Auto-Update: 2024-09-13T14:00:17.314056+00:00

This commit is contained in:
cad-safe-bot 2024-09-13 14:03:15 +00:00
parent 264d9a5598
commit cc89b20cd0
11 changed files with 1029 additions and 97 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52897",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.120",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:52:07.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: qgroup: no advertir en el registro sin old_roots poblado [ERROR] Hay algunos informes de la lista de correo que desde el kernel v6.1, WARN_ON() dentro de btrfs_qgroup_account_extent() se activa durante la nueva exploraci\u00f3n: ADVERTENCIA: CPU: 3 PID: 6424 en fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] CPU: 3 PID: 6424 Comm: snapperd Contaminado: P OE 6.1.2-1- predeterminado #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7 RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] Seguimiento de llamadas: btrfs_commit_transaction+0x30c/0xb40 c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f 6]btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]? __rseq_handle_notify_resume+0xa9/0x4a0 ? mntput_no_expire+0x4a/0x240? __seccomp_filter+0x319/0x4d0 __x64_sys_ioctl+0x90/0xd0 do_syscall_64+0x5b/0x80 ? syscall_exit_to_user_mode+0x17/0x40? do_syscall_64+0x67/0x80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd9b790d9bf [CAUSA] Desde el commit e15e9f43c7ca (\"btrfs: introduzca BTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING para omitir la contabilidad de qgroup\"), si qgroup ya est\u00e1 en estado inconsistente, no lo haremos Ya no hagas la larga caminata hacia atr\u00e1s. Esto puede dejar algunos registros de qgroup sin una lista old_roots v\u00e1lida. Normalmente, esto est\u00e1 bien, ya que btrfs_qgroup_account_extents() tambi\u00e9n omitir\u00eda esos registros si tenemos configurado el indicador NO_ACCOUNTING. Pero hay una peque\u00f1a ventana, si tenemos el indicador NO_ACCOUNTING configurado e insertamos alg\u00fan qgroup_record sin una lista old_roots, pero luego el usuario activ\u00f3 una nueva exploraci\u00f3n de qgroup. Durante btrfs_qgroup_rescan(), primero borramos el indicador NO_ACCOUNTING y luego confirmamos la transacci\u00f3n actual. Y como tenemos un qgroup_record con old_roots = NULL, activamos WARN_ON() durante btrfs_qgroup_account_extents(). [FIX] Desafortunadamente, debido a la introducci\u00f3n del indicador NO_ACCOUNTING, la suposici\u00f3n de que cada qgroup_record tendr\u00eda sus old_roots completadas ya no es correcta. Corrija las alertas falsas y elimine WARN_ON()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "0EF71645-1ABD-4584-8FEC-AF3D155E1F5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/75181406b4eafacc531ff2ee5fb032bd93317e2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb2c2e62539f2b63c5e0beb51501d328260c7595",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52898",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.180",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:46:50.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,150 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xhci: corrige la desreferencia del puntero nulo cuando el host muere. Aseg\u00farese de que xhci_free_dev() y xhci_kill_endpoint_urbs() no corran y provoquen una desreferencia del puntero nulo cuando el host muere repentinamente. El n\u00facleo USB puede llamar a xhci_free_dev(), lo que libera el dispositivo virt xhci->devs[slot_id] al mismo tiempo que xhci_kill_endpoint_urbs() intenta recorrer todos los endpoints del dispositivo, verificando si quedan urbs canceladas para devolver. mantenga presionado el xhci spinlock mientras libera el dispositivo virt"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.271",
"matchCriteriaId": "96C6211C-C372-4AC3-90D8-2535A98604D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/081105213ff6f661c114781d469233c7d0e09c2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/133b902378e4acbd824c29dd0d48570ad596e368",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6fac4b5cecb3928a0a81069aaa815a2edc8dd5a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2bc47c43e70cf904b1af49f76d572326c08bca7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c462ac871f49753eca86bb960f573b993976a5ea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea2ee5e9991caf74e0604f994c1831a5867055b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52899",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.237",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:44:43.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,150 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Agregar procesamiento de protecci\u00f3n de excepci\u00f3n para vd en la funci\u00f3n axi_chan_handle_err Dado que no hay protecci\u00f3n para vd, aqu\u00ed se activar\u00e1 un p\u00e1nico del kernel en casos excepcionales. Puede consultar el procesamiento de la funci\u00f3n axi_chan_block_xfer_complete. El p\u00e1nico del kernel desencadenado es el siguiente: [67.848444] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000060 [67.848447] Informaci\u00f3n de cancelaci\u00f3n de memoria: [67.848449] ESR = 0x96000004 [67.8 48451] CE = 0x25 : DABT (EL actual), IL = 32 bits [ 67.848454] SET = 0, FnV = 0 [ 67.848456] EA = 0, S1PTW = 0 [ 67.848458] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 67.848460] ISV = 0, ISS = 0x00000004 [ 67.848462 ] CM = 0, WnR = 0 [ 67.848465] tabla de p\u00e1ginas de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=00000800c4c0b000 [ 67.848468] [0000000000000060] pgd=0000000000000000, 000000000000 [67.848472] Error interno: Ups: 96000004 [#1 ] SMP [67.848475] M\u00f3dulos vinculados en: dmatest [67.848479] CPU: 0 PID: 0 Comm: swapper/0 No contaminado 5.10.100-emu_x2rc+ #11 [67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE= --) [67.848487] pc: axi_chan_handle_err+0xc4/0x230 [67.848491] lr: axi_chan_handle_err+0x30/0x230 [67.848493] sp: ffff0803fe55ae50 [67.848495] x29: fe55ae50 x28: ffff800011212200 [ 67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080 [ 67.848504] x25: ffff800010d33880 x24: ffff80001139d850 [ 67.848508] x23: ffff0800c097c168 x22: 0000000000000000 [ 67.848512] x21: 0000000000000080 x20: 0000000000002000 [ 67.848517] x19: ffff0800c097c080 x18: 0000000000000000 [ 67.848521] x17: 0000000000000000 x16: 0000000000000 000 [67.848525] x15: 0000000000000000 x14: 0000000000000000 [ 67.848529] x13: 0000000000000000 x12: 0000000000000040 [ 67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a [ 67.848538] x9: ffff800010576cd4 x8: ffff0800c0400270 [67.848542] x7: 0000000000000000 x6: ffff0800c04003e0 [67.848546] x5: 8x4: ffff0800c4294480 [67.848550] x3 : dead000000000100 x2 : dead000000000122 [ 67.848555 ] x1 : 0000000000000100 x0 : ffff0800c097c168 [ 67.848559 ] Rastreo de llamadas: [ 67.848562] 0x230 [ 67.848566] dw_axi_dma_interrupt+0xf4/0x590 [ 67.848569] __handle_irq_event_percpu+0x60/0x220 [ 67.848573] handle_irq_event+0x64 /0x120 [ 67.848576] handle_fasteoi_irq+0xc4/0x220 [ 67.848580] __handle_domain_irq+0x80/0xe0 [ 67.848583] gic_handle_irq+0xc0/0x138 [ 67.848585] 0x180 [67.848588] arch_cpu_idle+0x14/0x2c [67.848591] default_idle_call+0x40/0x16c [ 67.848594] do_idle+0x1f0/0x250 [ 67.848597] cpu_startup_entry+0x2c/0x60 [ 67.848600] rest_init+0xc0/0xcc [ 67.848603] arch_call_rest_init+0x14/0x1c [ 67.84860 6] start_kernel+0x4cc/0x500 [ 67.848610] C\u00f3digo: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 ( a94602c1) [67.848613] ---[ final de seguimiento 585a97036f88203a ]---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.271",
"matchCriteriaId": "96C6211C-C372-4AC3-90D8-2535A98604D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/20d0a6d17e85a8a816a64fa7d7cae616f1617833",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5054d001ffaf76155637c5e5b922c11016cd6a5d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/51a7ad5b60efac65691729d10745c28fa1016b96",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/53dd833fd0a2d8f0118d01ea063a70652689d31e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/57054fe516d59d03a7bcf1888e82479ccc244f87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f534dc438828cc3f1f8c6895b8bdfbef079521fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52900",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.297",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:40:28.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,164 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: soluciona el fallo de protecci\u00f3n general en nilfs_btree_insert() Si nilfs2 lee una imagen de disco corrupta e intenta leer un bloque de nodo de \u00e1rbol b llamando a __nilfs_btree_get_block() contra una direcci\u00f3n de bloque virtual no v\u00e1lida, devuelve -ENOENT porque falla la conversi\u00f3n de la direcci\u00f3n del bloque virtual a una direcci\u00f3n de bloque de disco. Sin embargo, este valor de retorno es el mismo que el c\u00f3digo interno que devuelven las rutinas de b\u00fasqueda del \u00e1rbol b para indicar que el bloque que se busca no existe, por lo que las funciones que operan en ese \u00e1rbol b pueden comportarse mal. Cuando nilfs_btree_insert() recibe este c\u00f3digo falso 'no encontrado' de nilfs_btree_do_lookup(), malinterpreta que la verificaci\u00f3n 'no encontrado' fue exitosa y contin\u00faa la operaci\u00f3n de inserci\u00f3n utilizando datos de ruta de b\u00fasqueda incompletos, lo que provoca el siguiente bloqueo: falla de protecci\u00f3n general, probablemente por direcci\u00f3n no can\u00f3nica 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en el rango [0x0000000000000028-0x000000000000002f] ... RIP: 0010:nilfs_btree_get_nonroot_node fs/nilfs 2/btree.c:418 [en l\u00ednea] RIP: 0010:nilfs_btree_prepare_insert fs/nilfs2/btree.c:1077 [en l\u00ednea] RIP: 0010:nilfs_btree_insert+0x6d3/0x1c10 fs/nilfs2/btree.c:1238 C\u00f3digo: bc 24 80 00 00 00 4c 89 f8 48 c1 e8 3 42 80 3c 28 00 74 08 4c 89 ff e8 4b 02 92 fe 4d 8b 3f 49 83 c7 28 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 2e 02 92 fe 4d 8b f 49 83 c7 02... Seguimiento de llamadas: nilfs_bmap_do_insert fs/nilfs2/bmap.c:121 [en l\u00ednea] nilfs_bmap_insert+0x20d/0x360 fs/nilfs2/bmap.c:147 nilfs_get_block+0x414/0x8d0 fs/nilfs2/inode.c: 101 __block_write_begin_int+0x54c/0x1a80 fs/buffer.c:1991 __block_write_begin fs/buffer.c:2041 [en l\u00ednea] block_write_begin+0x93/0x1e0 fs/buffer.c:2102 nilfs_write_begin+0x9c/0x110 fs/nilfs2/inode.c :261 generic_perform_write+0x2e4/0x5e0 mm/filemap.c:3772 __generic_file_write_iter+0x176/0x400 mm/filemap.c:3900 generic_file_write_iter+0xab/0x310 mm/filemap.c:3932 call_write_iter include/linux/fs.h:2186 [en l\u00ednea] new_sync_write fs/read_write.c:491 [en l\u00ednea] vfs_write+0x7dc/0xc50 fs/read_write.c:584 ksys_write+0x177/0x2a0 fs/read_write.c:637 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64 +0x3d/0xb0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd ... Este parche soluciona la causa ra\u00edz de este problema reemplazando el c\u00f3digo de error que devuelve __nilfs_btree_get_block() en la conversi\u00f3n de direcciones de bloque falla de -ENOENT a otro c\u00f3digo interno -EINVAL, lo que significa que los metadatos del \u00e1rbol b est\u00e1n da\u00f1ados. Al devolver -EINVAL, se propaga sin fallos y, para todas las operaciones relevantes del \u00e1rbol b, las funciones en la capa superior del mapa b generan un mensaje de error que indica metadatos del \u00e1rbol b corruptos a trav\u00e9s de nilfs_bmap_convert_error(), y el c\u00f3digo -EIO se devolver\u00e1 eventualmente cuando deber\u00eda ser."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.304",
"matchCriteriaId": "E8A9B982-D3D6-49CA-BF0A-196ED7947B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.271",
"matchCriteriaId": "D86DA289-B5BC-4629-BD56-AB453D481393"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0bf463939c09e5b2c35c71ed74a5fd60a74d6a04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3c2a2ff67d46106715c2132021b98bd057c27545",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/45627a1a6450662e1e0f8174ef07b05710a20062",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/712bd74eccb9d3626a0a236641962eca8e11a243",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7633355e5c7f29c049a9048e461427d1d8ed3051",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b0ba060d3287108eba17603bee3810e4cf2c272d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d9fde9eab1766170ff2ade67d09178d2cfd78749",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52901",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.363",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:37:17.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,165 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: xhci: verifique que el endpoint sea v\u00e1lido antes de desreferenciarlo. Cuando el controlador de host no responde, se deben eliminar todas las URB en cola para todos los endpoints. Esto puede provocar un p\u00e1nico en el kernel si eliminamos la referencia a un endpoint no v\u00e1lido. Solucione este problema utilizando el asistente xhci_get_virt_ep() para encontrar el endpoint y comprobar si es v\u00e1lido antes de desreferenciarlo. [233311.853271] xhci-hcd xhci-hcd.1.auto: El controlador de host xHCI no responde, se supone muerto [233311.853393] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000000000e8 [233311.853964] pc: xhci_hc_died+0x10c/ 0x270 [233311.853971] lr : xhci_hc_died+0x1ac/0x270 [233311.854077] Rastreo de llamadas: [233311.854085] xhci_hc_died+0x10c/0x270 [233311.854093] xhci_stop_endpoint_command_watchdog+0x100/0x1a4 11.854105] call_timer_fn+0x50/0x2d4 [233311.854112] expire_timers+0xac/0x2e4 [233311.854118] run_timer_softirq+0x300 /0xabc [233311.854127] __do_softirq+0x148/0x528 [233311.854135] irq_exit+0x194/0x1a8 [233311.854143] __handle_domain_irq+0x164/0x1d0 [233311.854149] gic_handle_irq.22273+0x10c/0x188 [233311.854156] el1_irq+0xfc/0x1a8 [233311.854175] lpm_cpuidle_enter+0x25c /0x418 [msm_pm] [233311.854185] cpuidle_enter_state+0x1f0/0x764 [233311.854194] do_idle+0x594/0x6ac [233311.854201] cpu_startup_entry+0x7c/0x80 [233311.8542 09] kernel_inicio_secundario+0x170/0x198"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.15",
"versionEndExcluding": "4.14.304",
"matchCriteriaId": "A0519E43-4E92-4BCE-92E7-956733784203"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.271",
"matchCriteriaId": "D86DA289-B5BC-4629-BD56-AB453D481393"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/08864dc14a6803f0377ca77b9740b26db30c020f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2d2820d5f375563690c96e60676855205abfb7f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/375be2dd61a072f7b1cac9b17eea59e07b58db3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66fc1600855c05c4ba4e997184c91cf298e0405c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9891e5c73cab3fd9ed532dc50e9799e55e974766",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e8fb5bc76eb86437ab87002d4a36d6da02165654",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f39c813af0b64f44af94e435c07bfa1ddc2575f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52902",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.427",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:29:35.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nommu: corrige la p\u00e9rdida de memoria en la ruta de error do_mmap() La preasignaci\u00f3n de los nodos del \u00e1rbol de arce puede perderse si se toma la ruta de error a \"error_just_free\". Solucione este problema moviendo la liberaci\u00f3n de los nodos del \u00e1rbol de arce a una ubicaci\u00f3n compartida para todas las rutas de error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "0EF71645-1ABD-4584-8FEC-AF3D155E1F5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1442d51026c58e7c11dd5f9b19650632a48676d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f31cced5724e6d414fe750aa1cd7e7b578ec22f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52903",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.480",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:34:10.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring: bloqueo desbordado para IOPOLL syzbot informa un problema con el desbordamiento de llenado para IOPOLL: ADVERTENCIA: CPU: 0 PID: 28 en io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring /io_uring.c:734 CPU: 0 PID: 28 Comm: kworker/u4:1 No contaminado 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 Cola de trabajo: events_unbound io_ring_exit_work Seguimiento de llamadas: io_cqring_event_overflow+0x1c0/0x230 durante. c:734 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773 io_fill_cqe_req io_uring/io_uring.h:168 [en l\u00ednea] io_do_iopoll+0x474/0x62c io_uring/rw.c:1065 io_iopoll_try_reap_events+0x6c /0x108 io_uring/io_uring.c:1513 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869 Process_one_work+0x2d8/0x504 kernel/workqueue.c:2289 trabajador_thread+0x340/0x610 ue.c:2436 khilo+ 0x12c/0x158 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863 No hay ning\u00fan problema real para IOPOLL normal ya que tambi\u00e9n se llama a descarga con uring_lock tomado, pero se est\u00e1 volviendo m\u00e1s complicado para IOPOLL |SQPOLL, para el cual __io_cqring_overflow_flush() ocurre desde la ruta de espera de CQ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.10.165",
"matchCriteriaId": "90BB6D42-B4A2-4088-8C86-2F91DFA6B7B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.89",
"matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/544d163d659d45a206d8929370d5a2984e546cb7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7fc3990dad04a677606337ebc61964094d6cb41b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de77faee280163ff03b7ab64af6c9d779a43d4c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ed4629d1e968359fbb91d0a3780b1e86a2c08845",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52905",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.597",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:27:29.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: octeontx2-pf: corrige la p\u00e9rdida de recursos en la desvinculaci\u00f3n del controlador VF, los recursos asignados como entradas mcam para admitir la funci\u00f3n Ntuple y las tablas hash para la funci\u00f3n tc no se liberan en la desvinculaci\u00f3n del controlador. Este parche soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "31088A83-E12D-4B47-A54D-6AC0CE631DBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/53da7aec32982f5ee775b69dce06d63992ce4af3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c8ca0ad10df08ea36bcac1288062d567d22604c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52906",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:06.663",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-13T13:21:31.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,132 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: act_mpls: Advertencia de correcci\u00f3n durante la validaci\u00f3n fallida del atributo El atributo 'TCA_MPLS_LABEL' es de tipo 'NLA_U32', pero tiene un tipo de validaci\u00f3n de 'NLA_VALIDATE_FUNCTION'. Esta es una combinaci\u00f3n no v\u00e1lida seg\u00fan el comentario anterior 'struct nla_policy': \" Significado del campo `validar', util\u00edcelo a trav\u00e9s de NLA_POLICY_VALIDATE_FN: NLA_BINARY Funci\u00f3n de validaci\u00f3n llamada para el atributo. Todos los dem\u00e1s no utilizados, pero tenga en cuenta que es una uni\u00f3n \" Esto puede desencadenar la advertencia [1] en nla_get_range_unsigned() cuando falla la validaci\u00f3n del atributo. A pesar de ser del tipo 'NLA_U32', los campos 'min'/'max' asociados en la pol\u00edtica son negativos ya que tienen un alias del campo 'validate'. Para solucionarlo, cambie el tipo de atributo a 'NLA_BINARY', que es coherente con el comentario anterior y con todos los dem\u00e1s usuarios de NLA_POLICY_VALIDATE_FN(). Como resultado, mueva la validaci\u00f3n de longitud a la funci\u00f3n de validaci\u00f3n. No hay regresiones en las pruebas MPLS: # ./tdc.py -f tc-tests/actions/mpls.json [...] # echo $? 0 [1] ADVERTENCIA: CPU: 0 PID: 17743 en lib/nlattr.c:118 nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117 M\u00f3dulos vinculados en: CPU: 0 PID: 17743 Comm: syz-executor.0 No tainted 6.1.0-rc8 #3 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 01/04/2014 RIP: 0010:nla_get_range_unsigned+0x1d8 /0x1e0 lib/nlattr.c:117 [...] Seguimiento de llamadas: __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310 netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411 netlink_ack_tlv_fill net /netlink/af_netlink.c:2454 [en l\u00ednea] netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506 netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546 rtnetlink_rcv+0x18/0x20 net/core/rtnetlink. c:6109 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [en l\u00ednea] netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/socket.c :714 [en l\u00ednea] sock_sendmsg net/socket.c:734 [en l\u00ednea] ____sys_sendmsg+0x38f/0x500 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [en l\u00ednea] __sys_sendmsg+0x197/0x230 net/socket.c: 2565 __do_sys_sendmsg net/socket.c:2574 [en l\u00ednea] __se_sys_sendmsg net/socket.c:2572 [en l\u00ednea] __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x63/0xcd"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3",
"versionEndExcluding": "5.4.229",
"matchCriteriaId": "6B9D0314-C8F6-4538-867F-2873DF2287F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.164",
"matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.89",
"matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2b157c3c5d6b8ddca48d53c9e662032f65af8d61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/453277feb41c2235cf2c0de9209eef962c401457",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8a97b544b98e44f596219ebb290fd2ba2fd5d644",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9e17f99220d111ea031b44153fdfe364b0024ff2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9e2c38827cdc6fdd3bb375c8607fc04d289756f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-13T12:00:18.429494+00:00
2024-09-13T14:00:17.314056+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-13T11:15:10.197000+00:00
2024-09-13T13:52:07.717000+00:00
```
### Last Data Feed Release
@ -38,22 +38,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `0`
- [CVE-2024-41874](CVE-2024/CVE-2024-418xx/CVE-2024-41874.json) (`2024-09-13T10:15:12.447`)
- [CVE-2024-43756](CVE-2024/CVE-2024-437xx/CVE-2024-43756.json) (`2024-09-13T10:15:14.680`)
- [CVE-2024-43760](CVE-2024/CVE-2024-437xx/CVE-2024-43760.json) (`2024-09-13T10:15:15.230`)
- [CVE-2024-45108](CVE-2024/CVE-2024-451xx/CVE-2024-45108.json) (`2024-09-13T10:15:15.747`)
- [CVE-2024-45109](CVE-2024/CVE-2024-451xx/CVE-2024-45109.json) (`2024-09-13T10:15:16.243`)
- [CVE-2024-45113](CVE-2024/CVE-2024-451xx/CVE-2024-45113.json) (`2024-09-13T10:15:16.737`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `9`
- [CVE-2024-5203](CVE-2024/CVE-2024-52xx/CVE-2024-5203.json) (`2024-09-13T11:15:10.197`)
- [CVE-2024-8584](CVE-2024/CVE-2024-85xx/CVE-2024-8584.json) (`2024-09-13T10:15:17.263`)
- [CVE-2023-52897](CVE-2023/CVE-2023-528xx/CVE-2023-52897.json) (`2024-09-13T13:52:07.717`)
- [CVE-2023-52898](CVE-2023/CVE-2023-528xx/CVE-2023-52898.json) (`2024-09-13T13:46:50.963`)
- [CVE-2023-52899](CVE-2023/CVE-2023-528xx/CVE-2023-52899.json) (`2024-09-13T13:44:43.737`)
- [CVE-2023-52900](CVE-2023/CVE-2023-529xx/CVE-2023-52900.json) (`2024-09-13T13:40:28.597`)
- [CVE-2023-52901](CVE-2023/CVE-2023-529xx/CVE-2023-52901.json) (`2024-09-13T13:37:17.943`)
- [CVE-2023-52902](CVE-2023/CVE-2023-529xx/CVE-2023-52902.json) (`2024-09-13T13:29:35.047`)
- [CVE-2023-52903](CVE-2023/CVE-2023-529xx/CVE-2023-52903.json) (`2024-09-13T13:34:10.847`)
- [CVE-2023-52905](CVE-2023/CVE-2023-529xx/CVE-2023-52905.json) (`2024-09-13T13:27:29.043`)
- [CVE-2023-52906](CVE-2023/CVE-2023-529xx/CVE-2023-52906.json) (`2024-09-13T13:21:31.360`)
## Download and Usage

View File

@ -239375,17 +239375,17 @@ CVE-2023-52893,0,0,9c2f38972fb9e70993a351c4c16b267a6d15a20b4593db0977c433afd0019
CVE-2023-52894,0,0,6d218b09574096830a1f66cebf0b72d0697d41881d6e7e7a0cfbbccbdc528449,2024-09-11T16:27:06.380000
CVE-2023-52895,0,0,9af8606e42f1ce53366652ea28480cbee8f2520cb886d98166b8d3b37e5b6dcf,2024-09-11T16:31:31.597000
CVE-2023-52896,0,0,6fe49f4668c388af2fb1f9a88e5f63a7d4d48f3f3091c277c4ba0ab76df70826,2024-09-11T16:37:08.107000
CVE-2023-52897,0,0,558ef169b610a44b7ba556172294469193852f08e7c0125b660ef6dd8975472e,2024-08-21T12:30:33.697000
CVE-2023-52898,0,0,98ec58874365faa56899adf607030137d0b9838759a93b6c999987d2252c2b09,2024-08-21T12:30:33.697000
CVE-2023-52899,0,0,3fba36cad7e7087e80a63d519b33f7765b601ccfcd23bc5d1180072367388f7a,2024-08-21T12:30:33.697000
CVE-2023-52897,0,1,82ea702a29a167dbe1aea297b904df4acd5df926ddd877a86decfa85e1827764,2024-09-13T13:52:07.717000
CVE-2023-52898,0,1,87ae5facdceebe399a7f1f9a387c18ce93ddec14c4c5aa2bb180bbdd2ecd7bb6,2024-09-13T13:46:50.963000
CVE-2023-52899,0,1,356cea640a8fe9e8b88426e733c437063ce74572a5b4c93f5b0efe510a9e09d1,2024-09-13T13:44:43.737000
CVE-2023-5290,0,0,255136b2a2d1074a86a7ffaaa04fac7dce086f58333ef45175fedd871048a368,2023-11-07T04:23:48.727000
CVE-2023-52900,0,0,620b8be36b8f2b58ff94b9a8f25827c3618e3fea7a6035146e1faae9c9b58d00,2024-08-21T12:30:33.697000
CVE-2023-52901,0,0,c28d4e6473323a17dd90c14eabe37b54b6af385fb8bee09eb798db503194bd64,2024-08-21T12:30:33.697000
CVE-2023-52902,0,0,b345f17ddc9484e396839ef01e7e490db98cc6cf2ec0ff1caae9c3d445b09c55,2024-08-21T12:30:33.697000
CVE-2023-52903,0,0,d922c0b6c6ba3ec4c40fc116bfc41efaafcb21134cb7a8690210dc69e5586347,2024-08-21T12:30:33.697000
CVE-2023-52900,0,1,fa74a9620442c747d640716778ee895f7e51a7fd4ede23941baaf3f55fc72c61,2024-09-13T13:40:28.597000
CVE-2023-52901,0,1,17d956bf011862d4ed72f6c4c300d6ac50c0d1e2794f5e87aa4a800bd96b114d,2024-09-13T13:37:17.943000
CVE-2023-52902,0,1,4528435f8244164798b67a658a5e039af6318eee73a849214c8ddf277c607cc3,2024-09-13T13:29:35.047000
CVE-2023-52903,0,1,9b02d3d9fef56eac33b5f8af58b6afb240881e3359f57ff691200bdac5b1d982,2024-09-13T13:34:10.847000
CVE-2023-52904,0,0,62544b3a8012d31e091228e7522ebe54f4eb49d347fb9beb25c7e58fc8e46ebf,2024-09-12T17:22:46.040000
CVE-2023-52905,0,0,03dfd45469c5dbe0fccc3e21152dd6845f9d3290abc3f07c2476edbdd31ead32,2024-08-21T12:30:33.697000
CVE-2023-52906,0,0,5be340f900a447b138c7a11c9c32330c21841a8c27915ba1003ccfb90f2f3116,2024-08-21T12:30:33.697000
CVE-2023-52905,0,1,ac1339eeef0aa72ed2b5a0fdf583ce6abb6b73ad4a70a42f22b1da84676e9d74,2024-09-13T13:27:29.043000
CVE-2023-52906,0,1,4252a949bfcd1e1a4210db7f344f9eae9cc4af9e8d71b07b8b1140b10cd9a070,2024-09-13T13:21:31.360000
CVE-2023-52907,0,0,ad58a061f060cfc772ad70fe84fc42f9f57329722dd517b009a22d763de1643e,2024-09-12T16:06:17.460000
CVE-2023-52908,0,0,531fb64c1bafc6ed44bf1e0f48c909a289409c64299751ace32af4157b44a112,2024-09-12T14:54:41.943000
CVE-2023-52909,0,0,d5706817190bc5ee11d87d5ab7bd4d1a37d41b6be25533876d8fa9a349e63a04,2024-09-12T14:52:54.573000
@ -257851,7 +257851,7 @@ CVE-2024-41870,0,0,330cf7f3efc6d46134f4145c34d923106cd31afd0f2d97f0309cd1f9f71ef
CVE-2024-41871,0,0,7b509d8edddf510e10468441bbf14bc563f351a62bc5ac242492a18371df9d6a,2024-09-13T07:15:04.097000
CVE-2024-41872,0,0,94a432ba56a73538cff555b02d20e1a217abc045428083b5b2d7aa1bb7fd3cfa,2024-09-13T07:15:04.440000
CVE-2024-41873,0,0,32fda75ae0c0af01400945b9e98c8e8de4b825cd92b4259f0b9b28429af029c7,2024-09-13T07:15:04.790000
CVE-2024-41874,1,1,8fb9e89e2099e54c6610cb6664b71afe375476abb055e9b33b87b37d3fee1d7e,2024-09-13T10:15:12.447000
CVE-2024-41874,0,0,8fb9e89e2099e54c6610cb6664b71afe375476abb055e9b33b87b37d3fee1d7e,2024-09-13T10:15:12.447000
CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000
CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000
CVE-2024-41877,0,0,6103adaf29f838766c82e017d2b75c7c95c893efc9460aaf0a14a2c0a2483c27,2024-08-27T14:46:02.147000
@ -258896,11 +258896,11 @@ CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
CVE-2024-4374,0,0,3d209a7da2a70008bba3efc6941e41bec948a9636ca11ef89a139bc015911837,2024-05-20T13:00:34.807000
CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b39a,2024-07-05T13:30:13.850000
CVE-2024-43756,1,1,2bd07c66b868e6c4aa74ac4ee8bd8397e0a05a093fee4ab2589e043129bd83d8,2024-09-13T10:15:14.680000
CVE-2024-43756,0,0,2bd07c66b868e6c4aa74ac4ee8bd8397e0a05a093fee4ab2589e043129bd83d8,2024-09-13T10:15:14.680000
CVE-2024-43758,0,0,d37c7f2b8c065e6368fa6a8888a406f20cae1c5cb456872dcbc325cd6eb2b98b,2024-09-13T09:15:11.970000
CVE-2024-43759,0,0,d0a313708cf662b1639df58b5434b6d6c322ffb2cd47843faf4b6b971e883c4b,2024-09-13T09:15:12.457000
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
CVE-2024-43760,1,1,5595e79ee9bdd2bcb37c3e2954b175e16d4f62c76e3bfb357320108920905547,2024-09-13T10:15:15.230000
CVE-2024-43760,0,0,5595e79ee9bdd2bcb37c3e2954b175e16d4f62c76e3bfb357320108920905547,2024-09-13T10:15:15.230000
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
CVE-2024-43772,0,0,7297107a23dc16d1d705abb3658b9be9738cd3c6f64b998fe580ef95204d1bb8,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,8c0c6d6cc6b93c34cfa09ef3705fb324f136fe885f1952674b354433c7d54205,2024-09-04T12:26:08.270000
@ -259444,12 +259444,12 @@ CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290
CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000
CVE-2024-45107,0,0,d5e30880270706ae80f98d427d6a3501f7b9d607b88b780b72f90a000a13f3a6,2024-09-06T16:26:03.440000
CVE-2024-45108,1,1,314d51270e5e32fc65835d8dbc206328fdf9adff232d6549a8497b258d125831,2024-09-13T10:15:15.747000
CVE-2024-45109,1,1,ce924fd0f310983c486fa8bc5cc181060474707ef0a20b7fffd6af26ad734e13,2024-09-13T10:15:16.243000
CVE-2024-45108,0,0,314d51270e5e32fc65835d8dbc206328fdf9adff232d6549a8497b258d125831,2024-09-13T10:15:15.747000
CVE-2024-45109,0,0,ce924fd0f310983c486fa8bc5cc181060474707ef0a20b7fffd6af26ad734e13,2024-09-13T10:15:16.243000
CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3d1,2024-06-04T19:20:40.443000
CVE-2024-45111,0,0,bfa2e8a7d67b866ff29cab043246b82c71e0b55b9ef7dd25f84ed0005e317e90,2024-09-13T09:15:13.263000
CVE-2024-45112,0,0,9d7884ca5716e9f0198d3eae08f5f59cf7b6c2a6fbb9c2c2f7760f32bbdc48bc,2024-09-13T09:15:13.947000
CVE-2024-45113,1,1,d7ec2cb90330a9ff066499441bacb911f45c7c1f05f92dfaabdf18ae40782e19,2024-09-13T10:15:16.737000
CVE-2024-45113,0,0,d7ec2cb90330a9ff066499441bacb911f45c7c1f05f92dfaabdf18ae40782e19,2024-09-13T10:15:16.737000
CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000
CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
@ -260277,7 +260277,7 @@ CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d9
CVE-2024-5199,0,0,b4a715f38452d2cc5e068f9017ba6f7a4addbc0174602d2e5033e840ab453f3a,2024-08-02T15:01:14.247000
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
CVE-2024-5202,0,0,506e1bf31418d031771b54eb5cec35a7698867910819f07cfbd45cd0a9a0bcc0,2024-05-24T01:15:30.977000
CVE-2024-5203,0,1,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000
CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000
CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000
CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e385d,2024-05-24T13:03:11.993000
CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca4436,2024-06-17T19:15:59.190000
@ -262749,7 +262749,7 @@ CVE-2024-8579,0,0,5ca39278224613960d2995fc71f5451de91cb55696583bb2c29af9edc66fba
CVE-2024-8580,0,0,f51aa5c8e3665529b80cf204d693b0b0f66df0f643575c721707f6f32dd401a5,2024-09-10T15:47:47.397000
CVE-2024-8582,0,0,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d5365,2024-09-10T15:48:30.537000
CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000
CVE-2024-8584,0,1,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000

Can't render this file because it is too large.