Skip to content

Commit 59d65bb

Browse files
committed
"-Synchronized-Data."
1 parent 7ac1a88 commit 59d65bb

File tree

6 files changed

+193
-10
lines changed

6 files changed

+193
-10
lines changed

2024/0xxx/CVE-2024-0153.json

+113-5
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,126 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2024-0153",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Valhall GPU Firmware, Arm Ltd Arm 5th Gen GPU Architecture Firmware allows a local non-privileged user to make improper GPU processing operations to access a limited amount outside of buffer bounds. If the operations are carefully prepared, then this in turn could give them access to all system memory. This issue affects Valhall GPU Firmware: from r29p0 through r46p0; Arm 5th Gen GPU Architecture Firmware: from r41p0 through r46p0."
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
25+
"cweId": "CWE-119"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "Arm Ltd",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "Valhall GPU Firmware",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_value": "not down converted",
44+
"x_cve_json_5_version_data": {
45+
"versions": [
46+
{
47+
"changes": [
48+
{
49+
"at": "r47p0",
50+
"status": "unaffected"
51+
}
52+
],
53+
"lessThanOrEqual": "r46p0",
54+
"status": "affected",
55+
"version": "r29p0",
56+
"versionType": "patch"
57+
}
58+
],
59+
"defaultStatus": "unaffected"
60+
}
61+
}
62+
]
63+
}
64+
},
65+
{
66+
"product_name": "Arm 5th Gen GPU Architecture Firmware",
67+
"version": {
68+
"version_data": [
69+
{
70+
"version_value": "not down converted",
71+
"x_cve_json_5_version_data": {
72+
"versions": [
73+
{
74+
"changes": [
75+
{
76+
"at": "r47p0",
77+
"status": "unaffected"
78+
}
79+
],
80+
"lessThanOrEqual": "r46p0",
81+
"status": "affected",
82+
"version": "r41p0",
83+
"versionType": "patch"
84+
}
85+
],
86+
"defaultStatus": "unaffected"
87+
}
88+
}
89+
]
90+
}
91+
}
92+
]
93+
}
94+
}
95+
]
96+
}
97+
},
98+
"references": {
99+
"reference_data": [
100+
{
101+
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
102+
"refsource": "MISC",
103+
"name": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities"
15104
}
16105
]
17-
}
106+
},
107+
"generator": {
108+
"engine": "Vulnogram 0.2.0"
109+
},
110+
"source": {
111+
"discovery": "UNKNOWN"
112+
},
113+
"solution": [
114+
{
115+
"lang": "en",
116+
"supportingMedia": [
117+
{
118+
"base64": false,
119+
"type": "text/html",
120+
"value": "This issue is fixed in Valhall and Arm 5th Gen GPU Architecture Firmware r47p0. Users are recommended to upgrade if they are impacted by this issue."
121+
}
122+
],
123+
"value": "This issue is fixed in Valhall and Arm 5th Gen GPU Architecture Firmware r47p0. Users are recommended to upgrade if they are impacted by this issue."
124+
}
125+
]
18126
}

2024/5xxx/CVE-2024-5710.json

+8-5
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
{
4343
"version_affected": "<=",
4444
"version_name": "unspecified",
45-
"version_value": "latest"
45+
"version_value": "1.34.34"
4646
}
4747
]
4848
}
@@ -62,25 +62,28 @@
6262
}
6363
]
6464
},
65+
"generator": {
66+
"engine": "Vulnogram 0.2.0"
67+
},
6568
"source": {
6669
"advisory": "70897f59-a966-4d93-b71e-745e3da91970",
6770
"discovery": "EXTERNAL"
6871
},
6972
"impact": {
7073
"cvss": [
7174
{
72-
"version": "3.0",
7375
"attackComplexity": "HIGH",
7476
"attackVector": "NETWORK",
7577
"availabilityImpact": "NONE",
78+
"baseScore": 5.3,
79+
"baseSeverity": "MEDIUM",
7680
"confidentialityImpact": "NONE",
7781
"integrityImpact": "HIGH",
7882
"privilegesRequired": "LOW",
7983
"scope": "UNCHANGED",
8084
"userInteraction": "NONE",
81-
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
82-
"baseScore": 5.3,
83-
"baseSeverity": "MEDIUM"
85+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
86+
"version": "3.1"
8487
}
8588
]
8689
}

2024/6xxx/CVE-2024-6424.json

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2024-6424",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2024/6xxx/CVE-2024-6425.json

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2024-6425",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2024/6xxx/CVE-2024-6426.json

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2024-6426",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2024/6xxx/CVE-2024-6427.json

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2024-6427",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

0 commit comments

Comments
 (0)