aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-12 19:36:58 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-12 19:36:58 +0100
commit22358cbcf19fef8ce893ebab8e3ca082b2046577 (patch)
tree875bdf8cafe58d73a0e7865221d5f5f4abd6d773
parent3332363069be9b425ed85e0990e3e785de382bc7 (diff)
downloadvulns-22358cbcf19fef8ce893ebab8e3ca082b2046577.tar.gz
tmp: commit some test files I was using for original validation
Might need them in the near future, commit to the tree so they don't get lost. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--tmp/CVE-2024-0053.json48
-rw-r--r--tmp/CVE-2024-0053.json.orig55
-rw-r--r--tmp/README2
-rw-r--r--tmp/test.json47
4 files changed, 152 insertions, 0 deletions
diff --git a/tmp/CVE-2024-0053.json b/tmp/CVE-2024-0053.json
new file mode 100644
index 00000000..683455b4
--- /dev/null
+++ b/tmp/CVE-2024-0053.json
@@ -0,0 +1,48 @@
+{
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Linux",
+ "vendor": "Linux",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "6.7"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "nfsd: drop the nfsd_put helper\n\nIt's not safe to call nfsd_put once nfsd_last_thread has been called, as\nthat function will zero out the nn->nfsd_serv pointer.\n\nDrop the nfsd_put helper altogether and open-code the svc_put in its\ncallers instead. That allows us to not be reliant on the value of that\npointer when handling an error.\n\nFixes: 2a501f55cd64 (\"nfsd: call nfsd_last_thread() before final nfsd_put()\")\nReported-by: Zhi Li <yieli@redhat.com>\nCc: NeilBrown <neilb@suse.de>\nSigned-off-by: Jeffrey Layton <jlayton@redhat.com>\nSigned-off-by: Chuck Lever <chuck.lever@oracle.com>"
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "references": [
+ {
+ "url": "https://www,kernel.org"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "cveId": "CVE-2024-0052",
+ "requesterUserId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/tmp/CVE-2024-0053.json.orig b/tmp/CVE-2024-0053.json.orig
new file mode 100644
index 00000000..60aeaae5
--- /dev/null
+++ b/tmp/CVE-2024-0053.json.orig
@@ -0,0 +1,55 @@
+{
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Linux",
+ "vendor": "Linux",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "6.7"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]"
+ }
+ ],
+ "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]"
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "00000000-0000-4000-9000-000000000000"
+ },
+ "references": [
+ {
+ "url": "https://www,kernel.org"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "00000000-0000-4000-9000-000000000000",
+ "cveId": "CVE-2024-0052",
+ "requesterUserId": "00000000-0000-4000-9000-000000000000",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/tmp/README b/tmp/README
new file mode 100644
index 00000000..2ace7e0e
--- /dev/null
+++ b/tmp/README
@@ -0,0 +1,2 @@
+test files for validation of cve tools, these aren't valid, they will be
+removed once things get all working properly.
diff --git a/tmp/test.json b/tmp/test.json
new file mode 100644
index 00000000..754b2fd9
--- /dev/null
+++ b/tmp/test.json
@@ -0,0 +1,47 @@
+{
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
+ },
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval\n\ncommit 11684134140bb708b6e6de969a060535630b1b53 upstream.\n\nset_memmap_mode() stores the kernel parameter memmap mode as an integer.\nHowever, the get_memmap_mode() function utilizes param_get_bool() to fetch\nthe value as a boolean, leading to potential endianness issue. On\nBig-endian architectures, the memmap_on_memory is consistently displayed\nas 'N' regardless of its actual status.\n\nTo address this endianness problem, the solution involves obtaining the\nmode as an integer. This adjustment ensures the proper display of the\nmemmap_on_memory parameter, presenting it as one of the following options:\nForce, Y, or N.\n\nLink: https://lkml.kernel.org/r/20240110140127.241451-1-sumanthk@linux.ibm.com\nFixes: 2d1f649c7c08 (\"mm/memory_hotplug: support memmap_on_memory when memmap is not aligned to pageblocks\")\nSigned-off-by: Sumanth Korikkar <sumanthk@linux.ibm.com>\nSuggested-by: Gerald Schaefer <gerald.schaefer@linux.ibm.com>\nAcked-by: David Hildenbrand <david@redhat.com>\nCc: Alexander Gordeev <agordeev@linux.ibm.com>\nCc: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>\nCc: Heiko Carstens <hca@linux.ibm.com>\nCc: Michal Hocko <mhocko@suse.com>\nCc: Oscar Salvador <osalvador@suse.de>\nCc: Vasily Gorbik <gor@linux.ibm.com>\nCc: <stable@vger.kernel.org>\t[6.6+]\nSigned-off-by: Andrew Morton <akpm@linux-foundation.org>\nSigned-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>"
+ }
+ ],
+ "affected": [
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "versions": [
+ {
+ "lessThan": "6.7.1",
+ "status": "affected",
+ "version": "0",
+ "versionType": "custom"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://git.kernel.org/torvalds/c/0f91df0c0fae1a88f11be3eabb1f20f73a88c90a"
+ }
+ ],
+ "title": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval",
+ "x_generator": {
+ "engine": "bippy"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
+ "cveID": "CVE-2024-0052",
+ "requesterUserId": "gregkh@linuxfoundation.org",
+ "serial": "1",
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}