mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1e78caaa34
commit
b9d2c4f25c
@ -91,6 +91,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20200126 [GitHub] [druid] clintropolis opened a new pull request #9259: fix build by updating kafka client to 2.2.2 for CVE-2019-12399",
|
||||
"url": "https://lists.apache.org/thread.html/rde947ee866de6687bc51cdc8dfa6d7e6b3ad4ce8c708c344f773e6dc@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20200126 [GitHub] [druid] suneet-s commented on a change in pull request #9259: fix build by updating kafka client to 2.2.2 for CVE-2019-12399",
|
||||
"url": "https://lists.apache.org/thread.html/r4b20b40c40d4a4c641e2ef4228098a57935e5782bfdfdf3650e48265@%3Ccommits.druid.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
67
2019/20xxx/CVE-2019-20421.json
Normal file
67
2019/20xxx/CVE-2019-20421.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20421",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/Exiv2/exiv2/issues/1011",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Exiv2/exiv2/issues/1011"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
67
2019/20xxx/CVE-2019-20422.json
Normal file
67
2019/20xxx/CVE-2019-20422.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20422",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/torvalds/linux/commit/7b09c2d052db4b4ad0b27b97918b46a7746966fa",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/torvalds/linux/commit/7b09c2d052db4b4ad0b27b97918b46a7746966fa"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20423.json
Normal file
77
2019/20xxx/CVE-2019-20423.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20423",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic due to the lack of validation for specific fields of packets sent by a client. The function target_handle_connect() mishandles a certain size value when a client connects to a server, because of an integer signedness error."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12605",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12605"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/35935/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/35935/"
|
||||
},
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20424.json
Normal file
77
2019/20xxx/CVE-2019-20424.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20424",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, mdt_object_remote in the mdt module has a NULL pointer dereference and panic due to the lack of validation for specific fields of packets sent by a client."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12615",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12615"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/35869/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/35869/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20425.json
Normal file
77
2019/20xxx/CVE-2019-20425.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20425",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function lustre_msg_string, there is no validation of a certain length value derived from lustre_msg_buflen_v2."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12613",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12613"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36209/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36209/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20426.json
Normal file
77
2019/20xxx/CVE-2019-20426.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20426",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function ldlm_cancel_hpreq_check, there is no lock_count bounds check."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12614",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12614"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36107/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36107/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20427.json
Normal file
77
2019/20xxx/CVE-2019-20427.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20427",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12600",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12600"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/35867/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/35867/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20428.json
Normal file
77
2019/20xxx/CVE-2019-20428.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20428",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic due to the lack of validation for specific fields of packets sent by a client. The ldl_request_cancel function mishandles a large lock_count parameter."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12603",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12603"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36108/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36108/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20429.json
Normal file
77
2019/20xxx/CVE-2019-20429.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20429",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic (via a modified lm_bufcount field) due to the lack of validation for specific fields of packets sent by a client. This is caused by interaction between sptlrpc_svc_unwrap_request and lustre_msg_hdr_size_v2."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12590",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12590"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36119/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36119/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20430.json
Normal file
77
2019/20xxx/CVE-2019-20430.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20430",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the mdt module has an LBUG panic (via a large MDT Body eadatasize field) due to the lack of validation for specific fields of packets sent by a client."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12602",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12602"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36208/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36208/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20431.json
Normal file
77
2019/20xxx/CVE-2019-20431.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20431",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the ptlrpc module has an osd_map_remote_to_local out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. osd_bufs_get in the osd_ldiskfs module does not validate a certain length value."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12612",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12612"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/36273/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/36273/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2019/20xxx/CVE-2019-20432.json
Normal file
77
2019/20xxx/CVE-2019-20432.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20432",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In the Lustre file system before 2.12.3, the mdt module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. mdt_file_secctx_unpack does not validate the value of name_size derived from req_capsule_get_size."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://wiki.lustre.org/Lustre_2.12.3_Changelog",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.lustre.org/Lustre_2.12.3_Changelog"
|
||||
},
|
||||
{
|
||||
"url": "http://lustre.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lustre.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.whamcloud.com/browse/LU-12604",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.whamcloud.com/browse/LU-12604"
|
||||
},
|
||||
{
|
||||
"url": "https://review.whamcloud.com/#/c/35868/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://review.whamcloud.com/#/c/35868/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
72
2020/8xxx/CVE-2020-8002.json
Normal file
72
2020/8xxx/CVE-2020-8002.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-8002",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service via commands that attempt to launch a grid without previously providing a Compute Shader (CS)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=572a36879701598fa727f50313508be99865b58f",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=572a36879701598fa727f50313508be99865b58f"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=725e12beba4a41934f0ab62d399b5d4de2d13190",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=725e12beba4a41934f0ab62d399b5d4de2d13190"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
77
2020/8xxx/CVE-2020-8003.json
Normal file
77
2020/8xxx/CVE-2020-8003.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2020-8003",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A double-free vulnerability in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service by triggering texture allocation failure, because vrend_renderer_resource_allocated_texture is not an appropriate place for a free."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/f9b079ccc319c98499111f66bd654fc9b56cf15f?merge_request_iid=340",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/f9b079ccc319c98499111f66bd654fc9b56cf15f?merge_request_iid=340"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=f9b079ccc319c98499111f66bd654fc9b56cf15f",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=f9b079ccc319c98499111f66bd654fc9b56cf15f"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=3320973c9f2068f60cf6613c2811a8824781878a",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=3320973c9f2068f60cf6613c2811a8824781878a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user