CVE-2017-8244

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:33

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98547 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98547 - Third Party Advisory, VDB Entry
References () https://source.android.com/security/bulletin/pixel/2017-12-01 - Vendor Advisory () https://source.android.com/security/bulletin/pixel/2017-12-01 - Vendor Advisory
References () https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-and-instinforead-cve-2017-8244 - Broken Link () https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-and-instinforead-cve-2017-8244 - Broken Link

Information

Published : 2017-05-12 20:29

Updated : 2024-11-21 03:33


NVD link : CVE-2017-8244

Mitre link : CVE-2017-8244

CVE.ORG link : CVE-2017-8244


JSON object : View

Products Affected

google

  • android
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')