From f5e8ede58450bced693000404cbb82e6838cd130 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 21 Oct 2022 15:00:28 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/3xxx/CVE-2022-3640.json | 14 +++++++++----- 2022/3xxx/CVE-2022-3642.json | 18 ++++++++++++++++++ 2022/3xxx/CVE-2022-3643.json | 18 ++++++++++++++++++ 3 files changed, 45 insertions(+), 5 deletions(-) create mode 100644 2022/3xxx/CVE-2022-3642.json create mode 100644 2022/3xxx/CVE-2022-3643.json diff --git a/2022/3xxx/CVE-2022-3640.json b/2022/3xxx/CVE-2022-3640.json index 14bd7c4aa87..b20c2631833 100644 --- a/2022/3xxx/CVE-2022-3640.json +++ b/2022/3xxx/CVE-2022-3640.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net\/bluetooth\/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944." + "value": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "5.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/bluetooth\/bluetooth-next.git\/commit\/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979" }, { - "url": "https:\/\/vuldb.com\/?id.211944" + "url": "https://vuldb.com/?id.211944", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211944" } ] } diff --git a/2022/3xxx/CVE-2022-3642.json b/2022/3xxx/CVE-2022-3642.json new file mode 100644 index 00000000000..39f0c4bc36d --- /dev/null +++ b/2022/3xxx/CVE-2022-3642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3643.json b/2022/3xxx/CVE-2022-3643.json new file mode 100644 index 00000000000..03f67c76aea --- /dev/null +++ b/2022/3xxx/CVE-2022-3643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file