From 5e405ac5faa1da03424e97561c8ae3d90dbfedd5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 26 Feb 2024 18:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/25xxx/CVE-2019-25160.json | 18 ++++ 2019/25xxx/CVE-2019-25161.json | 18 ++++ 2019/25xxx/CVE-2019-25162.json | 18 ++++ 2019/25xxx/CVE-2019-25163.json | 18 ++++ 2019/25xxx/CVE-2019-25164.json | 18 ++++ 2019/25xxx/CVE-2019-25165.json | 18 ++++ 2019/25xxx/CVE-2019-25166.json | 18 ++++ 2019/25xxx/CVE-2019-25167.json | 18 ++++ 2019/25xxx/CVE-2019-25168.json | 18 ++++ 2019/25xxx/CVE-2019-25169.json | 18 ++++ 2019/25xxx/CVE-2019-25170.json | 18 ++++ 2019/25xxx/CVE-2019-25171.json | 18 ++++ 2019/25xxx/CVE-2019-25199.json | 18 ++++ 2019/25xxx/CVE-2019-25200.json | 18 ++++ 2019/25xxx/CVE-2019-25201.json | 18 ++++ 2019/25xxx/CVE-2019-25202.json | 18 ++++ 2019/25xxx/CVE-2019-25203.json | 18 ++++ 2019/25xxx/CVE-2019-25204.json | 18 ++++ 2019/25xxx/CVE-2019-25205.json | 18 ++++ 2019/25xxx/CVE-2019-25206.json | 18 ++++ 2019/25xxx/CVE-2019-25207.json | 18 ++++ 2019/25xxx/CVE-2019-25208.json | 18 ++++ 2019/25xxx/CVE-2019-25209.json | 18 ++++ 2020/36xxx/CVE-2020-36775.json | 103 +++++++++++++++++++++++ 2020/36xxx/CVE-2020-36776.json | 18 ++++ 2020/36xxx/CVE-2020-36777.json | 18 ++++ 2020/36xxx/CVE-2020-36778.json | 18 ++++ 2020/36xxx/CVE-2020-36779.json | 18 ++++ 2020/36xxx/CVE-2020-36780.json | 18 ++++ 2020/36xxx/CVE-2020-36781.json | 18 ++++ 2020/36xxx/CVE-2020-36782.json | 18 ++++ 2020/36xxx/CVE-2020-36783.json | 18 ++++ 2020/36xxx/CVE-2020-36784.json | 18 ++++ 2020/36xxx/CVE-2020-36785.json | 18 ++++ 2020/36xxx/CVE-2020-36786.json | 18 ++++ 2020/36xxx/CVE-2020-36787.json | 18 ++++ 2020/36xxx/CVE-2020-36788.json | 18 ++++ 2020/36xxx/CVE-2020-36789.json | 18 ++++ 2020/36xxx/CVE-2020-36790.json | 18 ++++ 2020/36xxx/CVE-2020-36791.json | 18 ++++ 2020/36xxx/CVE-2020-36792.json | 18 ++++ 2020/36xxx/CVE-2020-36793.json | 18 ++++ 2020/36xxx/CVE-2020-36794.json | 18 ++++ 2020/36xxx/CVE-2020-36795.json | 18 ++++ 2020/36xxx/CVE-2020-36796.json | 18 ++++ 2020/36xxx/CVE-2020-36797.json | 18 ++++ 2020/36xxx/CVE-2020-36798.json | 18 ++++ 2020/36xxx/CVE-2020-36799.json | 18 ++++ 2020/36xxx/CVE-2020-36800.json | 18 ++++ 2020/36xxx/CVE-2020-36801.json | 18 ++++ 2020/36xxx/CVE-2020-36802.json | 18 ++++ 2020/36xxx/CVE-2020-36803.json | 18 ++++ 2020/36xxx/CVE-2020-36804.json | 18 ++++ 2020/36xxx/CVE-2020-36805.json | 18 ++++ 2020/36xxx/CVE-2020-36806.json | 18 ++++ 2020/36xxx/CVE-2020-36807.json | 18 ++++ 2020/36xxx/CVE-2020-36808.json | 18 ++++ 2020/36xxx/CVE-2020-36809.json | 18 ++++ 2020/36xxx/CVE-2020-36810.json | 18 ++++ 2020/36xxx/CVE-2020-36811.json | 18 ++++ 2020/36xxx/CVE-2020-36812.json | 18 ++++ 2020/36xxx/CVE-2020-36813.json | 18 ++++ 2020/36xxx/CVE-2020-36814.json | 18 ++++ 2020/36xxx/CVE-2020-36815.json | 18 ++++ 2020/36xxx/CVE-2020-36816.json | 18 ++++ 2020/36xxx/CVE-2020-36817.json | 18 ++++ 2020/36xxx/CVE-2020-36818.json | 18 ++++ 2020/36xxx/CVE-2020-36819.json | 18 ++++ 2020/36xxx/CVE-2020-36820.json | 18 ++++ 2020/36xxx/CVE-2020-36821.json | 18 ++++ 2020/36xxx/CVE-2020-36822.json | 18 ++++ 2020/36xxx/CVE-2020-36823.json | 18 ++++ 2020/36xxx/CVE-2020-36824.json | 18 ++++ 2021/46xxx/CVE-2021-46906.json | 148 ++++++++++++++++++++++++++++++++- 2023/52xxx/CVE-2023-52474.json | 136 +++++++++++++++++++++++++++++- 2023/7xxx/CVE-2023-7248.json | 18 ++++ 2024/1xxx/CVE-2024-1895.json | 18 ++++ 2024/1xxx/CVE-2024-1896.json | 18 ++++ 2024/1xxx/CVE-2024-1897.json | 18 ++++ 2024/21xxx/CVE-2024-21802.json | 5 ++ 2024/21xxx/CVE-2024-21825.json | 5 ++ 2024/21xxx/CVE-2024-21836.json | 5 ++ 2024/23xxx/CVE-2024-23496.json | 5 ++ 2024/23xxx/CVE-2024-23605.json | 5 ++ 2024/25xxx/CVE-2024-25768.json | 56 +++++++++++-- 2024/25xxx/CVE-2024-25770.json | 56 +++++++++++-- 2024/27xxx/CVE-2024-27084.json | 8 +- 87 files changed, 1876 insertions(+), 24 deletions(-) create mode 100644 2019/25xxx/CVE-2019-25160.json create mode 100644 2019/25xxx/CVE-2019-25161.json create mode 100644 2019/25xxx/CVE-2019-25162.json create mode 100644 2019/25xxx/CVE-2019-25163.json create mode 100644 2019/25xxx/CVE-2019-25164.json create mode 100644 2019/25xxx/CVE-2019-25165.json create mode 100644 2019/25xxx/CVE-2019-25166.json create mode 100644 2019/25xxx/CVE-2019-25167.json create mode 100644 2019/25xxx/CVE-2019-25168.json create mode 100644 2019/25xxx/CVE-2019-25169.json create mode 100644 2019/25xxx/CVE-2019-25170.json create mode 100644 2019/25xxx/CVE-2019-25171.json create mode 100644 2019/25xxx/CVE-2019-25199.json create mode 100644 2019/25xxx/CVE-2019-25200.json create mode 100644 2019/25xxx/CVE-2019-25201.json create mode 100644 2019/25xxx/CVE-2019-25202.json create mode 100644 2019/25xxx/CVE-2019-25203.json create mode 100644 2019/25xxx/CVE-2019-25204.json create mode 100644 2019/25xxx/CVE-2019-25205.json create mode 100644 2019/25xxx/CVE-2019-25206.json create mode 100644 2019/25xxx/CVE-2019-25207.json create mode 100644 2019/25xxx/CVE-2019-25208.json create mode 100644 2019/25xxx/CVE-2019-25209.json create mode 100644 2020/36xxx/CVE-2020-36775.json create mode 100644 2020/36xxx/CVE-2020-36776.json create mode 100644 2020/36xxx/CVE-2020-36777.json create mode 100644 2020/36xxx/CVE-2020-36778.json create mode 100644 2020/36xxx/CVE-2020-36779.json create mode 100644 2020/36xxx/CVE-2020-36780.json create mode 100644 2020/36xxx/CVE-2020-36781.json create mode 100644 2020/36xxx/CVE-2020-36782.json create mode 100644 2020/36xxx/CVE-2020-36783.json create mode 100644 2020/36xxx/CVE-2020-36784.json create mode 100644 2020/36xxx/CVE-2020-36785.json create mode 100644 2020/36xxx/CVE-2020-36786.json create mode 100644 2020/36xxx/CVE-2020-36787.json create mode 100644 2020/36xxx/CVE-2020-36788.json create mode 100644 2020/36xxx/CVE-2020-36789.json create mode 100644 2020/36xxx/CVE-2020-36790.json create mode 100644 2020/36xxx/CVE-2020-36791.json create mode 100644 2020/36xxx/CVE-2020-36792.json create mode 100644 2020/36xxx/CVE-2020-36793.json create mode 100644 2020/36xxx/CVE-2020-36794.json create mode 100644 2020/36xxx/CVE-2020-36795.json create mode 100644 2020/36xxx/CVE-2020-36796.json create mode 100644 2020/36xxx/CVE-2020-36797.json create mode 100644 2020/36xxx/CVE-2020-36798.json create mode 100644 2020/36xxx/CVE-2020-36799.json create mode 100644 2020/36xxx/CVE-2020-36800.json create mode 100644 2020/36xxx/CVE-2020-36801.json create mode 100644 2020/36xxx/CVE-2020-36802.json create mode 100644 2020/36xxx/CVE-2020-36803.json create mode 100644 2020/36xxx/CVE-2020-36804.json create mode 100644 2020/36xxx/CVE-2020-36805.json create mode 100644 2020/36xxx/CVE-2020-36806.json create mode 100644 2020/36xxx/CVE-2020-36807.json create mode 100644 2020/36xxx/CVE-2020-36808.json create mode 100644 2020/36xxx/CVE-2020-36809.json create mode 100644 2020/36xxx/CVE-2020-36810.json create mode 100644 2020/36xxx/CVE-2020-36811.json create mode 100644 2020/36xxx/CVE-2020-36812.json create mode 100644 2020/36xxx/CVE-2020-36813.json create mode 100644 2020/36xxx/CVE-2020-36814.json create mode 100644 2020/36xxx/CVE-2020-36815.json create mode 100644 2020/36xxx/CVE-2020-36816.json create mode 100644 2020/36xxx/CVE-2020-36817.json create mode 100644 2020/36xxx/CVE-2020-36818.json create mode 100644 2020/36xxx/CVE-2020-36819.json create mode 100644 2020/36xxx/CVE-2020-36820.json create mode 100644 2020/36xxx/CVE-2020-36821.json create mode 100644 2020/36xxx/CVE-2020-36822.json create mode 100644 2020/36xxx/CVE-2020-36823.json create mode 100644 2020/36xxx/CVE-2020-36824.json create mode 100644 2023/7xxx/CVE-2023-7248.json create mode 100644 2024/1xxx/CVE-2024-1895.json create mode 100644 2024/1xxx/CVE-2024-1896.json create mode 100644 2024/1xxx/CVE-2024-1897.json diff --git a/2019/25xxx/CVE-2019-25160.json b/2019/25xxx/CVE-2019-25160.json new file mode 100644 index 00000000000..65e7b41387d --- /dev/null +++ b/2019/25xxx/CVE-2019-25160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25161.json b/2019/25xxx/CVE-2019-25161.json new file mode 100644 index 00000000000..e509c341508 --- /dev/null +++ b/2019/25xxx/CVE-2019-25161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25162.json b/2019/25xxx/CVE-2019-25162.json new file mode 100644 index 00000000000..2a78038aaaf --- /dev/null +++ b/2019/25xxx/CVE-2019-25162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25163.json b/2019/25xxx/CVE-2019-25163.json new file mode 100644 index 00000000000..e94a657870b --- /dev/null +++ b/2019/25xxx/CVE-2019-25163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25164.json b/2019/25xxx/CVE-2019-25164.json new file mode 100644 index 00000000000..cb25692226c --- /dev/null +++ b/2019/25xxx/CVE-2019-25164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25165.json b/2019/25xxx/CVE-2019-25165.json new file mode 100644 index 00000000000..f205b3f69d7 --- /dev/null +++ b/2019/25xxx/CVE-2019-25165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25166.json b/2019/25xxx/CVE-2019-25166.json new file mode 100644 index 00000000000..7c4220f4f45 --- /dev/null +++ b/2019/25xxx/CVE-2019-25166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25167.json b/2019/25xxx/CVE-2019-25167.json new file mode 100644 index 00000000000..d29d6756cdb --- /dev/null +++ b/2019/25xxx/CVE-2019-25167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25168.json b/2019/25xxx/CVE-2019-25168.json new file mode 100644 index 00000000000..b2320abc56f --- /dev/null +++ b/2019/25xxx/CVE-2019-25168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25169.json b/2019/25xxx/CVE-2019-25169.json new file mode 100644 index 00000000000..08cb3b1473b --- /dev/null +++ b/2019/25xxx/CVE-2019-25169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25170.json b/2019/25xxx/CVE-2019-25170.json new file mode 100644 index 00000000000..68cb931121a --- /dev/null +++ b/2019/25xxx/CVE-2019-25170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25171.json b/2019/25xxx/CVE-2019-25171.json new file mode 100644 index 00000000000..69543e5fd0c --- /dev/null +++ b/2019/25xxx/CVE-2019-25171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25199.json b/2019/25xxx/CVE-2019-25199.json new file mode 100644 index 00000000000..78bcab50509 --- /dev/null +++ b/2019/25xxx/CVE-2019-25199.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25199", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25200.json b/2019/25xxx/CVE-2019-25200.json new file mode 100644 index 00000000000..30de98b89ec --- /dev/null +++ b/2019/25xxx/CVE-2019-25200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25201.json b/2019/25xxx/CVE-2019-25201.json new file mode 100644 index 00000000000..f073d8db345 --- /dev/null +++ b/2019/25xxx/CVE-2019-25201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25202.json b/2019/25xxx/CVE-2019-25202.json new file mode 100644 index 00000000000..0f79172ce05 --- /dev/null +++ b/2019/25xxx/CVE-2019-25202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25203.json b/2019/25xxx/CVE-2019-25203.json new file mode 100644 index 00000000000..5c65e8efb16 --- /dev/null +++ b/2019/25xxx/CVE-2019-25203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25204.json b/2019/25xxx/CVE-2019-25204.json new file mode 100644 index 00000000000..0ef16274dc9 --- /dev/null +++ b/2019/25xxx/CVE-2019-25204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25205.json b/2019/25xxx/CVE-2019-25205.json new file mode 100644 index 00000000000..2ba6354a202 --- /dev/null +++ b/2019/25xxx/CVE-2019-25205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25206.json b/2019/25xxx/CVE-2019-25206.json new file mode 100644 index 00000000000..c03a3dd039e --- /dev/null +++ b/2019/25xxx/CVE-2019-25206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25207.json b/2019/25xxx/CVE-2019-25207.json new file mode 100644 index 00000000000..b34170efd7a --- /dev/null +++ b/2019/25xxx/CVE-2019-25207.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25207", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25208.json b/2019/25xxx/CVE-2019-25208.json new file mode 100644 index 00000000000..d10a0e862d5 --- /dev/null +++ b/2019/25xxx/CVE-2019-25208.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25208", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/25xxx/CVE-2019-25209.json b/2019/25xxx/CVE-2019-25209.json new file mode 100644 index 00000000000..e17bdaedfd1 --- /dev/null +++ b/2019/25xxx/CVE-2019-25209.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-25209", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36775.json b/2020/36xxx/CVE-2020-36775.json new file mode 100644 index 00000000000..119eeefe759 --- /dev/null +++ b/2020/36xxx/CVE-2020-36775.json @@ -0,0 +1,103 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2020-36775", + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid potential deadlock\n\nUsing f2fs_trylock_op() in f2fs_write_compressed_pages() to avoid potential\ndeadlock like we did in f2fs_write_single_data_page()." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "0478ccdc8ea0" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4.189", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.6.7", + "lessThanOrEqual": "5.6.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.7", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b" + }, + { + "url": "https://git.kernel.org/stable/c/8e8542437bb4070423c9754d5ba270ffdbae8c8d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8e8542437bb4070423c9754d5ba270ffdbae8c8d" + }, + { + "url": "https://git.kernel.org/stable/c/df77fbd8c5b222c680444801ffd20e8bbc90a56e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/df77fbd8c5b222c680444801ffd20e8bbc90a56e" + } + ] + }, + "generator": { + "engine": "bippy-b01c2a820106" + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36776.json b/2020/36xxx/CVE-2020-36776.json new file mode 100644 index 00000000000..0088ec9a7ca --- /dev/null +++ b/2020/36xxx/CVE-2020-36776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36777.json b/2020/36xxx/CVE-2020-36777.json new file mode 100644 index 00000000000..29a16e052d3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36778.json b/2020/36xxx/CVE-2020-36778.json new file mode 100644 index 00000000000..7cab3366cd0 --- /dev/null +++ b/2020/36xxx/CVE-2020-36778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36779.json b/2020/36xxx/CVE-2020-36779.json new file mode 100644 index 00000000000..4f72c5965e3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36780.json b/2020/36xxx/CVE-2020-36780.json new file mode 100644 index 00000000000..d89d62cc806 --- /dev/null +++ b/2020/36xxx/CVE-2020-36780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36781.json b/2020/36xxx/CVE-2020-36781.json new file mode 100644 index 00000000000..62a65df5316 --- /dev/null +++ b/2020/36xxx/CVE-2020-36781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36782.json b/2020/36xxx/CVE-2020-36782.json new file mode 100644 index 00000000000..2fd64a501e8 --- /dev/null +++ b/2020/36xxx/CVE-2020-36782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36783.json b/2020/36xxx/CVE-2020-36783.json new file mode 100644 index 00000000000..d8b740f89ca --- /dev/null +++ b/2020/36xxx/CVE-2020-36783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36784.json b/2020/36xxx/CVE-2020-36784.json new file mode 100644 index 00000000000..b0d719027eb --- /dev/null +++ b/2020/36xxx/CVE-2020-36784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36785.json b/2020/36xxx/CVE-2020-36785.json new file mode 100644 index 00000000000..b3b0ba7104f --- /dev/null +++ b/2020/36xxx/CVE-2020-36785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36786.json b/2020/36xxx/CVE-2020-36786.json new file mode 100644 index 00000000000..8c5d99cc969 --- /dev/null +++ b/2020/36xxx/CVE-2020-36786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36787.json b/2020/36xxx/CVE-2020-36787.json new file mode 100644 index 00000000000..020c39bb2ae --- /dev/null +++ b/2020/36xxx/CVE-2020-36787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36788.json b/2020/36xxx/CVE-2020-36788.json new file mode 100644 index 00000000000..9580ec55bff --- /dev/null +++ b/2020/36xxx/CVE-2020-36788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36789.json b/2020/36xxx/CVE-2020-36789.json new file mode 100644 index 00000000000..bda3c0f537e --- /dev/null +++ b/2020/36xxx/CVE-2020-36789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36790.json b/2020/36xxx/CVE-2020-36790.json new file mode 100644 index 00000000000..c753838f4d6 --- /dev/null +++ b/2020/36xxx/CVE-2020-36790.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36790", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36791.json b/2020/36xxx/CVE-2020-36791.json new file mode 100644 index 00000000000..63a4bc69a35 --- /dev/null +++ b/2020/36xxx/CVE-2020-36791.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36791", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36792.json b/2020/36xxx/CVE-2020-36792.json new file mode 100644 index 00000000000..f8bbc907db1 --- /dev/null +++ b/2020/36xxx/CVE-2020-36792.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36792", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36793.json b/2020/36xxx/CVE-2020-36793.json new file mode 100644 index 00000000000..d78e6f9ca90 --- /dev/null +++ b/2020/36xxx/CVE-2020-36793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36794.json b/2020/36xxx/CVE-2020-36794.json new file mode 100644 index 00000000000..4d76d832e52 --- /dev/null +++ b/2020/36xxx/CVE-2020-36794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36795.json b/2020/36xxx/CVE-2020-36795.json new file mode 100644 index 00000000000..a5bc6acfea3 --- /dev/null +++ b/2020/36xxx/CVE-2020-36795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36796.json b/2020/36xxx/CVE-2020-36796.json new file mode 100644 index 00000000000..d54b93170ff --- /dev/null +++ b/2020/36xxx/CVE-2020-36796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36797.json b/2020/36xxx/CVE-2020-36797.json new file mode 100644 index 00000000000..5e3aeb00507 --- /dev/null +++ b/2020/36xxx/CVE-2020-36797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36798.json b/2020/36xxx/CVE-2020-36798.json new file mode 100644 index 00000000000..f10be9ba1a7 --- /dev/null +++ b/2020/36xxx/CVE-2020-36798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36799.json b/2020/36xxx/CVE-2020-36799.json new file mode 100644 index 00000000000..9c9d6eea171 --- /dev/null +++ b/2020/36xxx/CVE-2020-36799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36800.json b/2020/36xxx/CVE-2020-36800.json new file mode 100644 index 00000000000..f1292068dac --- /dev/null +++ b/2020/36xxx/CVE-2020-36800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36801.json b/2020/36xxx/CVE-2020-36801.json new file mode 100644 index 00000000000..708f1f12617 --- /dev/null +++ b/2020/36xxx/CVE-2020-36801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36802.json b/2020/36xxx/CVE-2020-36802.json new file mode 100644 index 00000000000..4b4e19f89c7 --- /dev/null +++ b/2020/36xxx/CVE-2020-36802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36803.json b/2020/36xxx/CVE-2020-36803.json new file mode 100644 index 00000000000..332ab20512c --- /dev/null +++ b/2020/36xxx/CVE-2020-36803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36804.json b/2020/36xxx/CVE-2020-36804.json new file mode 100644 index 00000000000..a753a038280 --- /dev/null +++ b/2020/36xxx/CVE-2020-36804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36805.json b/2020/36xxx/CVE-2020-36805.json new file mode 100644 index 00000000000..48f7c590427 --- /dev/null +++ b/2020/36xxx/CVE-2020-36805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36806.json b/2020/36xxx/CVE-2020-36806.json new file mode 100644 index 00000000000..4d00248c387 --- /dev/null +++ b/2020/36xxx/CVE-2020-36806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36807.json b/2020/36xxx/CVE-2020-36807.json new file mode 100644 index 00000000000..a041e5ab058 --- /dev/null +++ b/2020/36xxx/CVE-2020-36807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36808.json b/2020/36xxx/CVE-2020-36808.json new file mode 100644 index 00000000000..432c6ae297c --- /dev/null +++ b/2020/36xxx/CVE-2020-36808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36809.json b/2020/36xxx/CVE-2020-36809.json new file mode 100644 index 00000000000..a768b28ce47 --- /dev/null +++ b/2020/36xxx/CVE-2020-36809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36810.json b/2020/36xxx/CVE-2020-36810.json new file mode 100644 index 00000000000..4b99d424b46 --- /dev/null +++ b/2020/36xxx/CVE-2020-36810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36811.json b/2020/36xxx/CVE-2020-36811.json new file mode 100644 index 00000000000..c22298de273 --- /dev/null +++ b/2020/36xxx/CVE-2020-36811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36812.json b/2020/36xxx/CVE-2020-36812.json new file mode 100644 index 00000000000..bbde3926d80 --- /dev/null +++ b/2020/36xxx/CVE-2020-36812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36813.json b/2020/36xxx/CVE-2020-36813.json new file mode 100644 index 00000000000..ef92e4ad8c6 --- /dev/null +++ b/2020/36xxx/CVE-2020-36813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36814.json b/2020/36xxx/CVE-2020-36814.json new file mode 100644 index 00000000000..1e447bdc4ea --- /dev/null +++ b/2020/36xxx/CVE-2020-36814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36815.json b/2020/36xxx/CVE-2020-36815.json new file mode 100644 index 00000000000..a0eac1c9229 --- /dev/null +++ b/2020/36xxx/CVE-2020-36815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36816.json b/2020/36xxx/CVE-2020-36816.json new file mode 100644 index 00000000000..d7cbd1cab8d --- /dev/null +++ b/2020/36xxx/CVE-2020-36816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36817.json b/2020/36xxx/CVE-2020-36817.json new file mode 100644 index 00000000000..c4cfbdcce4d --- /dev/null +++ b/2020/36xxx/CVE-2020-36817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36818.json b/2020/36xxx/CVE-2020-36818.json new file mode 100644 index 00000000000..8c33530c2da --- /dev/null +++ b/2020/36xxx/CVE-2020-36818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36819.json b/2020/36xxx/CVE-2020-36819.json new file mode 100644 index 00000000000..9d3412dd19e --- /dev/null +++ b/2020/36xxx/CVE-2020-36819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36820.json b/2020/36xxx/CVE-2020-36820.json new file mode 100644 index 00000000000..fe6fb3ec2bb --- /dev/null +++ b/2020/36xxx/CVE-2020-36820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36821.json b/2020/36xxx/CVE-2020-36821.json new file mode 100644 index 00000000000..4f3efedd214 --- /dev/null +++ b/2020/36xxx/CVE-2020-36821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36822.json b/2020/36xxx/CVE-2020-36822.json new file mode 100644 index 00000000000..146ff63c1ab --- /dev/null +++ b/2020/36xxx/CVE-2020-36822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36823.json b/2020/36xxx/CVE-2020-36823.json new file mode 100644 index 00000000000..26c4a6a8073 --- /dev/null +++ b/2020/36xxx/CVE-2020-36823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36824.json b/2020/36xxx/CVE-2020-36824.json new file mode 100644 index 00000000000..d4e9b0efde4 --- /dev/null +++ b/2020/36xxx/CVE-2020-36824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-36824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/46xxx/CVE-2021-46906.json b/2021/46xxx/CVE-2021-46906.json index d44b8025394..ccc0a0ebbef 100644 --- a/2021/46xxx/CVE-2021-46906.json +++ b/2021/46xxx/CVE-2021-46906.json @@ -1,18 +1,158 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-46906", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: fix info leak in hid_submit_ctrl\n\nIn hid_submit_ctrl(), the way of calculating the report length doesn't\ntake into account that report->size can be zero. When running the\nsyzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to\ncalculate transfer_buffer_length as 16384. When this urb is passed to\nthe usb core layer, KMSAN reports an info leak of 16384 bytes.\n\nTo fix this, first modify hid_report_len() to account for the zero\nreport size case by using DIV_ROUND_UP for the division. Then, call it\nfrom hid_submit_ctrl()." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "c5d3c142f2d5" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.4.274", + "lessThanOrEqual": "4.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.9.274", + "lessThanOrEqual": "4.9.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.14.238", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "4.19.196", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.127", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.45", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.12.12", + "lessThanOrEqual": "5.12.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.13", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366" + }, + { + "url": "https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce" + }, + { + "url": "https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0" + }, + { + "url": "https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82" + }, + { + "url": "https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1" + }, + { + "url": "https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9" + }, + { + "url": "https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8" + }, + { + "url": "https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f" + } + ] + }, + "generator": { + "engine": "bippy-b01c2a820106" } } \ No newline at end of file diff --git a/2023/52xxx/CVE-2023-52474.json b/2023/52xxx/CVE-2023-52474.json index b08afcdda04..b8bbd117e10 100644 --- a/2023/52xxx/CVE-2023-52474.json +++ b/2023/52xxx/CVE-2023-52474.json @@ -1,18 +1,146 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-52474", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests\n\nhfi1 user SDMA request processing has two bugs that can cause data\ncorruption for user SDMA requests that have multiple payload iovecs\nwhere an iovec other than the tail iovec does not run up to the page\nboundary for the buffer pointed to by that iovec.a\n\nHere are the specific bugs:\n1. user_sdma_txadd() does not use struct user_sdma_iovec->iov.iov_len.\n Rather, user_sdma_txadd() will add up to PAGE_SIZE bytes from iovec\n to the packet, even if some of those bytes are past\n iovec->iov.iov_len and are thus not intended to be in the packet.\n2. user_sdma_txadd() and user_sdma_send_pkts() fail to advance to the\n next iovec in user_sdma_request->iovs when the current iovec\n is not PAGE_SIZE and does not contain enough data to complete the\n packet. The transmitted packet will contain the wrong data from the\n iovec pages.\n\nThis has not been an issue with SDMA packets from hfi1 Verbs or PSM2\nbecause they only produce iovecs that end short of PAGE_SIZE as the tail\niovec of an SDMA request.\n\nFixing these bugs exposes other bugs with the SDMA pin cache\n(struct mmu_rb_handler) that get in way of supporting user SDMA requests\nwith multiple payload iovecs whose buffers do not end at PAGE_SIZE. So\nthis commit fixes those issues as well.\n\nHere are the mmu_rb_handler bugs that non-PAGE_SIZE-end multi-iovec\npayload user SDMA requests can hit:\n1. Overlapping memory ranges in mmu_rb_handler will result in duplicate\n pinnings.\n2. When extending an existing mmu_rb_handler entry (struct mmu_rb_node),\n the mmu_rb code (1) removes the existing entry under a lock, (2)\n releases that lock, pins the new pages, (3) then reacquires the lock\n to insert the extended mmu_rb_node.\n\n If someone else comes in and inserts an overlapping entry between (2)\n and (3), insert in (3) will fail.\n\n The failure path code in this case unpins _all_ pages in either the\n original mmu_rb_node or the new mmu_rb_node that was inserted between\n (2) and (3).\n3. In hfi1_mmu_rb_remove_unless_exact(), mmu_rb_node->refcount is\n incremented outside of mmu_rb_handler->lock. As a result, mmu_rb_node\n could be evicted by another thread that gets mmu_rb_handler->lock and\n checks mmu_rb_node->refcount before mmu_rb_node->refcount is\n incremented.\n4. Related to #2 above, SDMA request submission failure path does not\n check mmu_rb_node->refcount before freeing mmu_rb_node object.\n\n If there are other SDMA requests in progress whose iovecs have\n pointers to the now-freed mmu_rb_node(s), those pointers to the\n now-freed mmu_rb nodes will be dereferenced when those SDMA requests\n complete." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7724105686e7", + "version_value": "9c4c6512d733" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.3", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.3", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.180", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.15.111", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.1.28", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.2.15", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.3.2", + "lessThanOrEqual": "6.3.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.4", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/9c4c6512d7330b743c4ffd18bd999a86ca26db0d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9c4c6512d7330b743c4ffd18bd999a86ca26db0d" + }, + { + "url": "https://git.kernel.org/stable/c/a2bd706ab63509793b5cd5065e685b7ef5cba678", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a2bd706ab63509793b5cd5065e685b7ef5cba678" + }, + { + "url": "https://git.kernel.org/stable/c/dce59b5443700fbd0d2433ec6e4d4cf063448844", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/dce59b5443700fbd0d2433ec6e4d4cf063448844" + }, + { + "url": "https://git.kernel.org/stable/c/c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80" + }, + { + "url": "https://git.kernel.org/stable/c/7e6010f79b58f45b204cf18aa58f4b73c3f30adc", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7e6010f79b58f45b204cf18aa58f4b73c3f30adc" + }, + { + "url": "https://git.kernel.org/stable/c/00cbce5cbf88459cd1aa1d60d0f1df15477df127", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/00cbce5cbf88459cd1aa1d60d0f1df15477df127" + } + ] + }, + "generator": { + "engine": "bippy-b01c2a820106" } } \ No newline at end of file diff --git a/2023/7xxx/CVE-2023-7248.json b/2023/7xxx/CVE-2023-7248.json new file mode 100644 index 00000000000..86f62d23880 --- /dev/null +++ b/2023/7xxx/CVE-2023-7248.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-7248", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1895.json b/2024/1xxx/CVE-2024-1895.json new file mode 100644 index 00000000000..701f76e710f --- /dev/null +++ b/2024/1xxx/CVE-2024-1895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1896.json b/2024/1xxx/CVE-2024-1896.json new file mode 100644 index 00000000000..9a8130e49eb --- /dev/null +++ b/2024/1xxx/CVE-2024-1896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1897.json b/2024/1xxx/CVE-2024-1897.json new file mode 100644 index 00000000000..67b976accd5 --- /dev/null +++ b/2024/1xxx/CVE-2024-1897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/21xxx/CVE-2024-21802.json b/2024/21xxx/CVE-2024-21802.json index 7303cf9717d..1dc32216908 100644 --- a/2024/21xxx/CVE-2024-21802.json +++ b/2024/21xxx/CVE-2024-21802.json @@ -58,6 +58,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1914", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1914" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1914", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1914" } ] }, diff --git a/2024/21xxx/CVE-2024-21825.json b/2024/21xxx/CVE-2024-21825.json index 7272929e09d..2931ffa3cad 100644 --- a/2024/21xxx/CVE-2024-21825.json +++ b/2024/21xxx/CVE-2024-21825.json @@ -58,6 +58,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1912", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1912" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1912", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1912" } ] }, diff --git a/2024/21xxx/CVE-2024-21836.json b/2024/21xxx/CVE-2024-21836.json index 9b8f380e90a..9731926d92b 100644 --- a/2024/21xxx/CVE-2024-21836.json +++ b/2024/21xxx/CVE-2024-21836.json @@ -58,6 +58,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1915", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1915" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1915", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1915" } ] }, diff --git a/2024/23xxx/CVE-2024-23496.json b/2024/23xxx/CVE-2024-23496.json index e37dda484e2..08db0a50560 100644 --- a/2024/23xxx/CVE-2024-23496.json +++ b/2024/23xxx/CVE-2024-23496.json @@ -58,6 +58,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1913", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1913" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1913", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1913" } ] }, diff --git a/2024/23xxx/CVE-2024-23605.json b/2024/23xxx/CVE-2024-23605.json index f2a4bff42af..7375307a2f6 100644 --- a/2024/23xxx/CVE-2024-23605.json +++ b/2024/23xxx/CVE-2024-23605.json @@ -58,6 +58,11 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1916", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1916" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1916", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1916" } ] }, diff --git a/2024/25xxx/CVE-2024-25768.json b/2024/25xxx/CVE-2024-25768.json index 662ad39629d..7407bfa825e 100644 --- a/2024/25xxx/CVE-2024-25768.json +++ b/2024/25xxx/CVE-2024-25768.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25768", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25768", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenDMARC 1.4.2 contains a null pointer dereference vulnerability in /OpenDMARC/libopendmarc/opendmarc_policy.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/LuMingYinDetect/OpenDMARC_defects/blob/main/OpenDMARC_detect_1.md", + "refsource": "MISC", + "name": "https://github.com/LuMingYinDetect/OpenDMARC_defects/blob/main/OpenDMARC_detect_1.md" } ] } diff --git a/2024/25xxx/CVE-2024-25770.json b/2024/25xxx/CVE-2024-25770.json index 9f1f8967fdd..6dfc65ca3d5 100644 --- a/2024/25xxx/CVE-2024-25770.json +++ b/2024/25xxx/CVE-2024-25770.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-25770", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-25770", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "libming 0.4.8 contains a memory leak vulnerability in /libming/src/actioncompiler/listaction.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/LuMingYinDetect/libming_defects/blob/main/libming_detect_1.md", + "refsource": "MISC", + "name": "https://github.com/LuMingYinDetect/libming_defects/blob/main/libming_detect_1.md" } ] } diff --git a/2024/27xxx/CVE-2024-27084.json b/2024/27xxx/CVE-2024-27084.json index 0e477a92ec5..004e7e1f697 100644 --- a/2024/27xxx/CVE-2024-27084.json +++ b/2024/27xxx/CVE-2024-27084.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-27084", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This CVE is a duplicate of CVE-2024-1631." } ] }