Skip to content

Commit

Permalink
generated content from 2024-09-16
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 16, 2024
1 parent 0564135 commit 7968e19
Show file tree
Hide file tree
Showing 57 changed files with 1,288 additions and 0 deletions.
56 changes: 56 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -249231,3 +249231,59 @@ vulnerability,CVE-2024-8479,vulnerability--1ada3c4a-4ea5-43b2-977f-de02abbac10d
vulnerability,CVE-2024-8864,vulnerability--3531b4ec-bfae-4a8e-bbf5-fb61d826bd62
vulnerability,CVE-2024-8724,vulnerability--f924a9cd-8b36-401a-885e-78ecb7b37c00
vulnerability,CVE-2023-3410,vulnerability--ff3621b3-d8c0-4c92-b0af-a73f3da799d9
vulnerability,CVE-2024-44054,vulnerability--766f4b0c-6333-40ae-a972-15308ae300ae
vulnerability,CVE-2024-44060,vulnerability--1f8065ee-2109-4671-b40c-c682246076fd
vulnerability,CVE-2024-44053,vulnerability--c84d66cd-673b-409a-9bb1-75346665fef3
vulnerability,CVE-2024-44056,vulnerability--22d1ba0b-c101-42e4-a0e8-663a99edcece
vulnerability,CVE-2024-44058,vulnerability--247f7ab4-755f-4701-8877-9a9b1824f355
vulnerability,CVE-2024-44063,vulnerability--7a56cd32-3144-40b2-b7b6-24b47cf5c912
vulnerability,CVE-2024-44059,vulnerability--b7912faf-320d-4cf7-a6b7-9b015bab6069
vulnerability,CVE-2024-44057,vulnerability--a3092739-457f-4484-9fab-8ea5d7c75fd0
vulnerability,CVE-2024-44062,vulnerability--71206d21-0934-428d-8365-14137add0902
vulnerability,CVE-2024-46938,vulnerability--d57a197d-f928-49fb-aa2a-cd958255907d
vulnerability,CVE-2024-46942,vulnerability--cf639e0b-183a-469f-bcbd-5f663fc66de3
vulnerability,CVE-2024-46672,vulnerability--beeeaf9b-7473-4fe4-a36d-41426f5f6929
vulnerability,CVE-2024-46918,vulnerability--f8b2d0f7-6bf5-4d6a-b4c8-e5703dcdfa14
vulnerability,CVE-2024-46943,vulnerability--74d0e6d5-5c0a-4206-ae68-97c75ad7ac55
vulnerability,CVE-2024-8867,vulnerability--2ec2d0e9-0ba6-413c-b0a6-76fd93682eaa
vulnerability,CVE-2024-8875,vulnerability--a5fdd27a-a09a-4ca1-9333-73ec6ee569bb
vulnerability,CVE-2024-8880,vulnerability--6e778103-aa4e-48cf-95fa-ef19a65f093b
vulnerability,CVE-2024-8876,vulnerability--f8af57b3-267c-452d-b99d-5f1c028066c0
vulnerability,CVE-2024-8868,vulnerability--c40ef836-393c-4f26-8d8c-ecfa760efb43
vulnerability,CVE-2024-8866,vulnerability--28abe941-66e5-4936-bae4-d4e126db29e9
vulnerability,CVE-2024-8869,vulnerability--8c5b038c-7487-4cea-86a8-fa382ff84a52
vulnerability,CVE-2024-43825,vulnerability--ce4a2ae3-a0ee-4a30-82a4-f51ee534233e
vulnerability,CVE-2024-43823,vulnerability--6cfcda59-d50c-4b70-9180-b26068294463
vulnerability,CVE-2024-43852,vulnerability--55d87575-d347-4f7d-bf15-948a93e4727b
vulnerability,CVE-2024-43837,vulnerability--ed1856b4-c260-4ac5-9bfc-d2ad59a66746
vulnerability,CVE-2024-43842,vulnerability--03866360-0c9c-4e7f-b90f-469c75697ac1
vulnerability,CVE-2024-43840,vulnerability--49bb1c4a-cd01-4e3f-8414-eead4825bc6d
vulnerability,CVE-2024-43819,vulnerability--a02f53bf-520b-465e-830a-68d7577581d3
vulnerability,CVE-2024-43824,vulnerability--4ff35149-1669-431f-93f5-6e91bc1e8b51
vulnerability,CVE-2024-43843,vulnerability--70635ea1-4eb3-4e5f-930e-fb92b5895320
vulnerability,CVE-2024-43847,vulnerability--c709ad1b-6ae8-418f-bcb3-8b463f83e90f
vulnerability,CVE-2024-43833,vulnerability--d1ab498e-f269-44bc-a834-877227979107
vulnerability,CVE-2024-43827,vulnerability--cd3a3ece-bd0d-461a-8e87-73a3f46e02fb
vulnerability,CVE-2024-43848,vulnerability--76e7487a-0ec2-4c45-9e75-25736d4b32da
vulnerability,CVE-2024-43832,vulnerability--b49d3834-ff7f-481e-8972-601ae879fb80
vulnerability,CVE-2024-43836,vulnerability--03a472ed-735a-4b95-9790-ac457d84e155
vulnerability,CVE-2024-43857,vulnerability--748650cc-a4d0-4a5d-9dbc-abc2b14333fa
vulnerability,CVE-2024-43850,vulnerability--d0fb50b6-4ce3-4693-9b7c-9f2c4942c433
vulnerability,CVE-2024-43844,vulnerability--ca619bf2-a17d-4d58-b538-5016a61545e7
vulnerability,CVE-2024-43815,vulnerability--a08ab0ec-18bd-4717-8919-0cad02ef0238
vulnerability,CVE-2024-43820,vulnerability--ebc74221-89f8-4e1d-8326-8443925cf4d9
vulnerability,CVE-2024-43851,vulnerability--319ebcc8-4486-4e59-9128-038203f7cc40
vulnerability,CVE-2024-43816,vulnerability--d02853cf-50e7-4b8d-87fe-ed00ce2c28db
vulnerability,CVE-2024-43855,vulnerability--7b7e73eb-c828-4c92-9cb4-f5033bd3e62e
vulnerability,CVE-2024-43821,vulnerability--ce7d9609-54a0-472f-9b8c-fd51a271e655
vulnerability,CVE-2024-43838,vulnerability--8bb4024d-b65c-4cbd-9cd9-858aa22c59e3
vulnerability,CVE-2024-43826,vulnerability--d4dd78de-0ba9-4be0-b1d4-2ef0d3710df6
vulnerability,CVE-2024-43818,vulnerability--e5a9c5c8-2ad9-4f3c-a775-02f6e147e616
vulnerability,CVE-2024-43831,vulnerability--711c0fe6-1ba2-4c44-b39b-f425a7f140ae
vulnerability,CVE-2024-43822,vulnerability--1441029b-c635-4580-8091-8cd01cedcf38
vulnerability,CVE-2024-45460,vulnerability--04be1c79-96b3-4809-83c8-717f0899d46c
vulnerability,CVE-2024-45459,vulnerability--a256e9ca-fe99-4e97-90fd-33495fab6a92
vulnerability,CVE-2024-45456,vulnerability--e7d995a8-cf9c-4311-bdf1-2cf03ebdd6ce
vulnerability,CVE-2024-45458,vulnerability--46eae632-23ca-4416-a76f-41b0f951361c
vulnerability,CVE-2024-45455,vulnerability--5e8e14fb-f442-400f-b180-113479ffc024
vulnerability,CVE-2024-45457,vulnerability--c7e70798-7584-4cd8-9971-45d885da92e7
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7c240cc2-3a25-4d0e-91fd-ec4ea93dc922",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03866360-0c9c-4e7f-b90f-469c75697ac1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.281461Z",
"modified": "2024-09-16T01:45:24.281461Z",
"name": "CVE-2024-43842",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()\n\nIn rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size.\nBut then 'rate->he_gi' is used as array index instead of 'status->he_gi'.\nThis can lead to go beyond array boundaries in case of 'rate->he_gi' is\nnot equal to 'status->he_gi' and is bigger than array size. Looks like\n\"copy-paste\" mistake.\n\nFix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43842"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ef4c0861-ca8f-4efa-b183-3882fadf6ba9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03a472ed-735a-4b95-9790-ac457d84e155",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.317136Z",
"modified": "2024-09-16T01:45:24.317136Z",
"name": "CVE-2024-43836",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethtool: pse-pd: Fix possible null-deref\n\nFix a possible null dereference when a PSE supports both c33 and PoDL, but\nonly one of the netlink attributes is specified. The c33 or PoDL PSE\ncapabilities are already validated in the ethnl_set_pse_validate() call.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43836"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--37ef9f4b-d362-4d35-9036-f7d89ac02676",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04be1c79-96b3-4809-83c8-717f0899d46c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.626722Z",
"modified": "2024-09-16T01:45:24.626722Z",
"name": "CVE-2024-45460",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Manu225 Flipping Cards allows Stored XSS.This issue affects Flipping Cards: from n/a through 1.30.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45460"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ede4282f-8c22-4f0c-b121-7120bee62e82",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1441029b-c635-4580-8091-8cd01cedcf38",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.351723Z",
"modified": "2024-09-16T01:45:24.351723Z",
"name": "CVE-2024-43822",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoc: PCM6240: Return directly after a failed devm_kzalloc() in pcmdevice_i2c_probe()\n\nThe value “-ENOMEM” was assigned to the local variable “ret”\nin one if branch after a devm_kzalloc() call failed at the beginning.\nThis error code will trigger then a pcmdevice_remove() call with a passed\nnull pointer so that an undesirable dereference will be performed.\nThus return the appropriate error code directly.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43822"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--739b79b6-ef90-4b63-89e8-882106146f3c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f8065ee-2109-4671-b40c-c682246076fd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:22.75906Z",
"modified": "2024-09-16T01:45:22.75906Z",
"name": "CVE-2024-44060",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jennifer Hall Filmix allows Reflected XSS.This issue affects Filmix: from n/a through 1.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44060"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18eb2a49-2306-4624-b685-e0a20a41ade2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--22d1ba0b-c101-42e4-a0e8-663a99edcece",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:22.769133Z",
"modified": "2024-09-16T01:45:22.769133Z",
"name": "CVE-2024-44056",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Mantra allows Stored XSS.This issue affects Mantra: from n/a through 3.3.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44056"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c190219b-4ed1-4646-8b1e-a6e0a23e73f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--247f7ab4-755f-4701-8877-9a9b1824f355",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:22.776632Z",
"modified": "2024-09-16T01:45:22.776632Z",
"name": "CVE-2024-44058",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Parabola allows Stored XSS.This issue affects Parabola: from n/a through 2.4.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44058"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6688065b-9c79-4e82-8d7a-3a53b8f984bf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--28abe941-66e5-4936-bae4-d4e126db29e9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:23.731244Z",
"modified": "2024-09-16T01:45:23.731244Z",
"name": "CVE-2024-8866",
"description": "A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8866"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7589d77a-25b0-4d82-9f7a-66e24f9bbe8b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2ec2d0e9-0ba6-413c-b0a6-76fd93682eaa",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:23.687922Z",
"modified": "2024-09-16T01:45:23.687922Z",
"name": "CVE-2024-8867",
"description": "A vulnerability was found in Perfex CRM 3.1.6. It has been declared as problematic. This vulnerability affects unknown code of the file application/controllers/Clients.php of the component Parameter Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8867"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9b2d64ad-dc69-4d5d-ad24-f3005256bc32",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--319ebcc8-4486-4e59-9128-038203f7cc40",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.328729Z",
"modified": "2024-09-16T01:45:24.328729Z",
"name": "CVE-2024-43851",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: xilinx: rename cpu_number1 to dummy_cpu_number\n\nThe per cpu variable cpu_number1 is passed to xlnx_event_handler as\nargument \"dev_id\", but it is not used in this function. So drop the\ninitialization of this variable and rename it to dummy_cpu_number.\nThis patch is to fix the following call trace when the kernel option\nCONFIG_DEBUG_ATOMIC_SLEEP is enabled:\n\nBUG: sleeping function called from invalid context at include/linux/sched/mm.h:274\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n preempt_count: 1, expected: 0\n CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53\n Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT)\n Call trace:\n dump_backtrace+0xd0/0xe0\n show_stack+0x18/0x40\n dump_stack_lvl+0x7c/0xa0\n dump_stack+0x18/0x34\n __might_resched+0x10c/0x140\n __might_sleep+0x4c/0xa0\n __kmem_cache_alloc_node+0xf4/0x168\n kmalloc_trace+0x28/0x38\n __request_percpu_irq+0x74/0x138\n xlnx_event_manager_probe+0xf8/0x298\n platform_probe+0x68/0xd8",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43851"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--31ae2e6a-3b17-42e7-ba97-1877916ba686",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--46eae632-23ca-4416-a76f-41b0f951361c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.649044Z",
"modified": "2024-09-16T01:45:24.649044Z",
"name": "CVE-2024-45458",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Reflected XSS.This issue affects Spiffy Calendar: from n/a through 4.9.13.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45458"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dbd2f881-d9e7-4b76-8d19-37d4e71a7a84",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--49bb1c4a-cd01-4e3f-8414-eead4825bc6d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-16T01:45:24.290546Z",
"modified": "2024-09-16T01:45:24.290546Z",
"name": "CVE-2024-43840",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG\n\nWhen BPF_TRAMP_F_CALL_ORIG is set, the trampoline calls\n__bpf_tramp_enter() and __bpf_tramp_exit() functions, passing them\nthe struct bpf_tramp_image *im pointer as an argument in R0.\n\nThe trampoline generation code uses emit_addr_mov_i64() to emit\ninstructions for moving the bpf_tramp_image address into R0, but\nemit_addr_mov_i64() assumes the address to be in the vmalloc() space\nand uses only 48 bits. Because bpf_tramp_image is allocated using\nkzalloc(), its address can use more than 48-bits, in this case the\ntrampoline will pass an invalid address to __bpf_tramp_enter/exit()\ncausing a kernel crash.\n\nFix this by using emit_a64_mov_i64() in place of emit_addr_mov_i64()\nas it can work with addresses that are greater than 48-bits.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43840"
}
]
}
]
}
Loading

0 comments on commit 7968e19

Please sign in to comment.