- Synchronized data.

This commit is contained in:
CVE Team 2018-03-16 15:02:49 -04:00
parent 20bd252553
commit 898158f3c9
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
25 changed files with 75 additions and 1125 deletions

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-11074",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Removal of obsolete set/reset ssid hotlist API."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Copy without Checking Size of Input in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-11082",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Due to a race condition in a firmware loading routine, a buffer overflow could potentially occur if multiple user space threads try to update the WLAN firmware file through sysfs."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Copy without Checking Size of Input in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-14887",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "In the processing of messages of type eWNI_SME_MODIFY_ADDITIONAL_IES, an integer overflow leading to heap buffer overflow may potentially occur."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Copy without Checking Size of Input in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-14889",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Due to the lack of a range check on the array index into the WMI descriptor pool, arbitrary address execution may potentially occur in the process mgmt completion handler."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper Input Validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-15814",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "In msm_flash_subdev_do_ioctl of drivers/media/platform/msm/camera_v2/sensor/flash/msm_flash.c, there is a possible out of bounds read if flash_data.cfg_type is CFG_FLASH_INIT due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information leak in camera sensor driver"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-15830",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper ch_list array index initialization in function sme_set_plm_request() causes potential buffer overflow"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-15831",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "In the function wma_ndp_end_indication_event_handler(), there is no input validation check on a event_info value coming from firmware which can cause an integer overflow and then leads to potential heap overwrite."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-15833",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "untrusted pointer dereference in update_userspace_power() function in power leads to information Exposure"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "untrusted pointer dereference in Power"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-15834",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Race condition in diag_dbgfs_read_dcistats() while acessing diag_dbgfs_dci_data_index causes potential heap overflow"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Race condition leads to heap overflow in diag"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18050",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for vdev_map in wma_tbttoffset_update_event_handler() which is received from firmware leads to potential buffer overwrite and out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18051",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for event->vdev_id in wma_rcpi_event_handler() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18052",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for cmpl_params->num_reports, param_buf->desc_ids and param_buf->status in wma_mgmt_tx_bundle_completion_handler() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18053",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for fix_param->vdev_id in wma_p2p_lo_event_handler() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18054",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for num_vdev_mac_entries in wma_pdev_hw_mode_transition_evt_handler() which is received from firmware leads to potential buffer overflow"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18055",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for wmi_event->num_vdev_mac_entries in wma_pdev_set_hw_mode_resp_evt_handler() which is received from firmware leads to potential buffer overflow"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18057",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for vdev id in wma_nlo_scan_cmp_evt_handler() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18058",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for wow_buf_pkt_len in wma_wow_wakeup_host_event() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18059",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for vdev id in wma_scan_event_callback() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18060",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for resp_event->vdev_id in wma_unified_bcntx_status_event_handler() which is received from firmware leads to potential out of bound memory read"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18061",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Potential buffer overflow can happen when processing AOA measurement event from WIGIG firmware in wil_aoa_evt_meas()"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Copy without Checking Size of length Input in AOA measurement"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18062",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Potential buffer overflow can happen when processing UTF event in wma_process_utf_event()"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Copy without Checking Size of length Input in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18065",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper input validation for vent->vdev_id in wma_action_frame_filter_mac_event_handler() which is received from firmware leads to arbitrary code execution"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper input validation in WLAN"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2017-18066",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "improper controls in MSM CORE leads to use memory after it is freed in msm_core_ioctl()"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "use after free in MSM CORE"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2018-3560",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Double Free Vulnerability exist in Audio Driver while opening a sound compression device"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Double Free Vulnerability in Audio Driver"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2018-03-05T00:00:00",
"ID" : "CVE-2018-3561",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Android for MSM, Firefox OS for MSM, QRD Android",
"version" : {
"version_data" : [
{
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "Qualcomm, Inc."
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "a race condition in diag_ioctl_lsm_deinit() leads to a Use After Free condition."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "use after free in DIAG"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-03-01"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}