In all Qualcomm products with Android releases from CAF using the Linux kernel, in function msm_compr_ioctl_shared, variable "ddp->params_length" could be accessed and modified by multiple threads, while it is not protected with locks. If one thread is running, while another thread is setting data, race conditions will happen. If "ddp->params_length" is set to a big number, a buffer overflow will occur.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100658 | Third Party Advisory VDB Entry |
https://source.android.com/security/bulletin/2017-09-01 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: qualcomm
Published: 2017-09-21T15:00:00
Updated: 2017-09-22T09:57:01
Reserved: 2017-06-15T00:00:00
Link: CVE-2017-9677
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-09-21T15:29:00.867
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-9677
JSON object: View
Redhat Information
No data.