From 4e5e8da9c6ad89d6762bff0b03018831345e0338 Mon Sep 17 00:00:00 2001
From: cad-safe-bot <cad-safe-bot@protonmail.com>
Date: Sun, 28 Jan 2024 13:00:28 +0000
Subject: [PATCH] Auto-Update: 2024-01-28T13:00:24.637500+00:00

---
 CVE-2024/CVE-2024-08xx/CVE-2024-0841.json | 47 +++++++++++++++++++++++
 README.md                                 | 14 +++----
 2 files changed, 53 insertions(+), 8 deletions(-)
 create mode 100644 CVE-2024/CVE-2024-08xx/CVE-2024-0841.json

diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json
new file mode 100644
index 00000000000..9ab272bae2c
--- /dev/null
+++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json
@@ -0,0 +1,47 @@
+{
+  "id": "CVE-2024-0841",
+  "sourceIdentifier": "secalert@redhat.com",
+  "published": "2024-01-28T12:15:52.737",
+  "lastModified": "2024-01-28T12:15:52.737",
+  "vulnStatus": "Received",
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system."
+    }
+  ],
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "secalert@redhat.com",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "HIGH",
+          "baseScore": 6.6,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 4.7
+      }
+    ]
+  },
+  "references": [
+    {
+      "url": "https://access.redhat.com/security/cve/CVE-2024-0841",
+      "source": "secalert@redhat.com"
+    },
+    {
+      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256490",
+      "source": "secalert@redhat.com"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/README.md b/README.md
index e9654067484..d5c3cad9a3a 100644
--- a/README.md
+++ b/README.md
@@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
 ### Last Repository Update
 
 ```plain
-2024-01-28T11:00:24.984933+00:00
+2024-01-28T13:00:24.637500+00:00
 ```
 
 ### Most recent CVE Modification Timestamp synchronized with NVD
 
 ```plain
-2024-01-28T09:15:08.337000+00:00
+2024-01-28T12:15:52.737000+00:00
 ```
 
 ### Last Data Feed Release
@@ -29,22 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
 ### Total Number of included CVEs
 
 ```plain
-236976
+236977
 ```
 
 ### CVEs added in the last Commit
 
-Recently added CVEs: `0`
+Recently added CVEs: `1`
 
+* [CVE-2024-0841](CVE-2024/CVE-2024-08xx/CVE-2024-0841.json) (`2024-01-28T12:15:52.737`)
 
 
 ### CVEs modified in the last Commit
 
-Recently modified CVEs: `3`
+Recently modified CVEs: `0`
 
-* [CVE-2024-0918](CVE-2024/CVE-2024-09xx/CVE-2024-0918.json) (`2024-01-28T09:15:07.550`)
-* [CVE-2024-0919](CVE-2024/CVE-2024-09xx/CVE-2024-0919.json) (`2024-01-28T09:15:08.090`)
-* [CVE-2024-0920](CVE-2024/CVE-2024-09xx/CVE-2024-0920.json) (`2024-01-28T09:15:08.337`)
 
 
 ## Download and Usage