Skip to content

Commit

Permalink
Update CVE and NVD data
Browse files Browse the repository at this point in the history
  • Loading branch information
GSD-automation committed Apr 14, 2024
1 parent edead4e commit 53d559d
Show file tree
Hide file tree
Showing 47 changed files with 3,433 additions and 80 deletions.
40 changes: 37 additions & 3 deletions 2022/48xxx/GSD-2022-48627.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@
{
"version_affected": "<",
"version_name": "81732c3b2fed",
"version_value": "bfee93c9a6c3"
"version_value": "c8686c014b5e"
},
{
"version_value": "not down converted",
Expand All @@ -53,6 +53,18 @@
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.312",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.274",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
Expand Down Expand Up @@ -102,7 +114,7 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
Expand All @@ -118,6 +130,16 @@
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29"
},
{
"name": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c"
},
{
"name": "https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926",
"refsource": "MISC",
Expand Down Expand Up @@ -147,10 +169,14 @@
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vt: corrige la superposici\u00f3n de memoria al eliminar caracteres en el b\u00fafer. Se produce una copia de memoria superpuesta al eliminar una l\u00ednea larga. Esta copia superpuesta de memoria puede causar corrupci\u00f3n de datos cuando scr_memcpyw est\u00e1 optimizado para memcpy porque memcpy no garantiza su comportamiento si el b\u00fafer de destino se superpone con el b\u00fafer de origen. El b\u00fafer de l\u00ednea no siempre est\u00e1 roto, porque memcpy utiliza la aceleraci\u00f3n de hardware, cuyo resultado no es determinista. Solucione este problema reemplazando scr_memcpyw con scr_memmoew."
}
],
"id": "CVE-2022-48627",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-04-13T12:15:10.870",
"metrics": {},
"published": "2024-03-02T22:15:46.930",
"references": [
Expand All @@ -166,9 +192,17 @@
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
Expand Down
27 changes: 23 additions & 4 deletions 2023/52xxx/GSD-2023-52458.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,13 +36,19 @@
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "5010c2712096"
"version_value": "8f6dfa1f1efe"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.215",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
Expand Down Expand Up @@ -98,7 +104,7 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
Expand All @@ -114,6 +120,11 @@
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62"
},
{
"name": "https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503",
"refsource": "MISC",
Expand Down Expand Up @@ -148,10 +159,14 @@
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: add check that partition length needs to be aligned with block size\n\nBefore calling add partition or resize partition, there is no check\non whether the length is aligned with the logical block size.\nIf the logical block size of the disk is larger than 512 bytes,\nthen the partition size maybe not the multiple of the logical block size,\nand when the last sector is read, bio_truncate() will adjust the bio size,\nresulting in an IO error if the size of the read command is smaller than\nthe logical block size.If integrity data is supported, this will also\nresult in a null pointer dereference when calling bio_integrity_free."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: agregar verifique que la longitud de la partici\u00f3n debe estar alineada con el tama\u00f1o del bloque Antes de llamar a agregar partici\u00f3n o cambiar el tama\u00f1o de la partici\u00f3n, no se verifica si la longitud est\u00e1 alineada con el tama\u00f1o del bloque l\u00f3gico. Si el tama\u00f1o del bloque l\u00f3gico del disco es mayor que 512 bytes, entonces el tama\u00f1o de la partici\u00f3n tal vez no sea el m\u00faltiplo del tama\u00f1o del bloque l\u00f3gico, y cuando se lea el \u00faltimo sector, bio_truncate() ajustar\u00e1 el tama\u00f1o de la biograf\u00eda, lo que resultar\u00e1 en un error de E/S si el tama\u00f1o del comando de lectura es menor que el tama\u00f1o del bloque l\u00f3gico. Si se admiten datos de integridad, esto tambi\u00e9n resultar\u00e1 en una desreferencia del puntero nulo al llamar a bio_integrity_free."
}
],
"id": "CVE-2023-52458",
"lastModified": "2024-02-23T16:14:43.447",
"lastModified": "2024-04-13T12:15:11.020",
"metrics": {},
"published": "2024-02-23T15:15:08.340",
"references": [
Expand All @@ -163,6 +178,10 @@
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5"
Expand All @@ -177,7 +196,7 @@
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
"vulnStatus": "Undergoing Analysis"
}
}
}
Expand Down
21 changes: 18 additions & 3 deletions 2023/52xxx/GSD-2023-52482.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,13 +36,19 @@
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "f090a8b4d2e3"
"version_value": "e7ea043bc3f1"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.215",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
Expand Down Expand Up @@ -92,7 +98,7 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
Expand All @@ -108,6 +114,11 @@
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d"
},
{
"name": "https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37",
"refsource": "MISC",
Expand Down Expand Up @@ -144,7 +155,7 @@
}
],
"id": "CVE-2023-52482",
"lastModified": "2024-02-29T13:49:29.390",
"lastModified": "2024-04-13T12:15:11.103",
"metrics": {},
"published": "2024-02-29T06:15:46.103",
"references": [
Expand All @@ -160,6 +171,10 @@
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37"
Expand Down
19 changes: 17 additions & 2 deletions 2023/52xxx/GSD-2023-52488.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@
{
"version_affected": "<",
"version_name": "dfeae619d781",
"version_value": "e635f652696e"
"version_value": "4e37416e4ee1"
},
{
"version_value": "not down converted",
Expand All @@ -53,6 +53,12 @@
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.215",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
Expand Down Expand Up @@ -124,6 +130,11 @@
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611"
},
{
"name": "https://git.kernel.org/stable/c/e635f652696ef6f1230621cfd89c350cb5ec6169",
"refsource": "MISC",
Expand Down Expand Up @@ -165,7 +176,7 @@
}
],
"id": "CVE-2023-52488",
"lastModified": "2024-04-10T15:16:03.963",
"lastModified": "2024-04-13T12:15:11.160",
"metrics": {},
"published": "2024-03-11T18:15:16.603",
"references": [
Expand All @@ -177,6 +188,10 @@
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23"
Expand Down
55 changes: 52 additions & 3 deletions 2023/52xxx/GSD-2023-52620.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,13 +36,31 @@
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "00b19ee0dcc1"
"version_value": "116b0e8e4673"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.312",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.274",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.215",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
Expand Down Expand Up @@ -86,7 +104,7 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
Expand All @@ -102,6 +120,21 @@
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c"
},
{
"name": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268"
},
{
"name": "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323"
},
{
"name": "https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e",
"refsource": "MISC",
Expand All @@ -126,17 +159,33 @@
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: no permite el tiempo de espera para conjuntos an\u00f3nimos Nunca se usa desde el espacio de usuario, no permita estos par\u00e1metros."
}
],
"id": "CVE-2023-52620",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-04-13T12:15:11.230",
"metrics": {},
"published": "2024-03-21T11:15:28.230",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b"
Expand Down
Loading

0 comments on commit 53d559d

Please sign in to comment.