-2024-359xx/CVE-2024-35923.json) (`2024-05-25T14:15:53.013`) +- [CVE-2024-36013](CVE-2024/CVE-2024-360xx/CVE-2024-36013.json) (`2024-05-25T15:15:09.070`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7afea783b74..6900bdafc79 100644 --- a/_state.csv +++ b/_state.csv @@ -187199,7 +187199,7 @@ CVE-2021-47407,0,0,c09d6e551a5c12f305828cb7ab01a3431bf460f9ffebbfd4bdc0eabd4381f CVE-2021-47408,0,0,f13fa1f625479c9ceb1eca31878d390a370bf6be16a53f94f69450d189bc685d,2024-05-21T16:54:26.047000 CVE-2021-47409,0,0,efc056664e9da8be4ad86787f1fbadbd6f0fa50ebc36e2ebb3e4e3b22a295845,2024-05-21T16:54:26.047000 CVE-2021-47410,0,0,2a7bb71c7da3bda4c4b7f36e272cc229b86175b5eda810e893c27240c8b6ddff,2024-05-21T16:54:26.047000 -CVE-2021-47411,0,0,79cae18ed4c969130385781e0598fb004edae2e6b80fce716a83f7ced2a4072c,2024-05-21T16:54:26.047000 +CVE-2021-47411,0,1,20acb81d77364aabbf2c6277c12e29e99715fd6eda8851bf2a58ddb2c536c1dc,2024-05-25T14:15:50.770000 CVE-2021-47412,0,0,83cd7bf818bdc7107aa51fbfdf7bb6b09994ad86f743fd40cf0d2887bf052858,2024-05-21T16:53:56.550000 CVE-2021-47413,0,0,32a888e17d8f971bb7018619ca999ce68b48e1c088b5c22b13cb3fe07cf96996,2024-05-21T16:53:56.550000 CVE-2021-47414,0,0,a9db430f77894869cc5dd7faf22551781bcbd5878bc21de7f87048f2998bbbdc,2024-05-21T16:53:56.550000 @@ -211957,7 +211957,7 @@ CVE-2022-48651,0,0,be0472f45e5b93bc292c90b67bea0d9edc1843d7532460583b02ee998a6d3 CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000 CVE-2022-48654,0,0,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000 -CVE-2022-48655,0,0,a65ec4eff6e7afc837074b4f9b8c00743a2af576677e13905af003a1a4ac6cec,2024-04-30T15:25:10.210000 +CVE-2022-48655,0,1,37cd795d730e6ea04dee936f7f3db8a497c73d0cdbcf55ad835a95ae413d10e9,2024-05-25T15:15:08.133000 CVE-2022-48656,0,0,421f7ed2ce5f328d5dde3dd7f4b4775d8fed8db494e073ab5ceefd90d9745ccb,2024-04-29T12:42:03.667000 CVE-2022-48657,0,0,53792d17e92b7b0bb22b3f0ca741148607168d1927a6cc7adf210f04916eea6b,2024-04-29T12:42:03.667000 CVE-2022-48658,0,0,fea65c2de99597dc1d2d5a29bcf40302a5535ba0b6839e73e33083e36b201790,2024-04-30T15:07:59.460000 @@ -237914,7 +237914,7 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000 CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e333,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,1ff15e0b84ada10d9fe85644e2eeee231a8e039de83865a18bc59793995bf899,2024-04-04T14:15:09.057000 -CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000 +CVE-2023-52434,0,1,61043d97db51beaa03b996bb515a81849feb688380f3650e2c9c091ff1e57ad5,2024-05-25T15:15:08.477000 CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000 CVE-2023-52436,0,0,6d56e388f92b7bd2842826d2d59561c86dc788acb9eb3d8b7e587b1b2a1d9fee,2024-04-19T17:36:10.083000 CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000 @@ -238077,7 +238077,7 @@ CVE-2023-52581,0,0,fdddc64857d5bf65ab9bfb96aee4514d9d51008719a9a6bda751a9c4e1ddd CVE-2023-52582,0,0,af72e59c52b97139ded26cd2d75f3c2f4c5f30802b950ea3345cee3766393993,2024-03-04T13:58:23.447000 CVE-2023-52583,0,0,707bfceaab0b7f8849b42babcb612e0b81d64266f51c8cf81d5b3b70a8510929,2024-03-06T15:18:08.093000 CVE-2023-52584,0,0,294fd6cdb995cc1ce891fb09ba4fe5675061ff59f0b22f574ca6870ee520db80,2024-03-06T15:18:08.093000 -CVE-2023-52585,0,0,e6ffd30561172f7d12f490d7f7a1b6b3372765a4b360eaf6b127506376fab205,2024-03-06T15:18:08.093000 +CVE-2023-52585,0,1,e3c90b6844fbbec3158204b41d669e3e864244fecfce923284a114b6a90d14e4,2024-05-25T15:15:08.607000 CVE-2023-52586,0,0,8e65ea7716873e2221da12e8eb2b0f2ae0fd71da3242e0f481a3cde4357c6304,2024-03-06T15:18:08.093000 CVE-2023-52587,0,0,beecd55f2955d4e763d5b12dba7b2a4e02b864009bee51706357ab7fe0fbb9ae,2024-03-06T15:18:08.093000 CVE-2023-52588,0,0,e70c44839baafdcc20e51cbf2dfc77df48c28605a1eba7f685512a034ccad0e9,2024-03-06T15:18:08.093000 @@ -238155,7 +238155,7 @@ CVE-2023-52652,0,0,ed03963bdef12b852fe6af3857f553344579f66b34ec0a7fe56b0c4bc4c55 CVE-2023-52653,0,0,7229f3f01c830ab44bfdb842a01e7ef5c67953cbcae8c7257136f273e959a27d,2024-05-01T19:50:25.633000 CVE-2023-52654,0,0,abb3623b53332c4c96cad8f4f887f39c06cad17656d62a949aae3c2a2fe665b5,2024-05-14T16:13:02.773000 CVE-2023-52655,0,0,9acbaabbe37bbd08db0f3ae545fb80311202c279b18a4a3e1513aaa1eeecff85,2024-05-14T16:13:02.773000 -CVE-2023-52656,0,1,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000 +CVE-2023-52656,0,0,a2ba970fe2072825dc59aa666db6b1d8ed0a0ea894a620126ae9bd0a12591403,2024-05-25T08:15:08.223000 CVE-2023-52657,0,0,6871aa0fb754fcbbce38b0cff6cc198d2d0b546cfe2e7169aa642874b62e47d2,2024-05-17T18:35:35.070000 CVE-2023-52658,0,0,87615be2efefa2d7f9c0691bc4114693dd1c252c8d17f20c83498f63f31cb8b2,2024-05-17T18:35:35.070000 CVE-2023-52659,0,0,fa6fa9193666cfc6033a63c7c7e7dbe88d0e984a1034cd085ef674d3d981b566,2024-05-17T18:35:35.070000 @@ -245536,8 +245536,8 @@ CVE-2024-26579,0,0,e7e26cc1ec25e8460fedd94204ae0712ef15a288f9146dfe2ddd8ae344f5e CVE-2024-26580,0,0,e93e326bf874d6375913aabe9e4eb74306f223b50ee60aec567361b7229e49cb,2024-05-01T18:15:15.603000 CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000 CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 -CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000 -CVE-2024-26584,0,0,66b388a0a910522be9a0047ed118af49c4e847fe6cb3d187782320bcf2a1a2fe,2024-04-30T19:35:07.273000 +CVE-2024-26583,0,1,726c656148cecec3b16f282d95f5aca539c8bc49aecec4a2f82789f7170513fd,2024-05-25T15:15:08.700000 +CVE-2024-26584,0,1,e994a49c5784c2aa8e8a90a399cf2df45b03aad3977326b5cb0304543fe56747,2024-05-25T15:15:08.847000 CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000 CVE-2024-26586,0,0,d050b6a287d721bbbe29b94ce0748dfe771bab6092597ff9abd41f70e3acfd0b,2024-04-26T16:10:22.843000 CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000 @@ -245939,7 +245939,7 @@ CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643 CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3f8c,2024-05-23T19:13:56.890000 CVE-2024-26950,0,0,8a29b231f495865acff77b1b51be2dd640990aa84617667fdf843369759a9352,2024-05-01T13:02:20.750000 CVE-2024-26951,0,0,66c5bd7c9276a41301f8c77e377af720392726a767d5d35afa945139b0225875,2024-05-01T13:02:20.750000 -CVE-2024-26952,0,0,32734f4565aee2dd8cb7fb62ec448945bd1b887fa26309c982717007450ca20c,2024-05-23T19:14:05.133000 +CVE-2024-26952,0,1,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000 CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000 CVE-2024-26955,0,0,193de4cb2f5cc3de46a39ac33254bf215f8ca416fe0c9caf2ed526032a4a7a8a,2024-05-01T13:02:20.750000 @@ -246316,17 +246316,17 @@ CVE-2024-27417,0,0,b2766b3650ac8104bfdee8ebf6a912290217638a628c7afc8d2ea9a1ca14b CVE-2024-27418,0,0,2c99bf5f2d1d6ce1c50cc04d895bfadd85422cd83a8ee05f8cab0ce0a1020c44,2024-05-17T18:35:35.070000 CVE-2024-27419,0,0,50761c737493cbe77b9d5e44c63f6bfa4c6dc88baaa2cc6b9d7962e16b7508ae,2024-05-17T18:35:35.070000 CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000 -CVE-2024-27420,0,0,ede0ff3119ad05d5744d52c39431be10b6d2287e26160e031ede179dc0256110,2024-05-17T18:35:35.070000 -CVE-2024-27421,0,0,b0c96ff437fc0f3af46f2b36453c3a24d64b760924801257997f1a85b83329b5,2024-05-17T18:35:35.070000 -CVE-2024-27422,0,0,ffcb6a325681882edb1ad091bd806064bb4d6915e287b002bf3899d2e60ed4c2,2024-05-17T18:35:35.070000 -CVE-2024-27423,0,0,2fbbd5c4e171342a636889250d4512512f00f1c6e479439a80076f28d04dd2ba,2024-05-17T18:35:35.070000 -CVE-2024-27424,0,0,91631aca5a2342a6b06bc848d202b65e00bdefebba4821ef996cc80f27ca4e68,2024-05-17T18:35:35.070000 -CVE-2024-27425,0,0,d0a4ffb6c3bf483877d807ce93a2bf457a3e48dcbd591aa9eb21daeaa8f4b191,2024-05-17T18:35:35.070000 -CVE-2024-27426,0,0,57e38d7dceba5b71a29b640162436c1c309ee40709b10bbffab5c3e7969a0a54,2024-05-17T18:35:35.070000 -CVE-2024-27427,0,0,bb326f8d2c317b1381ef1a208cce48e3f05fc1fe29abb10b3a72c8773d4e0e06,2024-05-17T18:35:35.070000 -CVE-2024-27428,0,0,45ec47cd7e59c8b20509beb3278a988ffcb4ae77198fddb8f7f996e7f4c6589e,2024-05-17T18:35:35.070000 +CVE-2024-27420,0,1,181bdc7540bc7698c88f0e235087c87857818089b7c468c56a4c1750b675fe97,2024-05-25T14:15:51.757000 +CVE-2024-27421,0,1,3f5cb49ca23dfe67b37abe045ba080b6865eb0a621835198c7a6ca4ab5d107cd,2024-05-25T14:15:51.860000 +CVE-2024-27422,0,1,e4ef21ddd4c210d4e953951ceb14b3707bc316929c46f6da97bbe6e4e063bbe8,2024-05-25T14:15:51.940000 +CVE-2024-27423,0,1,9a7efd29f62b1b2e6088625d2d6a712ece7b528ef6cf4568f271b722595f613c,2024-05-25T14:15:52.053000 +CVE-2024-27424,0,1,ee57faf4ad53312b6473da0ccfdb1a7543978ee7f6310d2031276b585004f4ff,2024-05-25T14:15:52.140000 +CVE-2024-27425,0,1,e1f16a2fc6f9e6a8c1f01dafc74670e5d211cec431697a2743237ffe75cf508a,2024-05-25T14:15:52.253000 +CVE-2024-27426,0,1,435e4404658d4100f2722648feb9cb89e6fd6eefdeb8fa41c2b707833275cbb6,2024-05-25T14:15:52.420000 +CVE-2024-27427,0,1,a5e0bb1eb9dddbe621a76038e97dbb5a1e22ad2d3eee07e0a566bbc8af043e2e,2024-05-25T14:15:52.570000 +CVE-2024-27428,0,1,ea78bb280f9a53a6b506787004b62c38d567896934657d8b3f5126f855f09118,2024-05-25T14:15:52.687000 CVE-2024-27429,0,0,ec3689eecc91e5ba4faa53ce00f63d5adc063318e2e0b4f5ade93be78bdbcd4a,2024-05-21T15:15:28.810000 -CVE-2024-27430,0,0,026b94daf24f9db7ecf42d62273aa75e4704304effd4682559aae82145d407f6,2024-05-17T18:35:35.070000 +CVE-2024-27430,0,1,e8f5f3c3f666b15261835cea03a1b31ed58b3552a000ce08076960981f5e6ac3,2024-05-25T14:15:52.803000 CVE-2024-27431,0,0,58046c19ffe8e1a8cb4e455715aebacc798178fa987f07fdf3bb32369a7106d3,2024-05-17T18:35:35.070000 CVE-2024-27432,0,0,303d8fec7893c92fbe0b58ad82f9d188208387d6d70b4e295af407f67151acae,2024-05-17T18:35:35.070000 CVE-2024-27433,0,0,ecc2b695acde4ece19084b28107224cc10655ef20eed95b85bbb2419ae723f0b,2024-05-17T18:35:35.070000 @@ -250556,7 +250556,7 @@ CVE-2024-35817,0,0,3f6dfe54139432f03cd619e4e40e379e37a174ec1ba2b8d0f90ceac557498 CVE-2024-35818,0,0,1c8a7406c5c632a58ccdb4564dcecb6c857d2c152f060fa49f66293477dc4f8d,2024-05-17T18:35:35.070000 CVE-2024-35819,0,0,3295f9166021d2564b44ae9fadc77a3bc471ee9f121c3bceee79d30ae9d32a8e,2024-05-17T18:35:35.070000 CVE-2024-3582,0,0,ccff8970706a85d3ee495e91ff392c6a7172ea5fbc74c301c7707e7f9af29a61,2024-05-14T16:11:39.510000 -CVE-2024-35820,0,0,e4717e17f1a1b57fff3f7e8f5254368184572ef97ca3bdda78844610885add1a,2024-05-17T18:35:35.070000 +CVE-2024-35820,0,1,ef8937a48788ed835bd3f34798690b95d243eba50ca3caf796662dedc6c777fe,2024-05-25T14:15:52.920000 CVE-2024-35821,0,0,b0fb494ea3f10cdbafda65c46c16a49f4922e072628cf82db77622ec4dcdfa8a,2024-05-17T18:35:35.070000 CVE-2024-35822,0,0,f7f34e75e2491a508adbce5579397b331e438106a48cb1abc97468ad42cc7dfd,2024-05-17T18:35:35.070000 CVE-2024-35823,0,0,2299a87a9179587e4570a57ed30df64d45d7bd7081565fd383e88a9fa8d0ae70,2024-05-17T18:35:35.070000 @@ -250663,7 +250663,7 @@ CVE-2024-35919,0,0,568854d104b254315bb97c71b3664db3efeb4fc7ff9d4725619ba1a490fe1 CVE-2024-35920,0,0,41ef2c7fa1f0ede5e558a1b35264c9b265e53851d1147a1d8d6cb10042a6885e,2024-05-20T13:00:04.957000 CVE-2024-35921,0,0,498fd64cc206eb6b9a3fa96962a2750766d89f1d9401b68c98535a528845d314,2024-05-20T13:00:04.957000 CVE-2024-35922,0,0,da39c851dac73a381a9181aa35a8add26cbe66ce1bcb8227343d24c9c33bc3dd,2024-05-20T13:00:04.957000 -CVE-2024-35923,0,0,f59915d1fc888a07a38d0bd25f92d0d27d72abfd25ee65a7680f1624a532c98f,2024-05-20T13:00:04.957000 +CVE-2024-35923,0,1,83568754b2120c0dff38d3f5c97b39d0649d1b51c262a9dde7a7dfb26eda9e24,2024-05-25T14:15:53.013000 CVE-2024-35924,0,0,01bf473a0ba0b0344e0fa3eed5e09649334fa4de4558bf979bfd7ddb6835fc8b,2024-05-20T13:00:04.957000 CVE-2024-35925,0,0,4d115cfa199be842c351f116d81b0768cb5d310e84edcb243459b43b7873c104,2024-05-20T13:00:04.957000 CVE-2024-35926,0,0,0353eb736a807d9c4877ede1824705474fe3b6e1931359c3f7d97f253e19c738,2024-05-20T13:00:04.957000 @@ -250759,7 +250759,7 @@ CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb CVE-2024-36010,0,0,6f643d760193939acd403776f35d8094295a237f49299303e96b8a627d329d0e,2024-05-22T12:46:53.887000 CVE-2024-36011,0,0,8c075216dcc359a31d2e8fafeb4a14485ec06edc9e34318ac3163ece10feb507,2024-05-24T01:15:30.977000 CVE-2024-36012,0,0,e4a88f8c3148ef3f19ebbe7f0a3b85cbde15492e4b96066a314f6e02d213b9b2,2024-05-24T01:15:30.977000 -CVE-2024-36013,0,0,3ed463efc3a9b6f1e3cbae47b6793c5b9c3b1edddebf581d08e570b29b9e1478,2024-05-24T01:15:30.977000 +CVE-2024-36013,0,1,1251c8e9d1d9ec0619ca01193822062d3235b343811763ddc34f761263e594d9,2024-05-25T15:15:09.070000 CVE-2024-36039,0,0,7819448caea04349894603b655b7a026f4a20175e41e6c559f30343634b66d20,2024-05-21T16:53:56.550000 CVE-2024-36043,0,0,8d68423d5fd19f184b1028d7213d8202af063db8832c1e9d8a6916cceea3f12f,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,b5cb97f8eb2dd5aaf745035f8a3442137591158895420be0c263c765fd00e4a2,2024-05-20T13:00:04.957000 @@ -251772,3 +251772,5 @@ CVE-2024-5312,0,0,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a CVE-2024-5314,0,0,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000 CVE-2024-5318,0,0,23557c413419809da6545b8c1445586f3837718f3430ace9eed52e7e734c5a9b,2024-05-24T18:09:20.027000 +CVE-2024-5336,1,1,d1380b18449dc8c8c34e22c1b2a107ea89ee46ba4b9dd6f93e49bbe4388f53ae,2024-05-25T15:15:09.150000 +CVE-2024-5337,1,1,3d998f1cc9e000a28c5e2cf47948314577814d30a2ab7663340a4bad3cb9838f,2024-05-25T15:15:09.943000