From dc37f80fedd376fb3badc60dc90e18d5ea5104cc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 27 Nov 2024 20:00:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/13xxx/CVE-2017-13316.json | 91 +++++++++++++++++++++++++++++++--- 2017/13xxx/CVE-2017-13319.json | 83 ++++++++++++++++++++++++++++--- 2024/11xxx/CVE-2024-11927.json | 18 +++++++ 2024/11xxx/CVE-2024-11928.json | 18 +++++++ 2024/11xxx/CVE-2024-11929.json | 18 +++++++ 2024/11xxx/CVE-2024-11930.json | 18 +++++++ 2024/3xxx/CVE-2024-3727.json | 10 ++-- 7 files changed, 235 insertions(+), 21 deletions(-) create mode 100644 2024/11xxx/CVE-2024-11927.json create mode 100644 2024/11xxx/CVE-2024-11928.json create mode 100644 2024/11xxx/CVE-2024-11929.json create mode 100644 2024/11xxx/CVE-2024-11930.json diff --git a/2017/13xxx/CVE-2017-13316.json b/2017/13xxx/CVE-2017-13316.json index 86ed36bc742..9502ba45506 100644 --- a/2017/13xxx/CVE-2017-13316.json +++ b/2017/13xxx/CVE-2017-13316.json @@ -1,18 +1,93 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2017-13316", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2017-13316", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In checkPermissions of RecognitionService.java, there is a possible\u00a0permissions bypass due to a missing permission check. This could lead to\u00a0local escalation of privilege with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "6" + }, + { + "version_affected": "=", + "version_value": "6.0.1" + }, + { + "version_affected": "=", + "version_value": "7" + }, + { + "version_affected": "=", + "version_value": "7.1.1" + }, + { + "version_affected": "=", + "version_value": "7.1.2" + }, + { + "version_affected": "=", + "version_value": "8" + }, + { + "version_affected": "=", + "version_value": "8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-05-01", + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2018-05-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2017/13xxx/CVE-2017-13319.json b/2017/13xxx/CVE-2017-13319.json index 2326e3c189a..b9bb57d034b 100644 --- a/2017/13xxx/CVE-2017-13319.json +++ b/2017/13xxx/CVE-2017-13319.json @@ -1,18 +1,85 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2017-13319", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2017-13319", + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In pvmp3_get_main_data_size of pvmp3_get_main_data_size.cpp, there is a\u00a0possible buffer overread due to a missing bounds check. This could lead to\u00a0remote information disclosure of global static variables with no additional\u00a0execution privileges needed. User interaction is not needed for\u00a0exploitation." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Google", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "7" + }, + { + "version_affected": "=", + "version_value": "7.1.1" + }, + { + "version_affected": "=", + "version_value": "7.1.2" + }, + { + "version_affected": "=", + "version_value": "8" + }, + { + "version_affected": "=", + "version_value": "8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01", + "refsource": "MISC", + "name": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11927.json b/2024/11xxx/CVE-2024-11927.json new file mode 100644 index 00000000000..60c1447b517 --- /dev/null +++ b/2024/11xxx/CVE-2024-11927.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11927", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11928.json b/2024/11xxx/CVE-2024-11928.json new file mode 100644 index 00000000000..9942e8a494e --- /dev/null +++ b/2024/11xxx/CVE-2024-11928.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11928", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11929.json b/2024/11xxx/CVE-2024-11929.json new file mode 100644 index 00000000000..e940b2c122e --- /dev/null +++ b/2024/11xxx/CVE-2024-11929.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11929", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/11xxx/CVE-2024-11930.json b/2024/11xxx/CVE-2024-11930.json new file mode 100644 index 00000000000..373e78314ac --- /dev/null +++ b/2024/11xxx/CVE-2024-11930.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-11930", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3727.json b/2024/3xxx/CVE-2024-3727.json index 76685cd6a6b..55738397019 100644 --- a/2024/3xxx/CVE-2024-3727.json +++ b/2024/3xxx/CVE-2024-3727.json @@ -602,7 +602,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.3-3.rhaos4.13.el9", + "version": "2:1.11.3-3.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -637,7 +637,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-19.rhaos4.14.el9", + "version": "3:4.4.1-19.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -686,7 +686,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.3-4.rhaos4.15.el8", + "version": "2:1.11.3-4.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -777,7 +777,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.29.5-7.rhaos4.16.git7db4ada.el9", + "version": "0:1.29.5-7.rhaos4.16.git7db4ada.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1341,7 +1341,7 @@ } }, { - "product_name": "Red Hat Openshift sandboxed containers", + "product_name": "Red Hat Openshift Sandboxed Containers", "version": { "version_data": [ {