mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
67 lines
2.2 KiB
JSON
67 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@qualcomm.com",
|
|
"ID": "CVE-2018-11905",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Android for MSM, Firefox OS for MSM, QRD Android",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All Android releases from CAF using the Linux kernel"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Qualcomm, Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Possible buffer overflow in WLAN function due to lack of input validation in values received from firmware."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Buffer Copy Without Checking Size of Input in WLAN"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://source.android.com/security/bulletin/2018-11-01#qualcomm-components",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://source.android.com/security/bulletin/2018-11-01#qualcomm-components"
|
|
},
|
|
{
|
|
"name": "105872",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/105872"
|
|
}
|
|
]
|
|
}
|
|
} |