diff --git a/2020/13xxx/CVE-2020-13253.json b/2020/13xxx/CVE-2020-13253.json index aa28ea212de..4e6c4abc11e 100644 --- a/2020/13xxx/CVE-2020-13253.json +++ b/2020/13xxx/CVE-2020-13253.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13253", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13253", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html" + }, + { + "refsource": "CONFIRM", + "name": "http://www.openwall.com/lists/oss-security/2020/05/27/2", + "url": "http://www.openwall.com/lists/oss-security/2020/05/27/2" + }, + { + "refsource": "CONFIRM", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1838546", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838546" } ] } diff --git a/2020/13xxx/CVE-2020-13630.json b/2020/13xxx/CVE-2020-13630.json new file mode 100644 index 00000000000..ac65974709c --- /dev/null +++ b/2020/13xxx/CVE-2020-13630.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13630", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459" + }, + { + "url": "https://sqlite.org/src/info/0d69f76f0865f962", + "refsource": "MISC", + "name": "https://sqlite.org/src/info/0d69f76f0865f962" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13631.json b/2020/13xxx/CVE-2020-13631.json new file mode 100644 index 00000000000..38eb42462f6 --- /dev/null +++ b/2020/13xxx/CVE-2020-13631.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13631", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459" + }, + { + "url": "https://sqlite.org/src/info/eca0ba2cf4c0fdf7", + "refsource": "MISC", + "name": "https://sqlite.org/src/info/eca0ba2cf4c0fdf7" + } + ] + } +} \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13632.json b/2020/13xxx/CVE-2020-13632.json new file mode 100644 index 00000000000..cf6d8545324 --- /dev/null +++ b/2020/13xxx/CVE-2020-13632.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-13632", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459", + "refsource": "MISC", + "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459" + }, + { + "url": "https://sqlite.org/src/info/a4dd148928ea65bd", + "refsource": "MISC", + "name": "https://sqlite.org/src/info/a4dd148928ea65bd" + } + ] + } +} \ No newline at end of file