CVE-2016-10239

In TrustZone access control policy may potentially be bypassed in all Android releases from CAF using the Linux kernel due to improper input validation an integer overflow vulnerability leading to a buffer overflow could potentially occur and a buffer over-read vulnerability could potentially occur.
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97334 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97334 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038201 - () http://www.securitytracker.com/id/1038201 -
References () https://source.android.com/security/bulletin/2017-04-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2017-04-01 - Patch, Vendor Advisory

Information

Published : 2017-05-16 14:29

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10239

Mitre link : CVE-2016-10239

CVE.ORG link : CVE-2016-10239


JSON object : View

Products Affected

google

  • android
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-190

Integer Overflow or Wraparound