"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-04-01 20:42:13 +00:00
parent 628c7ed048
commit 436f61e230
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
100 changed files with 1187 additions and 341 deletions

View File

@ -53,10 +53,6 @@
{
"version_affected": "=",
"version_value": "12"
},
{
"version_affected": "=",
"version_value": "11"
}
]
}
@ -70,14 +66,14 @@
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/1a42ae5379269b9e4dac9f5fbf803c6c731c655d",
"url": "https://android.googlesource.com/platform/frameworks/base/+/6fab80f141163de4d0008f7cd081cfc4917c3c68",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/1a42ae5379269b9e4dac9f5fbf803c6c731c655d"
"name": "https://android.googlesource.com/platform/frameworks/base/+/6fab80f141163de4d0008f7cd081cfc4917c3c68"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2023-12-01"
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-03f60121d1f8"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -94,7 +94,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-03f60121d1f8"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-03f60121d1f8"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -76,7 +76,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -94,7 +94,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -94,7 +94,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -99,7 +99,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -157,6 +157,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -72,7 +72,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -64,7 +64,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -64,7 +64,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -100,7 +100,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -64,7 +64,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -54,7 +54,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-a950984f39ee"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc2",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -76,7 +76,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -82,7 +82,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -78,7 +78,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -131,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -5,99 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2023-52514",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/reboot: VMCLEAR active VMCSes before emergency reboot\n\nVMCLEAR active VMCSes before any emergency reboot, not just if the kernel\nmay kexec into a new kernel after a crash. Per Intel's SDM, the VMX\narchitecture doesn't require the CPU to flush the VMCS cache on INIT. If\nan emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically\nbe kept and only be written back to memory after the new kernel is booted,\ni.e. could effectively corrupt memory after reboot.\n\nOpportunistically remove the setting of the global pointer to NULL to make\ncheckpatch happy."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "1375d9600c38"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "6.1.56",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.5.6",
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d"
},
{
"url": "https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273"
},
{
"url": "https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29"
}
]
},
"generator": {
"engine": "bippy-4986f5686161"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -66,7 +66,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -54,7 +54,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -54,7 +54,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -72,7 +72,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -66,7 +66,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -54,7 +54,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -60,7 +60,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -66,7 +66,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -84,7 +84,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -142,6 +142,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -60,7 +60,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -90,7 +90,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -1,17 +1,89 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0039",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In attp_build_value_cmd of att_protocol.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/17044ccf3a2858633cad8f87926e752edfe0d8d8",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/17044ccf3a2858633cad8f87926e752edfe0d8d8"
},
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/f0f35273101518d1f3a660b151804e90d0249af3",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/f0f35273101518d1f3a660b151804e90d0249af3"
},
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/015c618a0461def93138173a53daaf27ca0630c9",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/015c618a0461def93138173a53daaf27ca0630c9"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0044",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0045",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In smp_proc_sec_req of smp_act.cc, there is a possible out of bounds read due to improper input validation. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7d0f696f450241d8ba7a168ba14fa7b75032f0c9",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7d0f696f450241d8ba7a168ba14fa7b75032f0c9"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0046",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In installExistingPackageAsUser of InstallPackageHelper.java, there is a possible carrier restriction bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d68cab5ac1aa294ec4d0419bc0803a5577e4e43c",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/d68cab5ac1aa294ec4d0419bc0803a5577e4e43c"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,77 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0047",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In writeUserLP of UserManagerService.java, device policies are serialized with an incorrect tag due to a logic error in the code. This could lead to local denial of service when policies are deserialized on reboot with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/3cd8a2c783fc736627b38f639fe4e239abcf6af1",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/3cd8a2c783fc736627b38f639fe4e239abcf6af1"
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/bd5cc7f03256b328438b9bc3791c6b811a2f1f17",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/bd5cc7f03256b328438b9bc3791c6b811a2f1f17"
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f516739398746fef7e0cf1437d9a40e2ad3c10bb",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/f516739398746fef7e0cf1437d9a40e2ad3c10bb"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0048",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Session of AccountManagerService.java, there is a possible method to retain foreground service privileges due to incorrect handling of null responses. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0049",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0050",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In getConfig of SoftVideoDecoderOMXComponent.cpp, there is a possible out of bounds write due to a missing validation check. This could lead to a local non-security issue with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/8f3bc8be16480367bac36effa25706133a0dc22d",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/8f3bc8be16480367bac36effa25706133a0dc22d"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0051",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In onQueueFilled of SoftMPEG4.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0052",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In multiple functions of healthconnect, there is a possible leakage of exercise route data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/HealthFitness/+/178f4824574fdf33ed4ac584d092240d1c771b04",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/HealthFitness/+/178f4824574fdf33ed4ac584d092240d1c771b04"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0053",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In getCustomPrinterIcon of PrintManagerService.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/74b03835a7fac15e854d08159922418c99e27e77",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/74b03835a7fac15e854d08159922418c99e27e77"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -1,17 +1,108 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1696",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Santesoft Sante FFT Imaging versions 1.4.1 and prior once a user opens a malicious DCM file on affected FFT Imaging installations, a local attacker could perform an out-of-bounds write, which could allow for arbitrary code execution.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Santesoft",
"product": {
"product_data": [
{
"product_name": "Sante FFT Imaging",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "1.4.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "ICSMA-24-065-01",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<span style=\"background-color: rgb(255, 255, 255);\">Santesoft released an updated version of their product and recommends users update Sante FFT Imaging to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://santesoft.com/win/sante-fft-imaging/download.html\">v1.4.2</a><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;or later.</span>\n\n<br>"
}
],
"value": "\nSantesoft released an updated version of their product and recommends users update Sante FFT Imaging to v1.4.2 https://santesoft.com/win/sante-fft-imaging/download.html \u00a0or later.\n\n\n"
}
],
"credits": [
{
"lang": "en",
"value": "Michael Heinzl reported this vulnerability to CISA."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,79 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-23717",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In access_secure_service_from_temp_bond of btm_sec.cc, there is a possible way to achieve keystroke injection due to improper input validation. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "14"
},
{
"version_affected": "=",
"version_value": "13"
},
{
"version_affected": "=",
"version_value": "12L"
},
{
"version_affected": "=",
"version_value": "12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/2024-03-01"
}
]
}

View File

@ -104,7 +104,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc4",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -162,6 +162,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -76,7 +76,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc5",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -115,20 +115,10 @@
"url": "https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/"
}
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -76,7 +76,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc5",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -115,20 +115,10 @@
"url": "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/"
}
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc5",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -104,20 +104,10 @@
"url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/"
}
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc5",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -104,20 +104,10 @@
"url": "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/"
}
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -88,7 +88,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -70,7 +70,7 @@
"versionType": "custom"
},
{
"version": "6.8-rc1",
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-8df59b4913de"
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-28836",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2381",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2382",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2383",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2384",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2385",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2386",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2387",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}