cvelist/2019/2xxx/CVE-2019-2329.json

62 lines
2.1 KiB
JSON
Raw Normal View History

2018-12-10 11:03:16 -05:00
{
2019-11-06 09:23:43 -08:00
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2019-2329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
2019-03-17 22:58:19 +00:00
{
2019-11-06 09:23:43 -08:00
"product": {
"product_data": [
{
"product_name": "Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking",
"version": {
"version_data": [
{
"version_value": "MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
2019-03-17 22:58:19 +00:00
}
2019-11-06 09:23:43 -08:00
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free issue in cleanup routine due to missing pointer sanitization for a failed start of a trusted application. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free Issue in QTEE"
}
]
}
]
},
"references": {
"reference_data": [
{
2019-11-21 09:01:53 +05:30
"name": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin",
2019-11-06 09:23:43 -08:00
"refsource": "CONFIRM",
2019-11-21 09:01:53 +05:30
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin"
2019-11-06 09:23:43 -08:00
}
]
}
2019-03-17 22:58:19 +00:00
}