Skip to content

Commit

Permalink
generated content from 2025-01-15
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 15, 2025
1 parent 9e573ad commit 098ca30
Show file tree
Hide file tree
Showing 34 changed files with 759 additions and 0 deletions.
33 changes: 33 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263684,3 +263684,36 @@ vulnerability,CVE-2025-0193,vulnerability--7103bfbb-6ebb-4816-8663-db8644346b54
vulnerability,CVE-2024-5198,vulnerability--a59c5c27-7d4d-4c0c-9db9-4be216c97ca2
vulnerability,CVE-2024-11029,vulnerability--838c4ea9-72d5-4717-9eca-e75f40d9bdf0
vulnerability,CVE-2024-13215,vulnerability--1c1e129a-43b5-4635-9dd5-9d093e78de95
vulnerability,CVE-2024-57883,vulnerability--0e5658e2-ec05-4b67-a3d8-2c1fdf64ceed
vulnerability,CVE-2024-57901,vulnerability--dc429a42-c1f6-4eed-850a-f8b66cb054e2
vulnerability,CVE-2024-57903,vulnerability--b7c6b147-481c-4257-864f-971750aa48dc
vulnerability,CVE-2024-57894,vulnerability--d60e9561-b74c-4fed-b11e-2993f070db8c
vulnerability,CVE-2024-57887,vulnerability--07547116-48c4-49f6-baad-257bf1e144f4
vulnerability,CVE-2024-57885,vulnerability--1db2ae3b-4414-4a00-b552-95bc92096874
vulnerability,CVE-2024-57893,vulnerability--96f2cabf-15ad-4666-92bb-0a6b89f39642
vulnerability,CVE-2024-57899,vulnerability--4c7f5bd9-3c09-494d-8493-6783c7831daa
vulnerability,CVE-2024-57795,vulnerability--cd9b5cca-91c1-46ff-aa14-34e588c15140
vulnerability,CVE-2024-57896,vulnerability--dec05a2a-41fd-4f1b-ad86-d04c27efb1e7
vulnerability,CVE-2024-57891,vulnerability--4afabc82-3769-42bc-900b-2d0b8ac41706
vulnerability,CVE-2024-57886,vulnerability--13c77d6e-7cdd-49a9-82a0-daff768646a2
vulnerability,CVE-2024-57888,vulnerability--ac6e4bae-4359-4116-8737-65464b40c802
vulnerability,CVE-2024-57900,vulnerability--6b9291b6-6967-4f71-acbf-e0cee1cc28ae
vulnerability,CVE-2024-57898,vulnerability--914b378a-c346-4d51-b5bb-95eafc5f6dcd
vulnerability,CVE-2024-57890,vulnerability--c8696c40-02e5-4340-8978-a2b01bb28d1f
vulnerability,CVE-2024-57844,vulnerability--41a93a26-7e1a-4537-a477-dadacc5c9f9f
vulnerability,CVE-2024-57802,vulnerability--1e16999e-3f14-497d-bf9d-6220103aff39
vulnerability,CVE-2024-57882,vulnerability--230b497b-f1fe-46e8-9c67-d84bf38b110c
vulnerability,CVE-2024-57897,vulnerability--28edc1a2-0fb3-4ce4-9c60-82c343e79e16
vulnerability,CVE-2024-57895,vulnerability--3c82ecaa-5ad5-4074-9f34-c5731619d038
vulnerability,CVE-2024-57902,vulnerability--e97e44fc-8e24-4c8c-a297-cb4e614c97fd
vulnerability,CVE-2024-57892,vulnerability--9957be47-47fa-44df-a649-976dde912e82
vulnerability,CVE-2024-57801,vulnerability--d3ec54b2-ecc1-4f08-ad67-b8ef24d9826c
vulnerability,CVE-2024-57889,vulnerability--6182343a-f7ff-4d38-88f6-a681e1dff677
vulnerability,CVE-2024-57884,vulnerability--e6a1dbff-1630-48df-8fbb-194fab4ea077
vulnerability,CVE-2024-57841,vulnerability--f3cce38d-98e9-4e91-8096-6576ca0513e7
vulnerability,CVE-2024-53681,vulnerability--a4dd5c85-a6e8-43f3-bdea-a9bd2f5e2593
vulnerability,CVE-2024-39282,vulnerability--381debc4-2b6f-4550-acdd-70b9fdcd33d5
vulnerability,CVE-2024-54031,vulnerability--cda82f24-d447-41fb-b67a-9c1f7e5383de
vulnerability,CVE-2024-36476,vulnerability--abf35f53-1a43-444c-9672-c373fe8a0107
vulnerability,CVE-2025-21629,vulnerability--759892ba-a89b-4bd3-a8b4-06c05284353c
vulnerability,CVE-2025-21630,vulnerability--950ec7ff-9ec9-49a2-82f2-721cb7cb2662
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--97e84cb2-683d-47ab-bf05-1412f73c5064",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07547116-48c4-49f6-baad-257bf1e144f4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T14:18:03.350793Z",
"modified": "2025-01-15T14:18:03.350793Z",
"name": "CVE-2024-57887",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: adv7511: Fix use-after-free in adv7533_attach_dsi()\n\nThe host_node pointer was assigned and freed in adv7533_parse_dt(), and\nlater, adv7533_attach_dsi() uses the same. Fix this use-after-free issue\nby dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()\nin error path of probe() and also in the remove().",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57887"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7aa9bd4e-0c60-4785-8ac2-c886c973c33b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e5658e2-ec05-4b67-a3d8-2c1fdf64ceed",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T14:18:03.335368Z",
"modified": "2025-01-15T14:18:03.335368Z",
"name": "CVE-2024-57883",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: independent PMD page table shared count\n\nThe folio refcount may be increased unexpectly through try_get_folio() by\ncaller such as split_huge_pages. In huge_pmd_unshare(), we use refcount\nto check whether a pmd page table is shared. The check is incorrect if\nthe refcount is increased by the above caller, and this can cause the page\ntable leaked:\n\n BUG: Bad page state in process sh pfn:109324\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x66 pfn:0x109324\n flags: 0x17ffff800000000(node=0|zone=2|lastcpupid=0xfffff)\n page_type: f2(table)\n raw: 017ffff800000000 0000000000000000 0000000000000000 0000000000000000\n raw: 0000000000000066 0000000000000000 00000000f2000000 0000000000000000\n page dumped because: nonzero mapcount\n ...\n CPU: 31 UID: 0 PID: 7515 Comm: sh Kdump: loaded Tainted: G B 6.13.0-rc2master+ #7\n Tainted: [B]=BAD_PAGE\n Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n Call trace:\n show_stack+0x20/0x38 (C)\n dump_stack_lvl+0x80/0xf8\n dump_stack+0x18/0x28\n bad_page+0x8c/0x130\n free_page_is_bad_report+0xa4/0xb0\n free_unref_page+0x3cc/0x620\n __folio_put+0xf4/0x158\n split_huge_pages_all+0x1e0/0x3e8\n split_huge_pages_write+0x25c/0x2d8\n full_proxy_write+0x64/0xd8\n vfs_write+0xcc/0x280\n ksys_write+0x70/0x110\n __arm64_sys_write+0x24/0x38\n invoke_syscall+0x50/0x120\n el0_svc_common.constprop.0+0xc8/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x34/0x128\n el0t_64_sync_handler+0xc8/0xd0\n el0t_64_sync+0x190/0x198\n\nThe issue may be triggered by damon, offline_page, page_idle, etc, which\nwill increase the refcount of page table.\n\n1. The page table itself will be discarded after reporting the\n \"nonzero mapcount\".\n\n2. The HugeTLB page mapped by the page table miss freeing since we\n treat the page table as shared and a shared page table will not be\n unmapped.\n\nFix it by introducing independent PMD page table shared count. As\ndescribed by comment, pt_index/pt_mm/pt_frag_refcount are used for s390\ngmap, x86 pgds and powerpc, pt_share_count is used for x86/arm64/riscv\npmds, so we can reuse the field as pt_share_count.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57883"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--94842ebe-b7bd-41ab-abd2-9c68189cef8b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13c77d6e-7cdd-49a9-82a0-daff768646a2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T14:18:03.369499Z",
"modified": "2025-01-15T14:18:03.369499Z",
"name": "CVE-2024-57886",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/core: fix new damon_target objects leaks on damon_commit_targets()\n\nPatch series \"mm/damon/core: fix memory leaks and ignored inputs from\ndamon_commit_ctx()\".\n\nDue to two bugs in damon_commit_targets() and damon_commit_schemes(),\nwhich are called from damon_commit_ctx(), some user inputs can be ignored,\nand some mmeory objects can be leaked. Fix those.\n\nNote that only DAMON sysfs interface users are affected. Other DAMON core\nAPI user modules that more focused more on simple and dedicated production\nusages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy\nfunction in the way, so not affected.\n\n\nThis patch (of 2):\n\nWhen new DAMON targets are added via damon_commit_targets(), the newly\ncreated targets are not deallocated when updating the internal data\n(damon_commit_target()) is failed. Worse yet, even if the setup is\nsuccessfully done, the new target is not linked to the context. Hence,\nthe new targets are always leaked regardless of the internal data setup\nfailure. Fix the leaks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57886"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3847c6b3-324b-4945-b7a8-4531dd58aaac",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1db2ae3b-4414-4a00-b552-95bc92096874",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T14:18:03.351916Z",
"modified": "2025-01-15T14:18:03.351916Z",
"name": "CVE-2024-57885",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/kmemleak: fix sleeping function called from invalid context at print message\n\nAddress a bug in the kernel that triggers a \"sleeping function called from\ninvalid context\" warning when /sys/kernel/debug/kmemleak is printed under\nspecific conditions:\n- CONFIG_PREEMPT_RT=y\n- Set SELinux as the LSM for the system\n- Set kptr_restrict to 1\n- kmemleak buffer contains at least one item\n\nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 136, name: cat\npreempt_count: 1, expected: 0\nRCU nest depth: 2, expected: 2\n6 locks held by cat/136:\n #0: ffff32e64bcbf950 (&p->lock){+.+.}-{3:3}, at: seq_read_iter+0xb8/0xe30\n #1: ffffafe6aaa9dea0 (scan_mutex){+.+.}-{3:3}, at: kmemleak_seq_start+0x34/0x128\n #3: ffff32e6546b1cd0 (&object->lock){....}-{2:2}, at: kmemleak_seq_show+0x3c/0x1e0\n #4: ffffafe6aa8d8560 (rcu_read_lock){....}-{1:2}, at: has_ns_capability_noaudit+0x8/0x1b0\n #5: ffffafe6aabbc0f8 (notif_lock){+.+.}-{2:2}, at: avc_compute_av+0xc4/0x3d0\nirq event stamp: 136660\nhardirqs last enabled at (136659): [<ffffafe6a80fd7a0>] _raw_spin_unlock_irqrestore+0xa8/0xd8\nhardirqs last disabled at (136660): [<ffffafe6a80fd85c>] _raw_spin_lock_irqsave+0x8c/0xb0\nsoftirqs last enabled at (0): [<ffffafe6a5d50b28>] copy_process+0x11d8/0x3df8\nsoftirqs last disabled at (0): [<0000000000000000>] 0x0\nPreemption disabled at:\n[<ffffafe6a6598a4c>] kmemleak_seq_show+0x3c/0x1e0\nCPU: 1 UID: 0 PID: 136 Comm: cat Tainted: G E 6.11.0-rt7+ #34\nTainted: [E]=UNSIGNED_MODULE\nHardware name: linux,dummy-virt (DT)\nCall trace:\n dump_backtrace+0xa0/0x128\n show_stack+0x1c/0x30\n dump_stack_lvl+0xe8/0x198\n dump_stack+0x18/0x20\n rt_spin_lock+0x8c/0x1a8\n avc_perm_nonode+0xa0/0x150\n cred_has_capability.isra.0+0x118/0x218\n selinux_capable+0x50/0x80\n security_capable+0x7c/0xd0\n has_ns_capability_noaudit+0x94/0x1b0\n has_capability_noaudit+0x20/0x30\n restricted_pointer+0x21c/0x4b0\n pointer+0x298/0x760\n vsnprintf+0x330/0xf70\n seq_printf+0x178/0x218\n print_unreferenced+0x1a4/0x2d0\n kmemleak_seq_show+0xd0/0x1e0\n seq_read_iter+0x354/0xe30\n seq_read+0x250/0x378\n full_proxy_read+0xd8/0x148\n vfs_read+0x190/0x918\n ksys_read+0xf0/0x1e0\n __arm64_sys_read+0x70/0xa8\n invoke_syscall.constprop.0+0xd4/0x1d8\n el0_svc+0x50/0x158\n el0t_64_sync+0x17c/0x180\n\n%pS and %pK, in the same back trace line, are redundant, and %pS can void\n%pK service in certain contexts.\n\n%pS alone already provides the necessary information, and if it cannot\nresolve the symbol, it falls back to printing the raw address voiding\nthe original intent behind the %pK.\n\nAdditionally, %pK requires a privilege check CAP_SYSLOG enforced through\nthe LSM, which can trigger a \"sleeping function called from invalid\ncontext\" warning under RT_PREEMPT kernels when the check occurs in an\natomic context. This issue may also affect other LSMs.\n\nThis change avoids the unnecessary privilege check and resolves the\nsleeping function warning without any loss of information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57885"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ebe3d6e6-3531-4983-b6ba-5f1c9011d4f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e16999e-3f14-497d-bf9d-6220103aff39",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T14:18:03.385553Z",
"modified": "2025-01-15T14:18:03.385553Z",
"name": "CVE-2024-57802",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: check buffer length before accessing it\n\nSyzkaller reports an uninit value read from ax25cmp when sending raw message\nthrough ieee802154 implementation.\n\n=====================================================\nBUG: KMSAN: uninit-value in ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119\n ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119\n nr_dev_get+0x20e/0x450 net/netrom/nr_route.c:601\n nr_route_frame+0x1a2/0xfc0 net/netrom/nr_route.c:774\n nr_xmit+0x5a/0x1c0 net/netrom/nr_dev.c:144\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n raw_sendmsg+0x654/0xc10 net/ieee802154/socket.c:299\n ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2780\n sock_alloc_send_skb include/net/sock.h:1884 [inline]\n raw_sendmsg+0x36d/0xc10 net/ieee802154/socket.c:282\n ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 0 PID: 5037 Comm: syz-executor166 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\n=====================================================\n\nThis issue occurs because the skb buffer is too small, and it's actual\nallocation is aligned. This hides an actual issue, which is that nr_route_frame\ndoes not validate the buffer size before using it.\n\nFix this issue by checking skb->len before accessing any fields in skb->data.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57802"
}
]
}
]
}
Loading

0 comments on commit 098ca30

Please sign in to comment.