From b4170f45b348cae156975b31eac9481797d9d7df Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Jul 2022 23:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/34xxx/CVE-2022-34632.json | 66 ++++++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34633.json | 61 +++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34634.json | 61 +++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34635.json | 56 +++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34636.json | 61 +++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34637.json | 56 +++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34639.json | 61 +++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34640.json | 56 +++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34641.json | 66 ++++++++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34642.json | 56 +++++++++++++++++++++++++---- 2022/34xxx/CVE-2022-34643.json | 56 +++++++++++++++++++++++++---- 11 files changed, 590 insertions(+), 66 deletions(-) diff --git a/2022/34xxx/CVE-2022-34632.json b/2022/34xxx/CVE-2022-34632.json index 233e5b9f1c4..a526db3fa73 100644 --- a/2022/34xxx/CVE-2022-34632.json +++ b/2022/34xxx/CVE-2022-34632.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34632", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34632", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Rocket-Chip commit 4f8114374d8824dfdec03f576a8cd68bebce4e56 was discovered to contain insufficient cryptography via the component /rocket/RocketCore.scala." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/chipsalliance/rocket-chip/pull/2950#issuecomment-1106745660", + "refsource": "MISC", + "name": "https://github.com/chipsalliance/rocket-chip/pull/2950#issuecomment-1106745660" + }, + { + "url": "https://github.com/chipsalliance/rocket-chip/pull/2950#issuecomment-1107055607", + "refsource": "MISC", + "name": "https://github.com/chipsalliance/rocket-chip/pull/2950#issuecomment-1107055607" + }, + { + "url": "https://github.com/chipsalliance/rocket-chip/pull/2950/commits/4f8114374d8824dfdec03f576a8cd68bebce4e56", + "refsource": "MISC", + "name": "https://github.com/chipsalliance/rocket-chip/pull/2950/commits/4f8114374d8824dfdec03f576a8cd68bebce4e56" } ] } diff --git a/2022/34xxx/CVE-2022-34633.json b/2022/34xxx/CVE-2022-34633.json index df1ed3d1960..ca8dc1c4cdd 100644 --- a/2022/34xxx/CVE-2022-34633.json +++ b/2022/34xxx/CVE-2022-34633.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34633", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34633", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted sfence.vma instructions rather create an exception." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/876", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/876" + }, + { + "url": "https://github.com/openhwgroup/cva6/pull/921", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/pull/921" } ] } diff --git a/2022/34xxx/CVE-2022-34634.json b/2022/34xxx/CVE-2022-34634.json index 716187246f3..69c171ac255 100644 --- a/2022/34xxx/CVE-2022-34634.json +++ b/2022/34xxx/CVE-2022-34634.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34634", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34634", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted det instructions rather create an exception." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/899", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/899" + }, + { + "url": "https://github.com/openhwgroup/cva6/pull/922", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/pull/922" } ] } diff --git a/2022/34xxx/CVE-2022-34635.json b/2022/34xxx/CVE-2022-34635.json index db809c6a55f..e46c971f891 100644 --- a/2022/34xxx/CVE-2022-34635.json +++ b/2022/34xxx/CVE-2022-34635.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34635", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34635", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The mstatus.sd field in CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a does not update when the mstatus.fs field is set to Dirty." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/917", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/917" } ] } diff --git a/2022/34xxx/CVE-2022-34636.json b/2022/34xxx/CVE-2022-34636.json index de417fef2bb..fb75ec05fe1 100644 --- a/2022/34xxx/CVE-2022-34636.json +++ b/2022/34xxx/CVE-2022-34636.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34636", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34636", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMA violation occurs during address translation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/riscv-boom/riscv-boom/issues/606", + "refsource": "MISC", + "name": "https://github.com/riscv-boom/riscv-boom/issues/606" + }, + { + "url": "https://github.com/openhwgroup/cva6/issues/905", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/905" } ] } diff --git a/2022/34xxx/CVE-2022-34637.json b/2022/34xxx/CVE-2022-34637.json index a88c8f059b8..5187ab18510 100644 --- a/2022/34xxx/CVE-2022-34637.json +++ b/2022/34xxx/CVE-2022-34637.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34637", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34637", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a implements an incorrect exception type when an illegal virtual address is loaded." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/904", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/904" } ] } diff --git a/2022/34xxx/CVE-2022-34639.json b/2022/34xxx/CVE-2022-34639.json index 7aad3cb44dd..76e12756b2b 100644 --- a/2022/34xxx/CVE-2022-34639.json +++ b/2022/34xxx/CVE-2022-34639.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34639", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34639", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a treats non-standard fence instructions as illegal which can affect the function of the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/900", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/900" + }, + { + "url": "https://github.com/openhwgroup/cva6/pull/923", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/pull/923" } ] } diff --git a/2022/34xxx/CVE-2022-34640.json b/2022/34xxx/CVE-2022-34640.json index 61714dec796..6bc95ba9d90 100644 --- a/2022/34xxx/CVE-2022-34640.json +++ b/2022/34xxx/CVE-2022-34640.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34640", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34640", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The *tval of ecall/ebreak in CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a was discovered to be incorrect." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/openhwgroup/cva6/issues/898", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/898" } ] } diff --git a/2022/34xxx/CVE-2022-34641.json b/2022/34xxx/CVE-2022-34641.json index 1b6ad07981e..b6d22a9e22c 100644 --- a/2022/34xxx/CVE-2022-34641.json +++ b/2022/34xxx/CVE-2022-34641.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34641", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34641", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMP violation occurs during address translation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/riscv-boom/riscv-boom/issues/605", + "refsource": "MISC", + "name": "https://github.com/riscv-boom/riscv-boom/issues/605" + }, + { + "url": "https://github.com/openhwgroup/cva6/issues/906", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/issues/906" + }, + { + "url": "https://github.com/openhwgroup/cva6/pull/908", + "refsource": "MISC", + "name": "https://github.com/openhwgroup/cva6/pull/908" } ] } diff --git a/2022/34xxx/CVE-2022-34642.json b/2022/34xxx/CVE-2022-34642.json index 9ec4b8f2b5e..4216f5bdfd9 100644 --- a/2022/34xxx/CVE-2022-34642.json +++ b/2022/34xxx/CVE-2022-34642.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34642", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34642", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The component mcontrol.action in RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 contains the incorrect mask which can cause a Denial of Service (DoS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/riscv-software-src/riscv-isa-sim/issues/1032", + "refsource": "MISC", + "name": "https://github.com/riscv-software-src/riscv-isa-sim/issues/1032" } ] } diff --git a/2022/34xxx/CVE-2022-34643.json b/2022/34xxx/CVE-2022-34643.json index 6782aa88f74..fde260d7362 100644 --- a/2022/34xxx/CVE-2022-34643.json +++ b/2022/34xxx/CVE-2022-34643.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34643", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34643", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 implements the incorrect exception priotrity when accessing memory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/riscv-software-src/riscv-isa-sim/issues/971", + "refsource": "MISC", + "name": "https://github.com/riscv-software-src/riscv-isa-sim/issues/971" } ] }