2018-02-05 15:02:15 -05:00
{
2019-03-18 05:51:59 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com" ,
"DATE_PUBLIC" : "2018-06-05T00:00:00" ,
"ID" : "CVE-2017-18159" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android" ,
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
} ,
"vendor_name" : "Qualcomm, Inc."
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2018-07-06 11:13:37 -04:00
{
2019-03-18 05:51:59 +00:00
"lang" : "eng" ,
"value" : "In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, while processing a StrHwPlatform with length smaller than EFICHIPINFO_MAX_ID_LENGTH, an array out of bounds access may occur."
2018-07-06 11:13:37 -04:00
}
2019-03-18 05:51:59 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Improper Restriction of Operations Within the Bounds of a memory Buffer in Boot"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=b6b318431983f35a7734cae227478df3dc93a818" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=b6b318431983f35a7734cae227478df3dc93a818"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=5471b0cdf4bace12d872d074b97eae29f1317e6a" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=5471b0cdf4bace12d872d074b97eae29f1317e6a"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=bcceb2ceeea07aedaa5f97207cc88f9d8b4416ea" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=bcceb2ceeea07aedaa5f97207cc88f9d8b4416ea"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=7dcbee530800b16534d0f3e8db375492c03b3e0a" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=7dcbee530800b16534d0f3e8db375492c03b3e0a"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=9057a8b3339abc4eb2c4e462279f34bbe6410e7c" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=9057a8b3339abc4eb2c4e462279f34bbe6410e7c"
} ,
{
"name" : "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.android.com/security/bulletin/2018-06-01#qualcomm-components"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=4a63a848c062851776123d4bc7ec10eb498a70dd" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=4a63a848c062851776123d4bc7ec10eb498a70dd"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=04f23441b8c0c897644f9bf391b691039fa0ab70" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=04f23441b8c0c897644f9bf391b691039fa0ab70"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=3129148e5a4cfe83003449a1048660823bfddc51" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=3129148e5a4cfe83003449a1048660823bfddc51"
} ,
{
"name" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=633fa4ffb38bbfb0fad79204e19b9f59d42d7680" ,
"refsource" : "CONFIRM" ,
"url" : "https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=633fa4ffb38bbfb0fad79204e19b9f59d42d7680"
}
]
}
}