aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--cve-check/dunfell/1715931180.json (renamed from cve-check/dunfell/1715839247.json)29
1 files changed, 28 insertions, 1 deletions
diff --git a/cve-check/dunfell/1715839247.json b/cve-check/dunfell/1715931180.json
index cbea8c3b..1780b2ad 100644
--- a/cve-check/dunfell/1715839247.json
+++ b/cve-check/dunfell/1715931180.json
@@ -72833,6 +72833,33 @@
"link": "https://nvd.nist.gov/vuln/detail/CVE-2021-46954"
},
{
+ "id": "CVE-2021-47171",
+ "summary": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n [<ffffffff84245b62>] kmalloc include/linux/slab.h:556 [inline]\n [<ffffffff84245b62>] kzalloc include/linux/slab.h:686 [inline]\n [<ffffffff84245b62>] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n [<ffffffff82b5b2e6>] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
+ "scorev2": "0.0",
+ "scorev3": "5.5",
+ "vector": "LOCAL",
+ "status": "Ignored",
+ "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-47171"
+ },
+ {
+ "id": "CVE-2021-47173",
+ "summary": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/uss720: fix memory leak in uss720_probe\n\nuss720_probe forgets to decrease the refcount of usbdev in uss720_probe.\nFix this by decreasing the refcount of usbdev by usb_put_dev.\n\nBUG: memory leak\nunreferenced object 0xffff888101113800 (size 2048):\n comm \"kworker/0:1\", pid 7, jiffies 4294956777 (age 28.870s)\n hex dump (first 32 bytes):\n ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00 ....1...........\n 00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00 ................\n backtrace:\n [<ffffffff82b8e822>] kmalloc include/linux/slab.h:554 [inline]\n [<ffffffff82b8e822>] kzalloc include/linux/slab.h:684 [inline]\n [<ffffffff82b8e822>] usb_alloc_dev+0x32/0x450 drivers/usb/core/usb.c:582\n [<ffffffff82b98441>] hub_port_connect drivers/usb/core/hub.c:5129 [inline]\n [<ffffffff82b98441>] hub_port_connect_change drivers/usb/core/hub.c:5363 [inline]\n [<ffffffff82b98441>] port_event drivers/usb/core/hub.c:5509 [inline]\n [<ffffffff82b98441>] hub_event+0x1171/0x20c0 drivers/usb/core/hub.c:5591\n [<ffffffff81259229>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275\n [<ffffffff81259b19>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421\n [<ffffffff81261228>] kthread+0x178/0x1b0 kernel/kthread.c:292\n [<ffffffff8100227f>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294",
+ "scorev2": "0.0",
+ "scorev3": "5.5",
+ "vector": "LOCAL",
+ "status": "Ignored",
+ "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-47173"
+ },
+ {
+ "id": "CVE-2021-47179",
+ "summary": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()\n\nCommit de144ff4234f changes _pnfs_return_layout() to call\npnfs_mark_matching_lsegs_return() passing NULL as the struct\npnfs_layout_range argument. Unfortunately,\npnfs_mark_matching_lsegs_return() doesn't check if we have a value here\nbefore dereferencing it, causing an oops.\n\nI'm able to hit this crash consistently when running connectathon basic\ntests on NFS v4.1/v4.2 against Ontap.",
+ "scorev2": "0.0",
+ "scorev3": "5.5",
+ "vector": "LOCAL",
+ "status": "Ignored",
+ "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-47179"
+ },
+ {
"id": "CVE-2021-47193",
"summary": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
"scorev2": "0.0",
@@ -83652,7 +83679,7 @@
"scorev2": "0.0",
"scorev3": "5.5",
"vector": "LOCAL",
- "status": "Unpatched",
+ "status": "Patched",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2023-51384"
},
{