In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: qualcomm

Published: 2017-05-12T20:00:00

Updated: 2017-12-05T19:57:01

Reserved: 2017-04-25T00:00:00


Link: CVE-2017-8244

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-05-12T20:29:00.313

Modified: 2020-11-09T14:27:19.047


Link: CVE-2017-8244

JSON object: View

cve-icon Redhat Information

No data.

CWE