-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-10-24T22:00:18.909139+00:00
- Loading branch information
1 parent
fdb76a4
commit 47316cb
Showing
55 changed files
with
2,103 additions
and
351 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2022-48958", | ||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"published": "2024-10-21T20:15:07.270", | ||
"lastModified": "2024-10-23T15:13:25.583", | ||
"vulnStatus": "Awaiting Analysis", | ||
"lastModified": "2024-10-24T20:00:34.033", | ||
"vulnStatus": "Analyzed", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
|
@@ -15,39 +15,199 @@ | |
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ethernet: aeroflex: se corrige una posible fuga de skb en greth_init_rings() La funci\u00f3n greth_init_rings() no liberar\u00e1 el skb reci\u00e9n asignado cuando dma_mapping_error() devuelva un error, por lo que se debe agregar dev_kfree_skb() para corregirlo. Solo se prob\u00f3 la compilaci\u00f3n." | ||
} | ||
], | ||
"metrics": {}, | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", | ||
"attackVector": "LOCAL", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 5.5, | ||
"baseSeverity": "MEDIUM" | ||
}, | ||
"exploitabilityScore": 1.8, | ||
"impactScore": 3.6 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-401" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
{ | ||
"nodes": [ | ||
{ | ||
"operator": "OR", | ||
"negate": false, | ||
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "2.6.34", | ||
"versionEndExcluding": "4.9.336", | ||
"matchCriteriaId": "DE72942B-2F89-4BEA-A298-C2FA7DCC6DB5" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.10", | ||
"versionEndExcluding": "4.14.302", | ||
"matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.15", | ||
"versionEndExcluding": "4.19.269", | ||
"matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.20", | ||
"versionEndExcluding": "5.4.227", | ||
"matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.5", | ||
"versionEndExcluding": "5.10.159", | ||
"matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.11", | ||
"versionEndExcluding": "5.15.83", | ||
"matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.16", | ||
"versionEndExcluding": "6.0.13", | ||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", | ||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", | ||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", | ||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", | ||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", | ||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", | ||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", | ||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", | ||
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://git.kernel.org/stable/c/063a932b64db3317ec020c94466fe52923a15f60", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/223654e2e2c8d05347cd8e300f8d1ec6023103dd", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/87277bdf2c370ab2d07cfe77dfa9b37f82bbe1e5", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/99669d94ce145389f1d6f197e6e18ed50d43fb76", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/bfaa8f6c5b84b295dd73b0138b57c5555ca12b1c", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/c7adcbd0fd3fde1b19150c3e955fb4a30c5bd9b7", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/cb1e293f858e5e1152b8791047ed4bdaaf392189", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/dd62867a6383f78f75f07039394aac25924a3307", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2022-48961", | ||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"published": "2024-10-21T20:15:07.887", | ||
"lastModified": "2024-10-23T15:13:25.583", | ||
"vulnStatus": "Awaiting Analysis", | ||
"lastModified": "2024-10-24T20:02:22.347", | ||
"vulnStatus": "Analyzed", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
|
@@ -15,19 +15,129 @@ | |
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mdio: arregla el recuento de referencias de fwnode no balanceado en mdio_device_release() Hay un informe de advertencia sobre una fuga de recuento de referencias de of_node mientras se sondea el dispositivo mdio: OF: ERROR: fuga de memoria, se esperaba un recuento de referencias de 1 en lugar de 2, of_node_get()/of_node_put() no balanceado - destruye la entrada de cset: adjunta el nodo superpuesto /spi/soc@0/mdio@710700c0/ethernet@4 En of_mdiobus_register_device(), aumentamos el recuento de referencias de fwnode mediante fwnode_handle_get() antes de asociar el of_node con el dispositivo mdio, pero nunca se ha reducido en la ruta normal. Desde entonces, en mdio_device_release(), necesita llamar a fwnode_handle_put() adem\u00e1s en lugar de llamar a kfree() directamente. Despu\u00e9s de lo anterior, simplemente llamar a mdio_device_free() en la ruta del controlador de errores de of_mdiobus_register_device() es suficiente para mantener el recuento de referencias equilibrado." | ||
} | ||
], | ||
"metrics": {}, | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", | ||
"attackVector": "LOCAL", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 5.5, | ||
"baseSeverity": "MEDIUM" | ||
}, | ||
"exploitabilityScore": 1.8, | ||
"impactScore": 3.6 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "NVD-CWE-Other" | ||
} | ||
] | ||
} | ||
], | ||
"configurations": [ | ||
{ | ||
"nodes": [ | ||
{ | ||
"operator": "OR", | ||
"negate": false, | ||
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "4.5", | ||
"versionEndExcluding": "5.15.83", | ||
"matchCriteriaId": "73BF1A37-67E4-474D-84C2-1BDDFC244D25" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", | ||
"versionStartIncluding": "5.16", | ||
"versionEndExcluding": "6.0.13", | ||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", | ||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", | ||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", | ||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", | ||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", | ||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", | ||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", | ||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" | ||
}, | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", | ||
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://git.kernel.org/stable/c/16854177745a5648f8ec322353b432e18460f43a", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/a5c6de1a6656b8cc6bce7cb3d9874dd7df4968c3", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://git.kernel.org/stable/c/cb37617687f2bfa5b675df7779f869147c9002bd", | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"tags": [ | ||
"Patch" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29929", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-08-21T18:15:09.173", | ||
"lastModified": "2024-08-22T21:15:15.840", | ||
"lastModified": "2024-10-24T20:35:02.040", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -46,7 +46,7 @@ | |
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-121" | ||
"value": "CWE-787" | ||
} | ||
] | ||
} | ||
|
Oops, something went wrong.