From 76055e238231b9c484918355f31da21fde76ed1c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 28 May 2018 00:05:01 -0400 Subject: [PATCH] - Synchronized data. --- 2018/11xxx/CVE-2018-11506.json | 67 ++++++++++++++++++++++++++++++++++ 2018/11xxx/CVE-2018-11507.json | 62 +++++++++++++++++++++++++++++++ 2 files changed, 129 insertions(+) create mode 100644 2018/11xxx/CVE-2018-11506.json create mode 100644 2018/11xxx/CVE-2018-11507.json diff --git a/2018/11xxx/CVE-2018-11506.json b/2018/11xxx/CVE-2018-11506.json new file mode 100644 index 00000000000..7eb81f2ce09 --- /dev/null +++ b/2018/11xxx/CVE-2018-11506.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11506", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe", + "refsource" : "MISC", + "url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe" + }, + { + "name" : "https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe", + "refsource" : "MISC", + "url" : "https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11507.json b/2018/11xxx/CVE-2018-11507.json new file mode 100644 index 00000000000..92e4ee92323 --- /dev/null +++ b/2018/11xxx/CVE-2018-11507.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11507", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Free Lossless Image Format (FLIF) 0.3. An attacker can trigger a long loop in image_load_pnm in image/image-pnm.cpp." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/FLIF-hub/FLIF/issues/509", + "refsource" : "MISC", + "url" : "https://github.com/FLIF-hub/FLIF/issues/509" + } + ] + } +}