diff --git a/2023/53xxx/CVE-2023-53059.json b/2023/53xxx/CVE-2023-53059.json index 24bad97514a..04505d0b81f 100644 --- a/2023/53xxx/CVE-2023-53059.json +++ b/2023/53xxx/CVE-2023-53059.json @@ -1,18 +1,146 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53059", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/chrome: cros_ec_chardev: fix kernel data leak from ioctl\n\nIt is possible to peep kernel page's data by providing larger `insize`\nin struct cros_ec_command[1] when invoking EC host commands.\n\nFix it by using zeroed memory.\n\n[1]: https://elixir.bootlin.com/linux/v6.2/source/include/linux/platform_data/cros_ec_proto.h#L74" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "eda2e30c6684d67288edb841c6125d48c608a242", + "version_value": "13493ad6a220cb3f6f3552a16b4f2753a118b633" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.4", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.240", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.177", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/13493ad6a220cb3f6f3552a16b4f2753a118b633", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/13493ad6a220cb3f6f3552a16b4f2753a118b633" + }, + { + "url": "https://git.kernel.org/stable/c/f86ff88a1548ccf5a13960c0e7625ca787ea0993", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f86ff88a1548ccf5a13960c0e7625ca787ea0993" + }, + { + "url": "https://git.kernel.org/stable/c/ebea2e16504f40d2c2bac42ad5c5a3de5ce034b4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ebea2e16504f40d2c2bac42ad5c5a3de5ce034b4" + }, + { + "url": "https://git.kernel.org/stable/c/eab28bfafcd1245a3510df9aa9eb940589956ea6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/eab28bfafcd1245a3510df9aa9eb940589956ea6" + }, + { + "url": "https://git.kernel.org/stable/c/a0d8644784f73fa39f57f72f374eefaba2bf48a0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a0d8644784f73fa39f57f72f374eefaba2bf48a0" + }, + { + "url": "https://git.kernel.org/stable/c/b20cf3f89c56b5f6a38b7f76a8128bf9f291bbd3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b20cf3f89c56b5f6a38b7f76a8128bf9f291bbd3" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53060.json b/2023/53xxx/CVE-2023-53060.json index 2d846391c20..0b8e9297108 100644 --- a/2023/53xxx/CVE-2023-53060.json +++ b/2023/53xxx/CVE-2023-53060.json @@ -1,18 +1,193 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53060", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: revert rtnl_lock() that causes deadlock\n\nThe commit 6faee3d4ee8b (\"igb: Add lock to avoid data race\") adds\nrtnl_lock to eliminate a false data race shown below\n\n (FREE from device detaching) | (USE from netdev core)\nigb_remove | igb_ndo_get_vf_config\n igb_disable_sriov | vf >= adapter->vfs_allocated_count?\n kfree(adapter->vf_data) |\n adapter->vfs_allocated_count = 0 |\n | memcpy(... adapter->vf_data[vf]\n\nThe above race will never happen and the extra rtnl_lock causes deadlock\nbelow\n\n[ 141.420169] \n[ 141.420672] __schedule+0x2dd/0x840\n[ 141.421427] schedule+0x50/0xc0\n[ 141.422041] schedule_preempt_disabled+0x11/0x20\n[ 141.422678] __mutex_lock.isra.13+0x431/0x6b0\n[ 141.423324] unregister_netdev+0xe/0x20\n[ 141.423578] igbvf_remove+0x45/0xe0 [igbvf]\n[ 141.423791] pci_device_remove+0x36/0xb0\n[ 141.423990] device_release_driver_internal+0xc1/0x160\n[ 141.424270] pci_stop_bus_device+0x6d/0x90\n[ 141.424507] pci_stop_and_remove_bus_device+0xe/0x20\n[ 141.424789] pci_iov_remove_virtfn+0xba/0x120\n[ 141.425452] sriov_disable+0x2f/0xf0\n[ 141.425679] igb_disable_sriov+0x4e/0x100 [igb]\n[ 141.426353] igb_remove+0xa0/0x130 [igb]\n[ 141.426599] pci_device_remove+0x36/0xb0\n[ 141.426796] device_release_driver_internal+0xc1/0x160\n[ 141.427060] driver_detach+0x44/0x90\n[ 141.427253] bus_remove_driver+0x55/0xe0\n[ 141.427477] pci_unregister_driver+0x2a/0xa0\n[ 141.428296] __x64_sys_delete_module+0x141/0x2b0\n[ 141.429126] ? mntput_no_expire+0x4a/0x240\n[ 141.429363] ? syscall_trace_enter.isra.19+0x126/0x1a0\n[ 141.429653] do_syscall_64+0x5b/0x80\n[ 141.429847] ? exit_to_user_mode_prepare+0x14d/0x1c0\n[ 141.430109] ? syscall_exit_to_user_mode+0x12/0x30\n[ 141.430849] ? do_syscall_64+0x67/0x80\n[ 141.431083] ? syscall_exit_to_user_mode_prepare+0x183/0x1b0\n[ 141.431770] ? syscall_exit_to_user_mode+0x12/0x30\n[ 141.432482] ? do_syscall_64+0x67/0x80\n[ 141.432714] ? exc_page_fault+0x64/0x140\n[ 141.432911] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nSince the igb_disable_sriov() will call pci_disable_sriov() before\nreleasing any resources, the netdev core will synchronize the cleanup to\navoid any races. This patch removes the useless rtnl_(un)lock to guarantee\ncorrectness." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5773a1e6e5ba9f62c4573c57878d154fda269bc2", + "version_value": "0dabb72b923e17cb3b4ac99ea1adc9ef35116930" + }, + { + "version_affected": "<", + "version_name": "2e8a30c1d994d91099fa8762f504b2ac9dce2cf7", + "version_value": "7d845e9a485f287181ff81567c3900a8e7ad1e28" + }, + { + "version_affected": "<", + "version_name": "55197ba6d64d48f1948e6e1f52482e0e3e38e1bf", + "version_value": "cd1e320ac0958298c2774605ad050483f33a21f2" + }, + { + "version_affected": "<", + "version_name": "0f516dcd1456b18b56a7de0c1f67b8a4aa54c2ef", + "version_value": "4d2626e10709ff8474ffd1a9db3cf4647569e89c" + }, + { + "version_affected": "<", + "version_name": "8ee44abe4cae06713db33e0a3b1e87bfb95b13ef", + "version_value": "66e5577cabc3d463eea540332727929d0ace41c6" + }, + { + "version_affected": "<", + "version_name": "6faee3d4ee8be0f0367d0c3d826afb3571b7a5e0", + "version_value": "62a64645749926f9d75af82a96440941f22b046f" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.0", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.14.312", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.280", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.240", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.177", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/0dabb72b923e17cb3b4ac99ea1adc9ef35116930", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/0dabb72b923e17cb3b4ac99ea1adc9ef35116930" + }, + { + "url": "https://git.kernel.org/stable/c/7d845e9a485f287181ff81567c3900a8e7ad1e28", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7d845e9a485f287181ff81567c3900a8e7ad1e28" + }, + { + "url": "https://git.kernel.org/stable/c/cd1e320ac0958298c2774605ad050483f33a21f2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cd1e320ac0958298c2774605ad050483f33a21f2" + }, + { + "url": "https://git.kernel.org/stable/c/4d2626e10709ff8474ffd1a9db3cf4647569e89c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4d2626e10709ff8474ffd1a9db3cf4647569e89c" + }, + { + "url": "https://git.kernel.org/stable/c/66e5577cabc3d463eea540332727929d0ace41c6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/66e5577cabc3d463eea540332727929d0ace41c6" + }, + { + "url": "https://git.kernel.org/stable/c/62a64645749926f9d75af82a96440941f22b046f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/62a64645749926f9d75af82a96440941f22b046f" + }, + { + "url": "https://git.kernel.org/stable/c/de91528d8ba274c614a2265077d695c61e31fd43", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/de91528d8ba274c614a2265077d695c61e31fd43" + }, + { + "url": "https://git.kernel.org/stable/c/65f69851e44d71248b952a687e44759a7abb5016", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/65f69851e44d71248b952a687e44759a7abb5016" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53061.json b/2023/53xxx/CVE-2023-53061.json index 6e3fd6dee9f..1f0f21d9947 100644 --- a/2023/53xxx/CVE-2023-53061.json +++ b/2023/53xxx/CVE-2023-53061.json @@ -1,18 +1,124 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53061", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix possible refcount leak in smb2_open()\n\nReference count of acls will leak when memory allocation fails. Fix this\nby adding the missing posix_acl_release()." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "version_value": "c33344b7972225b232966f95d31f6312dcc6273d" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.15", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.15", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/c33344b7972225b232966f95d31f6312dcc6273d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c33344b7972225b232966f95d31f6312dcc6273d" + }, + { + "url": "https://git.kernel.org/stable/c/303f8e58cc3ace744801dcdcabfc06ffc72ed62d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/303f8e58cc3ace744801dcdcabfc06ffc72ed62d" + }, + { + "url": "https://git.kernel.org/stable/c/a22c49a05e5e7aa2c414fbc42c49c4c01a5c9a78", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a22c49a05e5e7aa2c414fbc42c49c4c01a5c9a78" + }, + { + "url": "https://git.kernel.org/stable/c/2624b445544ffc1472ccabfb6ec867c199d4c95c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2624b445544ffc1472ccabfb6ec867c199d4c95c" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53062.json b/2023/53xxx/CVE-2023-53062.json index c49198ddad1..77a8dcc8ae6 100644 --- a/2023/53xxx/CVE-2023-53062.json +++ b/2023/53xxx/CVE-2023-53062.json @@ -1,18 +1,168 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53062", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc95xx: Limit packet length to skb->len\n\nPacket length retrieved from descriptor may be larger than\nthe actual socket buffer length. In such case the cloned\nskb passed up the network stack will leak kernel memory contents." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2f7ca802bdae2ca41022618391c70c2876d92190", + "version_value": "733580e268a53db1cd01f2251419da91866378f6" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.6.28", + "status": "affected" + }, + { + "version": "0", + "lessThan": "2.6.28", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.14.312", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.280", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.240", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.177", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6" + }, + { + "url": "https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418" + }, + { + "url": "https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0" + }, + { + "url": "https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b" + }, + { + "url": "https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65" + }, + { + "url": "https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe" + }, + { + "url": "https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0" + }, + { + "url": "https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53063.json b/2023/53xxx/CVE-2023-53063.json index f178a95d1a2..5e628c37332 100644 --- a/2023/53xxx/CVE-2023-53063.json +++ b/2023/53xxx/CVE-2023-53063.json @@ -1,18 +1,168 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53063", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work\n\nIn btsdio_probe, &data->work was bound with btsdio_work.In\nbtsdio_send_frame, it was started by schedule_work.\n\nIf we call btsdio_remove with an unfinished job, there may\nbe a race condition and cause UAF bug on hdev." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "ddbaf13e3609442b64abb931ac21527772d87980", + "version_value": "95eacef5692545f199fae4e52abfbfa273acb351" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "2.6.24", + "status": "affected" + }, + { + "version": "0", + "lessThan": "2.6.24", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.14.312", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.280", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.240", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.177", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/95eacef5692545f199fae4e52abfbfa273acb351", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/95eacef5692545f199fae4e52abfbfa273acb351" + }, + { + "url": "https://git.kernel.org/stable/c/af4d48754d5517d33bac5e504ff1f1de0808e29e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/af4d48754d5517d33bac5e504ff1f1de0808e29e" + }, + { + "url": "https://git.kernel.org/stable/c/a18fb433ceb56e0787546a9d77056dd0f215e762", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a18fb433ceb56e0787546a9d77056dd0f215e762" + }, + { + "url": "https://git.kernel.org/stable/c/da3d3fdfb4d523c5da30e35a8dd90e04f0fd8962", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/da3d3fdfb4d523c5da30e35a8dd90e04f0fd8962" + }, + { + "url": "https://git.kernel.org/stable/c/8efae2112d910d8e5166dd0a836791b08721eef1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8efae2112d910d8e5166dd0a836791b08721eef1" + }, + { + "url": "https://git.kernel.org/stable/c/cbf8deacb7053ce3e3fed64b277c6c6989e65bba", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cbf8deacb7053ce3e3fed64b277c6c6989e65bba" + }, + { + "url": "https://git.kernel.org/stable/c/c59c65a14e8f7d738429648833f3bb3f9df0513f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c59c65a14e8f7d738429648833f3bb3f9df0513f" + }, + { + "url": "https://git.kernel.org/stable/c/1e9ac114c4428fdb7ff4635b45d4f46017e8916f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1e9ac114c4428fdb7ff4635b45d4f46017e8916f" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53064.json b/2023/53xxx/CVE-2023-53064.json index f236cfbb0e8..0e16036082f 100644 --- a/2023/53xxx/CVE-2023-53064.json +++ b/2023/53xxx/CVE-2023-53064.json @@ -1,18 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53064", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: fix hang on reboot with ice\n\nWhen a system with E810 with existing VFs gets rebooted the following\nhang may be observed.\n\n Pid 1 is hung in iavf_remove(), part of a network driver:\n PID: 1 TASK: ffff965400e5a340 CPU: 24 COMMAND: \"systemd-shutdow\"\n #0 [ffffaad04005fa50] __schedule at ffffffff8b3239cb\n #1 [ffffaad04005fae8] schedule at ffffffff8b323e2d\n #2 [ffffaad04005fb00] schedule_hrtimeout_range_clock at ffffffff8b32cebc\n #3 [ffffaad04005fb80] usleep_range_state at ffffffff8b32c930\n #4 [ffffaad04005fbb0] iavf_remove at ffffffffc12b9b4c [iavf]\n #5 [ffffaad04005fbf0] pci_device_remove at ffffffff8add7513\n #6 [ffffaad04005fc10] device_release_driver_internal at ffffffff8af08baa\n #7 [ffffaad04005fc40] pci_stop_bus_device at ffffffff8adcc5fc\n #8 [ffffaad04005fc60] pci_stop_and_remove_bus_device at ffffffff8adcc81e\n #9 [ffffaad04005fc70] pci_iov_remove_virtfn at ffffffff8adf9429\n #10 [ffffaad04005fca8] sriov_disable at ffffffff8adf98e4\n #11 [ffffaad04005fcc8] ice_free_vfs at ffffffffc04bb2c8 [ice]\n #12 [ffffaad04005fd10] ice_remove at ffffffffc04778fe [ice]\n #13 [ffffaad04005fd38] ice_shutdown at ffffffffc0477946 [ice]\n #14 [ffffaad04005fd50] pci_device_shutdown at ffffffff8add58f1\n #15 [ffffaad04005fd70] device_shutdown at ffffffff8af05386\n #16 [ffffaad04005fd98] kernel_restart at ffffffff8a92a870\n #17 [ffffaad04005fda8] __do_sys_reboot at ffffffff8a92abd6\n #18 [ffffaad04005fee0] do_syscall_64 at ffffffff8b317159\n #19 [ffffaad04005ff08] __context_tracking_enter at ffffffff8b31b6fc\n #20 [ffffaad04005ff18] syscall_exit_to_user_mode at ffffffff8b31b50d\n #21 [ffffaad04005ff28] do_syscall_64 at ffffffff8b317169\n #22 [ffffaad04005ff50] entry_SYSCALL_64_after_hwframe at ffffffff8b40009b\n RIP: 00007f1baa5c13d7 RSP: 00007fffbcc55a98 RFLAGS: 00000202\n RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1baa5c13d7\n RDX: 0000000001234567 RSI: 0000000028121969 RDI: 00000000fee1dead\n RBP: 00007fffbcc55ca0 R8: 0000000000000000 R9: 00007fffbcc54e90\n R10: 00007fffbcc55050 R11: 0000000000000202 R12: 0000000000000005\n R13: 0000000000000000 R14: 00007fffbcc55af0 R15: 0000000000000000\n ORIG_RAX: 00000000000000a9 CS: 0033 SS: 002b\n\nDuring reboot all drivers PM shutdown callbacks are invoked.\nIn iavf_shutdown() the adapter state is changed to __IAVF_REMOVE.\nIn ice_shutdown() the call chain above is executed, which at some point\ncalls iavf_remove(). However iavf_remove() expects the VF to be in one\nof the states __IAVF_RUNNING, __IAVF_DOWN or __IAVF_INIT_FAILED. If\nthat's not the case it sleeps forever.\nSo if iavf_shutdown() gets invoked before iavf_remove() the system will\nhang indefinitely because the adapter is already in state __IAVF_REMOVE.\n\nFix this by returning from iavf_remove() if the state is __IAVF_REMOVE,\nas we already went through iavf_shutdown()." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "85aa76066fef64de8a48d0da6b4071ceac455a94", + "version_value": "7a29799fc141ba9e6cf921fc8e958e3398ad1a4f" + }, + { + "version_affected": "<", + "version_name": "974578017fc1fdd06cea8afb9dfa32602e8529ed", + "version_value": "502b898235f06130750c91512c86dd0e9efe28e6" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.17", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.17", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/7a29799fc141ba9e6cf921fc8e958e3398ad1a4f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7a29799fc141ba9e6cf921fc8e958e3398ad1a4f" + }, + { + "url": "https://git.kernel.org/stable/c/502b898235f06130750c91512c86dd0e9efe28e6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/502b898235f06130750c91512c86dd0e9efe28e6" + }, + { + "url": "https://git.kernel.org/stable/c/f752ace58867de3c063512b21e0f1694fc27f043", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f752ace58867de3c063512b21e0f1694fc27f043" + }, + { + "url": "https://git.kernel.org/stable/c/4e264be98b88a6d6f476c11087fe865696e8bef5", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4e264be98b88a6d6f476c11087fe865696e8bef5" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53065.json b/2023/53xxx/CVE-2023-53065.json index 3fe98a6f5f0..4167d5a0acf 100644 --- a/2023/53xxx/CVE-2023-53065.json +++ b/2023/53xxx/CVE-2023-53065.json @@ -1,18 +1,135 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53065", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output\n\nsyzkaller reportes a KASAN issue with stack-out-of-bounds.\nThe call trace is as follows:\n dump_stack+0x9c/0xd3\n print_address_description.constprop.0+0x19/0x170\n __kasan_report.cold+0x6c/0x84\n kasan_report+0x3a/0x50\n __perf_event_header__init_id+0x34/0x290\n perf_event_header__init_id+0x48/0x60\n perf_output_begin+0x4a4/0x560\n perf_event_bpf_output+0x161/0x1e0\n perf_iterate_sb_cpu+0x29e/0x340\n perf_iterate_sb+0x4c/0xc0\n perf_event_bpf_event+0x194/0x2c0\n __bpf_prog_put.constprop.0+0x55/0xf0\n __cls_bpf_delete_prog+0xea/0x120 [cls_bpf]\n cls_bpf_delete_prog_work+0x1c/0x30 [cls_bpf]\n process_one_work+0x3c2/0x730\n worker_thread+0x93/0x650\n kthread+0x1b8/0x210\n ret_from_fork+0x1f/0x30\n\ncommit 267fb27352b6 (\"perf: Reduce stack usage of perf_output_begin()\")\nuse on-stack struct perf_sample_data of the caller function.\n\nHowever, perf_event_bpf_output uses incorrect parameter to convert\nsmall-sized data (struct perf_bpf_event) into large-sized data\n(struct perf_sample_data), which causes memory overwriting occurs in\n__perf_event_header__init_id." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "267fb27352b6fc9fdbad753127a239f75618ecbc", + "version_value": "ddcf8320003638a06eb1e46412e045d0c5701575" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.10", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.177", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.105", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.22", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.9", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/ddcf8320003638a06eb1e46412e045d0c5701575", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ddcf8320003638a06eb1e46412e045d0c5701575" + }, + { + "url": "https://git.kernel.org/stable/c/ac5f88642cb211152041f84a985309e9af4baf59", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ac5f88642cb211152041f84a985309e9af4baf59" + }, + { + "url": "https://git.kernel.org/stable/c/ff8137727a2af4ad5f6e6c8b9f7ec5e8db9da86c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ff8137727a2af4ad5f6e6c8b9f7ec5e8db9da86c" + }, + { + "url": "https://git.kernel.org/stable/c/3a776fddb4e5598c8bfcd4ad094fba34f9856fc9", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3a776fddb4e5598c8bfcd4ad094fba34f9856fc9" + }, + { + "url": "https://git.kernel.org/stable/c/eb81a2ed4f52be831c9fb879752d89645a312c13", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/eb81a2ed4f52be831c9fb879752d89645a312c13" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53090.json b/2023/53xxx/CVE-2023-53090.json new file mode 100644 index 00000000000..404b0deb1da --- /dev/null +++ b/2023/53xxx/CVE-2023-53090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53091.json b/2023/53xxx/CVE-2023-53091.json new file mode 100644 index 00000000000..05307e05df7 --- /dev/null +++ b/2023/53xxx/CVE-2023-53091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53092.json b/2023/53xxx/CVE-2023-53092.json new file mode 100644 index 00000000000..db35ef6b9f1 --- /dev/null +++ b/2023/53xxx/CVE-2023-53092.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53092", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53093.json b/2023/53xxx/CVE-2023-53093.json new file mode 100644 index 00000000000..3698eb74de8 --- /dev/null +++ b/2023/53xxx/CVE-2023-53093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53094.json b/2023/53xxx/CVE-2023-53094.json new file mode 100644 index 00000000000..fa2984d48b5 --- /dev/null +++ b/2023/53xxx/CVE-2023-53094.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53094", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53095.json b/2023/53xxx/CVE-2023-53095.json new file mode 100644 index 00000000000..a9e32d50f71 --- /dev/null +++ b/2023/53xxx/CVE-2023-53095.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53095", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53096.json b/2023/53xxx/CVE-2023-53096.json new file mode 100644 index 00000000000..8ccdd6e8812 --- /dev/null +++ b/2023/53xxx/CVE-2023-53096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53097.json b/2023/53xxx/CVE-2023-53097.json new file mode 100644 index 00000000000..0c496020e67 --- /dev/null +++ b/2023/53xxx/CVE-2023-53097.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53097", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53098.json b/2023/53xxx/CVE-2023-53098.json new file mode 100644 index 00000000000..d079c2f2bc6 --- /dev/null +++ b/2023/53xxx/CVE-2023-53098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53099.json b/2023/53xxx/CVE-2023-53099.json new file mode 100644 index 00000000000..65641cc7ae6 --- /dev/null +++ b/2023/53xxx/CVE-2023-53099.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53099", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53100.json b/2023/53xxx/CVE-2023-53100.json new file mode 100644 index 00000000000..76a2f6de793 --- /dev/null +++ b/2023/53xxx/CVE-2023-53100.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53100", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53101.json b/2023/53xxx/CVE-2023-53101.json new file mode 100644 index 00000000000..ce66989d546 --- /dev/null +++ b/2023/53xxx/CVE-2023-53101.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53101", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53102.json b/2023/53xxx/CVE-2023-53102.json new file mode 100644 index 00000000000..2aa2d87cdcc --- /dev/null +++ b/2023/53xxx/CVE-2023-53102.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53102", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53103.json b/2023/53xxx/CVE-2023-53103.json new file mode 100644 index 00000000000..a63ed325040 --- /dev/null +++ b/2023/53xxx/CVE-2023-53103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53104.json b/2023/53xxx/CVE-2023-53104.json new file mode 100644 index 00000000000..c3e7c743b79 --- /dev/null +++ b/2023/53xxx/CVE-2023-53104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53105.json b/2023/53xxx/CVE-2023-53105.json new file mode 100644 index 00000000000..146cc1ac4da --- /dev/null +++ b/2023/53xxx/CVE-2023-53105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53106.json b/2023/53xxx/CVE-2023-53106.json new file mode 100644 index 00000000000..0bfe0e7973b --- /dev/null +++ b/2023/53xxx/CVE-2023-53106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53107.json b/2023/53xxx/CVE-2023-53107.json new file mode 100644 index 00000000000..efce81b9f28 --- /dev/null +++ b/2023/53xxx/CVE-2023-53107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53108.json b/2023/53xxx/CVE-2023-53108.json new file mode 100644 index 00000000000..79fff516d2f --- /dev/null +++ b/2023/53xxx/CVE-2023-53108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53109.json b/2023/53xxx/CVE-2023-53109.json new file mode 100644 index 00000000000..14d4a9dd066 --- /dev/null +++ b/2023/53xxx/CVE-2023-53109.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53109", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53110.json b/2023/53xxx/CVE-2023-53110.json new file mode 100644 index 00000000000..71cdc6f42e5 --- /dev/null +++ b/2023/53xxx/CVE-2023-53110.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53110", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53111.json b/2023/53xxx/CVE-2023-53111.json new file mode 100644 index 00000000000..b5368401635 --- /dev/null +++ b/2023/53xxx/CVE-2023-53111.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53111", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53112.json b/2023/53xxx/CVE-2023-53112.json new file mode 100644 index 00000000000..83d5f706d34 --- /dev/null +++ b/2023/53xxx/CVE-2023-53112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53113.json b/2023/53xxx/CVE-2023-53113.json new file mode 100644 index 00000000000..e5dca4bfabc --- /dev/null +++ b/2023/53xxx/CVE-2023-53113.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53113", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53114.json b/2023/53xxx/CVE-2023-53114.json new file mode 100644 index 00000000000..a9f11cd97b5 --- /dev/null +++ b/2023/53xxx/CVE-2023-53114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53115.json b/2023/53xxx/CVE-2023-53115.json new file mode 100644 index 00000000000..a9e53c99212 --- /dev/null +++ b/2023/53xxx/CVE-2023-53115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53116.json b/2023/53xxx/CVE-2023-53116.json new file mode 100644 index 00000000000..cdca99e4cfe --- /dev/null +++ b/2023/53xxx/CVE-2023-53116.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53116", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53117.json b/2023/53xxx/CVE-2023-53117.json new file mode 100644 index 00000000000..4f26344b01a --- /dev/null +++ b/2023/53xxx/CVE-2023-53117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53118.json b/2023/53xxx/CVE-2023-53118.json new file mode 100644 index 00000000000..0b935e6627f --- /dev/null +++ b/2023/53xxx/CVE-2023-53118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53119.json b/2023/53xxx/CVE-2023-53119.json new file mode 100644 index 00000000000..1670b2901ca --- /dev/null +++ b/2023/53xxx/CVE-2023-53119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53120.json b/2023/53xxx/CVE-2023-53120.json new file mode 100644 index 00000000000..b851bd1ea9f --- /dev/null +++ b/2023/53xxx/CVE-2023-53120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53121.json b/2023/53xxx/CVE-2023-53121.json new file mode 100644 index 00000000000..965eb349d3e --- /dev/null +++ b/2023/53xxx/CVE-2023-53121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53122.json b/2023/53xxx/CVE-2023-53122.json new file mode 100644 index 00000000000..e1358cf2196 --- /dev/null +++ b/2023/53xxx/CVE-2023-53122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-53122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file