In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 808, and SD 810, if start_addr + size is too large in boot_clobber_check_local_address_range(), an integer overflow occurs, resulting in clobber protection check being bypassed and SBL memory corruption.
References
Link Resource
http://www.securityfocus.com/bid/103671 Third Party Advisory VDB Entry
https://source.android.com/security/bulletin/2018-04-01 Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: qualcomm

Published: 2018-04-02T00:00:00

Updated: 2018-04-19T09:57:01

Reserved: 2017-08-16T00:00:00


Link: CVE-2015-9190

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-04-18T14:29:07.403

Modified: 2018-05-09T15:23:29.613


Link: CVE-2015-9190

JSON object: View

cve-icon Redhat Information

No data.

CWE