From f09273b2513019f8e0920724c75ff8b0e4403ef5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 3 Jun 2019 22:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/12xxx/CVE-2019-12602.json | 18 +++++++++ 2019/12xxx/CVE-2019-12603.json | 18 +++++++++ 2019/12xxx/CVE-2019-12604.json | 18 +++++++++ 2019/12xxx/CVE-2019-12605.json | 18 +++++++++ 2019/12xxx/CVE-2019-12606.json | 18 +++++++++ 2019/12xxx/CVE-2019-12607.json | 18 +++++++++ 2019/12xxx/CVE-2019-12608.json | 18 +++++++++ 2019/12xxx/CVE-2019-12609.json | 18 +++++++++ 2019/12xxx/CVE-2019-12610.json | 18 +++++++++ 2019/12xxx/CVE-2019-12611.json | 18 +++++++++ 2019/12xxx/CVE-2019-12612.json | 18 +++++++++ 2019/12xxx/CVE-2019-12613.json | 18 +++++++++ 2019/12xxx/CVE-2019-12614.json | 67 ++++++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12615.json | 67 ++++++++++++++++++++++++++++++++++ 14 files changed, 350 insertions(+) create mode 100644 2019/12xxx/CVE-2019-12602.json create mode 100644 2019/12xxx/CVE-2019-12603.json create mode 100644 2019/12xxx/CVE-2019-12604.json create mode 100644 2019/12xxx/CVE-2019-12605.json create mode 100644 2019/12xxx/CVE-2019-12606.json create mode 100644 2019/12xxx/CVE-2019-12607.json create mode 100644 2019/12xxx/CVE-2019-12608.json create mode 100644 2019/12xxx/CVE-2019-12609.json create mode 100644 2019/12xxx/CVE-2019-12610.json create mode 100644 2019/12xxx/CVE-2019-12611.json create mode 100644 2019/12xxx/CVE-2019-12612.json create mode 100644 2019/12xxx/CVE-2019-12613.json create mode 100644 2019/12xxx/CVE-2019-12614.json create mode 100644 2019/12xxx/CVE-2019-12615.json diff --git a/2019/12xxx/CVE-2019-12602.json b/2019/12xxx/CVE-2019-12602.json new file mode 100644 index 00000000000..b4bcea3a578 --- /dev/null +++ b/2019/12xxx/CVE-2019-12602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12603.json b/2019/12xxx/CVE-2019-12603.json new file mode 100644 index 00000000000..05eaf9fa434 --- /dev/null +++ b/2019/12xxx/CVE-2019-12603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12604.json b/2019/12xxx/CVE-2019-12604.json new file mode 100644 index 00000000000..715b65c247e --- /dev/null +++ b/2019/12xxx/CVE-2019-12604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12605.json b/2019/12xxx/CVE-2019-12605.json new file mode 100644 index 00000000000..02340002863 --- /dev/null +++ b/2019/12xxx/CVE-2019-12605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12606.json b/2019/12xxx/CVE-2019-12606.json new file mode 100644 index 00000000000..5a3cd70562b --- /dev/null +++ b/2019/12xxx/CVE-2019-12606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12607.json b/2019/12xxx/CVE-2019-12607.json new file mode 100644 index 00000000000..f864c84e42c --- /dev/null +++ b/2019/12xxx/CVE-2019-12607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12608.json b/2019/12xxx/CVE-2019-12608.json new file mode 100644 index 00000000000..872f3b4a146 --- /dev/null +++ b/2019/12xxx/CVE-2019-12608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12609.json b/2019/12xxx/CVE-2019-12609.json new file mode 100644 index 00000000000..274965a6da1 --- /dev/null +++ b/2019/12xxx/CVE-2019-12609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12610.json b/2019/12xxx/CVE-2019-12610.json new file mode 100644 index 00000000000..6fe11787f11 --- /dev/null +++ b/2019/12xxx/CVE-2019-12610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12611.json b/2019/12xxx/CVE-2019-12611.json new file mode 100644 index 00000000000..bd76326f534 --- /dev/null +++ b/2019/12xxx/CVE-2019-12611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12612.json b/2019/12xxx/CVE-2019-12612.json new file mode 100644 index 00000000000..352f3feae40 --- /dev/null +++ b/2019/12xxx/CVE-2019-12612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12613.json b/2019/12xxx/CVE-2019-12613.json new file mode 100644 index 00000000000..eda23338e6b --- /dev/null +++ b/2019/12xxx/CVE-2019-12613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12614.json b/2019/12xxx/CVE-2019-12614.json new file mode 100644 index 00000000000..a44a3f72f09 --- /dev/null +++ b/2019/12xxx/CVE-2019-12614.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12614", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lkml.org/lkml/2019/6/3/526", + "refsource": "MISC", + "name": "https://lkml.org/lkml/2019/6/3/526" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12615.json b/2019/12xxx/CVE-2019-12615.json new file mode 100644 index 00000000000..ec72b0c184d --- /dev/null +++ b/2019/12xxx/CVE-2019-12615.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12615", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html", + "refsource": "MISC", + "name": "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f" + } + ] + } +} \ No newline at end of file