diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-02-12 19:36:58 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-02-12 19:36:58 +0100 |
commit | 22358cbcf19fef8ce893ebab8e3ca082b2046577 (patch) | |
tree | 875bdf8cafe58d73a0e7865221d5f5f4abd6d773 | |
parent | 3332363069be9b425ed85e0990e3e785de382bc7 (diff) | |
download | vulns-22358cbcf19fef8ce893ebab8e3ca082b2046577.tar.gz |
tmp: commit some test files I was using for original validation
Might need them in the near future, commit to the tree so they don't get
lost.
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | tmp/CVE-2024-0053.json | 48 | ||||
-rw-r--r-- | tmp/CVE-2024-0053.json.orig | 55 | ||||
-rw-r--r-- | tmp/README | 2 | ||||
-rw-r--r-- | tmp/test.json | 47 |
4 files changed, 152 insertions, 0 deletions
diff --git a/tmp/CVE-2024-0053.json b/tmp/CVE-2024-0053.json new file mode 100644 index 00000000..683455b4 --- /dev/null +++ b/tmp/CVE-2024-0053.json @@ -0,0 +1,48 @@ +{ + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Linux", + "vendor": "Linux", + "versions": [ + { + "status": "affected", + "version": "6.7" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "nfsd: drop the nfsd_put helper\n\nIt's not safe to call nfsd_put once nfsd_last_thread has been called, as\nthat function will zero out the nn->nfsd_serv pointer.\n\nDrop the nfsd_put helper altogether and open-code the svc_put in its\ncallers instead. That allows us to not be reliant on the value of that\npointer when handling an error.\n\nFixes: 2a501f55cd64 (\"nfsd: call nfsd_last_thread() before final nfsd_put()\")\nReported-by: Zhi Li <yieli@redhat.com>\nCc: NeilBrown <neilb@suse.de>\nSigned-off-by: Jeffrey Layton <jlayton@redhat.com>\nSigned-off-by: Chuck Lever <chuck.lever@oracle.com>" + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-9000-000000000000" + }, + "references": [ + { + "url": "https://www,kernel.org" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.1.0-dev" + } + } + }, + "cveMetadata": { + "assignerOrgId": "00000000-0000-4000-9000-000000000000", + "cveId": "CVE-2024-0052", + "requesterUserId": "00000000-0000-4000-9000-000000000000", + "serial": 1, + "state": "PUBLISHED" + }, + "dataType": "CVE_RECORD", + "dataVersion": "5.0" +} diff --git a/tmp/CVE-2024-0053.json.orig b/tmp/CVE-2024-0053.json.orig new file mode 100644 index 00000000..60aeaae5 --- /dev/null +++ b/tmp/CVE-2024-0053.json.orig @@ -0,0 +1,55 @@ +{ + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Linux", + "vendor": "Linux", + "versions": [ + { + "status": "affected", + "version": "6.7" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]" + } + ], + "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]" + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-9000-000000000000" + }, + "references": [ + { + "url": "https://www,kernel.org" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.1.0-dev" + } + } + }, + "cveMetadata": { + "assignerOrgId": "00000000-0000-4000-9000-000000000000", + "cveId": "CVE-2024-0052", + "requesterUserId": "00000000-0000-4000-9000-000000000000", + "serial": 1, + "state": "PUBLISHED" + }, + "dataType": "CVE_RECORD", + "dataVersion": "5.0" +} diff --git a/tmp/README b/tmp/README new file mode 100644 index 00000000..2ace7e0e --- /dev/null +++ b/tmp/README @@ -0,0 +1,2 @@ +test files for validation of cve tools, these aren't valid, they will be +removed once things get all working properly. diff --git a/tmp/test.json b/tmp/test.json new file mode 100644 index 00000000..754b2fd9 --- /dev/null +++ b/tmp/test.json @@ -0,0 +1,47 @@ +{ + "containers": { + "cna": { + "providerMetadata": { + "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" + }, + "descriptions": [ + { + "lang": "en", + "value": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval\n\ncommit 11684134140bb708b6e6de969a060535630b1b53 upstream.\n\nset_memmap_mode() stores the kernel parameter memmap mode as an integer.\nHowever, the get_memmap_mode() function utilizes param_get_bool() to fetch\nthe value as a boolean, leading to potential endianness issue. On\nBig-endian architectures, the memmap_on_memory is consistently displayed\nas 'N' regardless of its actual status.\n\nTo address this endianness problem, the solution involves obtaining the\nmode as an integer. This adjustment ensures the proper display of the\nmemmap_on_memory parameter, presenting it as one of the following options:\nForce, Y, or N.\n\nLink: https://lkml.kernel.org/r/20240110140127.241451-1-sumanthk@linux.ibm.com\nFixes: 2d1f649c7c08 (\"mm/memory_hotplug: support memmap_on_memory when memmap is not aligned to pageblocks\")\nSigned-off-by: Sumanth Korikkar <sumanthk@linux.ibm.com>\nSuggested-by: Gerald Schaefer <gerald.schaefer@linux.ibm.com>\nAcked-by: David Hildenbrand <david@redhat.com>\nCc: Alexander Gordeev <agordeev@linux.ibm.com>\nCc: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>\nCc: Heiko Carstens <hca@linux.ibm.com>\nCc: Michal Hocko <mhocko@suse.com>\nCc: Oscar Salvador <osalvador@suse.de>\nCc: Vasily Gorbik <gor@linux.ibm.com>\nCc: <stable@vger.kernel.org>\t[6.6+]\nSigned-off-by: Andrew Morton <akpm@linux-foundation.org>\nSigned-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>" + } + ], + "affected": [ + { + "product": "Linux", + "vendor": "Linux", + "versions": [ + { + "lessThan": "6.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/torvalds/c/0f91df0c0fae1a88f11be3eabb1f20f73a88c90a" + } + ], + "title": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval", + "x_generator": { + "engine": "bippy" + } + } + }, + "cveMetadata": { + "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", + "cveID": "CVE-2024-0052", + "requesterUserId": "gregkh@linuxfoundation.org", + "serial": "1", + "state": "PUBLISHED" + }, + "dataType": "CVE_RECORD", + "dataVersion": "5.0" +} |