CVE-2017-9677

In all Qualcomm products with Android releases from CAF using the Linux kernel, in function msm_compr_ioctl_shared, variable "ddp->params_length" could be accessed and modified by multiple threads, while it is not protected with locks. If one thread is running, while another thread is setting data, race conditions will happen. If "ddp->params_length" is set to a big number, a buffer overflow will occur.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:36

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100658 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100658 - Third Party Advisory, VDB Entry
References () https://source.android.com/security/bulletin/2017-09-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2017-09-01 - Patch, Vendor Advisory

Information

Published : 2017-09-21 15:29

Updated : 2024-11-21 03:36


NVD link : CVE-2017-9677

Mitre link : CVE-2017-9677

CVE.ORG link : CVE-2017-9677


JSON object : View

Products Affected

google

  • android
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')