From b3945089cd5f4d448e386c4ba4b3bf67b2fa929c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 11 Jan 2021 21:02:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/9xxx/CVE-2019-9376.json | 16 ++++++--- 2020/27xxx/CVE-2020-27059.json | 59 ++++++++++++++++++++++++++++++++-- 2021/0xxx/CVE-2021-0342.json | 50 ++++++++++++++++++++++++++-- 2021/21xxx/CVE-2021-21241.json | 2 +- 4 files changed, 115 insertions(+), 12 deletions(-) diff --git a/2019/9xxx/CVE-2019-9376.json b/2019/9xxx/CVE-2019-9376.json index d703c75e815..28397a34d15 100644 --- a/2019/9xxx/CVE-2019-9376.json +++ b/2019/9xxx/CVE-2019-9376.json @@ -19,7 +19,13 @@ "version": { "version_data": [ { - "version_value": "Android-10" + "version_value": "Android-9" + }, + { + "version_value": "Android-8.0" + }, + { + "version_value": "Android-8.1" } ] } @@ -45,9 +51,9 @@ "references": { "reference_data": [ { - "refsource": "MISC", - "name": "https://source.android.com/security/bulletin/android-10", - "url": "https://source.android.com/security/bulletin/android-10" + "refsource": "CONFIRM", + "name": "https://source.android.com/security/bulletin/2021-01-01", + "url": "https://source.android.com/security/bulletin/2021-01-01" } ] }, @@ -55,7 +61,7 @@ "description_data": [ { "lang": "eng", - "value": "In the Accounts package, there is a possible crash due to improper input validation. This could lead to permanent local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129287265" + "value": "In Account of Account.java, there is a possible boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android; Versions: Android-9, Android-8.0, Android-8.1; Android ID: A-129287265." } ] } diff --git a/2020/27xxx/CVE-2020-27059.json b/2020/27xxx/CVE-2020-27059.json index 4036cb81978..f56a66134db 100644 --- a/2020/27xxx/CVE-2020-27059.json +++ b/2020/27xxx/CVE-2020-27059.json @@ -4,14 +4,67 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27059", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android-8.0" + }, + { + "version_value": "Android-8.1" + }, + { + "version_value": "Android-9" + }, + { + "version_value": "Android-10 and 11" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://source.android.com/security/bulletin/pixel/2021-01-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-01-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In onAuthenticated of AuthenticationClient.java, there is a possible tapjacking attack when requesting the user's fingerprint due to an overlaid window. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, 11; Android ID: A-159249069." } ] } diff --git a/2021/0xxx/CVE-2021-0342.json b/2021/0xxx/CVE-2021-0342.json index d3ff0e3958f..ccc54af6e4d 100644 --- a/2021/0xxx/CVE-2021-0342.json +++ b/2021/0xxx/CVE-2021-0342.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0342", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Elevation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://source.android.com/security/bulletin/pixel/2021-01-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-01-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327." } ] } diff --git a/2021/21xxx/CVE-2021-21241.json b/2021/21xxx/CVE-2021-21241.json index a25153eccb2..91d54103363 100644 --- a/2021/21xxx/CVE-2021-21241.json +++ b/2021/21xxx/CVE-2021-21241.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "The Python \"Flask-Security-Too\" package is used for adding security features to your Flask application. It is an is a independently maintained version of Flask-Security based on the 3.0.0 version of Flask-Security.\n\nIn Flask-Security-Too from version 3.3.0 and before version 3.4.5, the /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token.\n\nVersion 3.4.5 and version 4.0.0 are patched.\n\nAs a workaround, if you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to \"0\" (seconds) which should make the token unusable." + "value": "The Python \"Flask-Security-Too\" package is used for adding security features to your Flask application. It is an is a independently maintained version of Flask-Security based on the 3.0.0 version of Flask-Security. In Flask-Security-Too from version 3.3.0 and before version 3.4.5, the /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. Version 3.4.5 and version 4.0.0 are patched. As a workaround, if you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to \"0\" (seconds) which should make the token unusable." } ] },