"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-03-04 10:00:36 +00:00
parent 73692191f6
commit e40ce0969b
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
10 changed files with 250 additions and 5 deletions

View File

@ -1,18 +1,165 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6143",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "arm-security@arm.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system\u2019s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.\n\n"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416 Use After Free",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arm Ltd",
"product": {
"product_data": [
{
"product_name": "Midgard GPU Kernel Driver",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "r13p0",
"version_value": "r32p0"
}
]
}
},
{
"product_name": "Bifrost GPU Kernel Driver",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "r19p0",
"status": "unaffected"
}
],
"lessThanOrEqual": "r18p0",
"status": "affected",
"version": "r1p0",
"versionType": "patch"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Valhall GPU Kernel Driver",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "r47p0",
"status": "unaffected"
}
],
"lessThanOrEqual": "r46p0",
"status": "affected",
"version": "r37p0",
"versionType": "patch"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Arm 5th Gen GPU Architecture Kernel Driver",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "r47p0",
"status": "unaffected"
}
],
"lessThanOrEqual": "r46p0",
"status": "affected",
"version": "r41p0",
"versionType": "patch"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"refsource": "MISC",
"name": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in the Bifrost Kernel Driver in r19p0, in the Valhall and Arm 5th Gen GPU Architecture Kernel Drivers in r47p0. Users are recommended to upgrade if they are impacted by this issue. Please contact Arm support for Midgard GPUs.<br>"
}
],
"value": "This issue is fixed in the Bifrost Kernel Driver in r19p0, in the Valhall and Arm 5th Gen GPU Architecture Kernel Drivers in r47p0. Users are recommended to upgrade if they are impacted by this issue. Please contact Arm support for Midgard GPUs.\n"
}
]
}

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -97,6 +97,16 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
"refsource": "MISC",
"name": "https://www.mozilla.org/security/advisories/mfsa2024-07/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-28099",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}