In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98547 | Third Party Advisory VDB Entry |
https://source.android.com/security/bulletin/pixel/2017-12-01 | Vendor Advisory |
https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-and-instinforead-cve-2017-8244 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: qualcomm
Published: 2017-05-12T20:00:00
Updated: 2017-12-05T19:57:01
Reserved: 2017-04-25T00:00:00
Link: CVE-2017-8244
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-05-12T20:29:00.313
Modified: 2020-11-09T14:27:19.047
Link: CVE-2017-8244
JSON object: View
Redhat Information
No data.
CWE