diff --git a/2023/53xxx/CVE-2023-53017.json b/2023/53xxx/CVE-2023-53017.json index 4f31f5624db..47843b34151 100644 --- a/2023/53xxx/CVE-2023-53017.json +++ b/2023/53xxx/CVE-2023-53017.json @@ -1,18 +1,102 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: fix memory leak in hci_update_adv_data()\n\nWhen hci_cmd_sync_queue() failed in hci_update_adv_data(), inst_ptr is\nnot freed, which will cause memory leak, convert to use ERR_PTR/PTR_ERR\nto pass the instance to callback so no memory needs to be allocated." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "651cd3d65b0f76a2198fcf3a80ce5d53dd267717", + "version_value": "8ac6043bd3e5b58d30f50737aedc2e58e8087ad5" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.1", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.1", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.9", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/8ac6043bd3e5b58d30f50737aedc2e58e8087ad5", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8ac6043bd3e5b58d30f50737aedc2e58e8087ad5" + }, + { + "url": "https://git.kernel.org/stable/c/1ed8b37cbaf14574c779064ef1372af62e8ba6aa", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1ed8b37cbaf14574c779064ef1372af62e8ba6aa" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53018.json b/2023/53xxx/CVE-2023-53018.json index c9cc8a292aa..d0f89b02383 100644 --- a/2023/53xxx/CVE-2023-53018.json +++ b/2023/53xxx/CVE-2023-53018.json @@ -1,18 +1,102 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53018", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_conn: Fix memory leaks\n\nWhen hci_cmd_sync_queue() failed in hci_le_terminate_big() or\nhci_le_big_terminate(), the memory pointed by variable d is not freed,\nwhich will cause memory leak. Add release process to error path." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "eca0ae4aea66914515e5e3098ea051b518ee5316", + "version_value": "f51a825b9f730a782aa768454906b4468e67b667" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.0", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.9", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/f51a825b9f730a782aa768454906b4468e67b667", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f51a825b9f730a782aa768454906b4468e67b667" + }, + { + "url": "https://git.kernel.org/stable/c/3aa21311f36d8a2730c7ccef37235e951f23927b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3aa21311f36d8a2730c7ccef37235e951f23927b" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53019.json b/2023/53xxx/CVE-2023-53019.json index 0f60672b9ab..f6bce97d164 100644 --- a/2023/53xxx/CVE-2023-53019.json +++ b/2023/53xxx/CVE-2023-53019.json @@ -1,18 +1,157 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53019", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: validate parameter addr in mdiobus_get_phy()\n\nThe caller may pass any value as addr, what may result in an out-of-bounds\naccess to array mdio_map. One existing case is stmmac_init_phy() that\nmay pass -1 as addr. Therefore validate addr before using it." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7f854420fbfe9d49afe2ffb1df052cfe8e215541", + "version_value": "1d80c259dfbadefa61b7ea334dfce5cb57f8c72f" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.5", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.14.305", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.272", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.231", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.166", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.91", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.9", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1d80c259dfbadefa61b7ea334dfce5cb57f8c72f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1d80c259dfbadefa61b7ea334dfce5cb57f8c72f" + }, + { + "url": "https://git.kernel.org/stable/c/c431a3d642593bbdb99e8a9e3eed608b730db6f8", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c431a3d642593bbdb99e8a9e3eed608b730db6f8" + }, + { + "url": "https://git.kernel.org/stable/c/8a7b9560a3a8eb8724888c426e05926752f73aa0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8a7b9560a3a8eb8724888c426e05926752f73aa0" + }, + { + "url": "https://git.kernel.org/stable/c/4bc5f1f6bc94e695dfd912122af96e7115a0ddb8", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4bc5f1f6bc94e695dfd912122af96e7115a0ddb8" + }, + { + "url": "https://git.kernel.org/stable/c/ad67de330d83e8078372b52af18ffe8d39e26c85", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ad67de330d83e8078372b52af18ffe8d39e26c85" + }, + { + "url": "https://git.kernel.org/stable/c/7879626296e6ffd838ae0f2af1ab49ee46354973", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7879626296e6ffd838ae0f2af1ab49ee46354973" + }, + { + "url": "https://git.kernel.org/stable/c/867dbe784c5010a466f00a7d1467c1c5ea569c75", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/867dbe784c5010a466f00a7d1467c1c5ea569c75" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31210.json b/2025/31xxx/CVE-2025-31210.json new file mode 100644 index 00000000000..7f3c90bc13b --- /dev/null +++ b/2025/31xxx/CVE-2025-31210.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31210", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31211.json b/2025/31xxx/CVE-2025-31211.json new file mode 100644 index 00000000000..c1b404d582c --- /dev/null +++ b/2025/31xxx/CVE-2025-31211.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31211", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file