From f7fe0ccdc1bcceb83f01d0288550d8a7dd02d9cf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 21 Oct 2022 21:00:29 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/3xxx/CVE-2022-3649.json | 14 +++++++++----- 2022/3xxx/CVE-2022-3650.json | 18 ++++++++++++++++++ 2 files changed, 27 insertions(+), 5 deletions(-) create mode 100644 2022/3xxx/CVE-2022-3650.json diff --git a/2022/3xxx/CVE-2022-3649.json b/2022/3xxx/CVE-2022-3649.json index d434b746e50..cd873782497 100644 --- a/2022/3xxx/CVE-2022-3649.json +++ b/2022/3xxx/CVE-2022-3649.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs\/nilfs2\/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992." + "value": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.1", - "vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/bpf\/bpf-next.git\/commit\/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09" }, { - "url": "https:\/\/vuldb.com\/?id.211992" + "url": "https://vuldb.com/?id.211992", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211992" } ] } diff --git a/2022/3xxx/CVE-2022-3650.json b/2022/3xxx/CVE-2022-3650.json new file mode 100644 index 00000000000..796851cbddc --- /dev/null +++ b/2022/3xxx/CVE-2022-3650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file