Skip to content

Commit

Permalink
Auto-Update: 2023-12-22T03:00:33.026888+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 22, 2023
1 parent 9437e8c commit 290972e
Show file tree
Hide file tree
Showing 70 changed files with 735 additions and 164 deletions.
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-211xx/CVE-2023-21162.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21162",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.217",
"lastModified": "2023-12-06T20:57:57.817",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In RGXUnbackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-211xx/CVE-2023-21163.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21163",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.377",
"lastModified": "2023-12-06T20:58:03.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In PMR_ReadBytes of pmr.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-211xx/CVE-2023-21164.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21164",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.430",
"lastModified": "2023-12-06T20:58:10.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In DevmemIntMapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-211xx/CVE-2023-21166.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21166",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.477",
"lastModified": "2023-12-06T20:58:17.677",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In RGXBackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21215.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21215",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.523",
"lastModified": "2023-12-06T20:58:23.767",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.500",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In DevmemIntAcquireRemoteCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21216.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21216",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.570",
"lastModified": "2023-12-06T20:58:30.607",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.563",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21217.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21217",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.617",
"lastModified": "2023-12-06T20:58:37.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In PMRWritePMPageList of TBD, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21218.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21218",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.667",
"lastModified": "2023-12-06T20:58:43.987",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.683",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21227.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21227",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.720",
"lastModified": "2023-12-07T19:03:07.890",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.740",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is information disclosure."
"value": "In HTBLogKM of htbserver.c, there is a possible information disclosure due to log information disclosure. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21228.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21228",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.767",
"lastModified": "2023-12-07T19:02:52.430",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-212xx/CVE-2023-21263.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21263",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.813",
"lastModified": "2023-12-07T19:02:44.860",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:08.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": " In OSMMapPMRGeneric of pmr_os.c, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-213xx/CVE-2023-21394.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-21394",
"sourceIdentifier": "[email protected]",
"published": "2023-10-30T18:15:09.813",
"lastModified": "2023-12-04T23:15:22.860",
"lastModified": "2023-12-22T01:15:08.937",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -69,6 +69,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/68dca62035c49e14ad26a54f614199cb29a3393f",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]"
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-214xx/CVE-2023-21401.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21401",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:22.970",
"lastModified": "2023-12-07T19:02:30.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.033",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In DevmemIntChangeSparse of devicemem_server.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-214xx/CVE-2023-21402.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21402",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.027",
"lastModified": "2023-12-07T19:02:07.817",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.100",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In MMU_UnmapPages of mmu_common.c, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-214xx/CVE-2023-21403.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-21403",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.070",
"lastModified": "2023-12-07T19:02:20.233",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": "In RGXDestroyZSBufferKM of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-356xx/CVE-2023-35668.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-35668",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.460",
"lastModified": "2023-12-08T19:01:04.863",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -83,6 +83,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-356xx/CVE-2023-35690.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-35690",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.507",
"lastModified": "2023-12-07T19:04:01.073",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "There is elevation of privilege."
"value": " In RGXDestroyHWRTData of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-400xx/CVE-2023-40073.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-40073",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.553",
"lastModified": "2023-12-08T17:50:29.510",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.363",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -88,6 +88,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/fe6fef4f9c1f75c12bffa4a1d16d9990cc3fbc35",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-400xx/CVE-2023-40074.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-40074",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.607",
"lastModified": "2023-12-08T17:51:45.870",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -83,6 +83,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/40e4ea759743737958dde018f3606d778f7a53f3",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-400xx/CVE-2023-40075.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-40075",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.660",
"lastModified": "2023-12-08T17:55:45.390",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.497",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -88,6 +88,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/ae768fbb9975fdab267f525831cb52f485ab0ecc",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-400xx/CVE-2023-40076.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-40076",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.713",
"lastModified": "2023-12-08T17:57:47.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -68,6 +68,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/9b68987df85b681f9362a3cadca6496796d23bbc",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-400xx/CVE-2023-40077.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-40077",
"sourceIdentifier": "[email protected]",
"published": "2023-12-04T23:15:23.760",
"lastModified": "2023-12-08T18:01:28.773",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T01:15:09.633",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -88,6 +88,10 @@
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/58fd993a89a3a22fa5a4a1a4548125c6783ec80c",
"source": "[email protected]"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "[email protected]",
Expand Down
Loading

0 comments on commit 290972e

Please sign in to comment.