cnvd-2017-15838
Vulnerability from cnvd
Title
Google Android Synaptics Touchscreen Driver信息泄露漏洞
Description
Android是一种基于Linux的自由及开放源代码的操作系统,主要使用于移动设备。 Google Android Synaptics Touchscreen Driver存在信息泄露漏洞。攻击者可以利用漏洞来获取潜在的敏感信息。
Severity
Patch Name
Google Android Synaptics Touchscreen Driver信息泄露漏洞的补丁
Patch Description
Android是一种基于Linux的自由及开放源代码的操作系统,主要使用于移动设备。 Google Android Synaptics Touchscreen Driver存在信息泄露漏洞。攻击者可以利用漏洞来获取潜在的敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可联系供应商获得补丁信息: https://source.android.com/security/bulletin/2017-06-01

Reference
http://www.securityfocus.com/bid/99073
Impacted products
Name
Google Android
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "99073"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-0650"
    }
  },
  "description": "Android\u662f\u4e00\u79cd\u57fa\u4e8eLinux\u7684\u81ea\u7531\u53ca\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\uff0c\u4e3b\u8981\u4f7f\u7528\u4e8e\u79fb\u52a8\u8bbe\u5907\u3002\r\n\r\nGoogle Android Synaptics Touchscreen Driver\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u6765\u83b7\u53d6\u6f5c\u5728\u7684\u654f\u611f\u4fe1\u606f\u3002",
  "discovererName": "Omer Shwartz, Amir Cohen, Dr. Asaf Shabtai, and Dr. Yossi Oren of Ben Gurion University Cyber Lab.",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://source.android.com/security/bulletin/2017-06-01",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-15838",
  "openTime": "2017-07-21",
  "patchDescription": "Android\u662f\u4e00\u79cd\u57fa\u4e8eLinux\u7684\u81ea\u7531\u53ca\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\uff0c\u4e3b\u8981\u4f7f\u7528\u4e8e\u79fb\u52a8\u8bbe\u5907\u3002\r\n\r\nGoogle Android Synaptics Touchscreen Driver\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u6765\u83b7\u53d6\u6f5c\u5728\u7684\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Google Android Synaptics Touchscreen Driver\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Google Android"
  },
  "referenceLink": "http://www.securityfocus.com/bid/99073",
  "serverity": "\u4f4e",
  "submitTime": "2017-06-21",
  "title": "Google Android Synaptics Touchscreen Driver\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…