In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper mounting lead to device node and executable to be run from /dsp/ which presents a potential security issue.
References
Link | Resource |
---|---|
https://source.codeaurora.org/quic/le/meta-qti-bsp/commit/?id=ecd2fb4ab9e2a6851add554af03cebe337345c44 | Patch Third Party Advisory |
https://www.codeaurora.org/security-bulletin/2018/11/05/november-2018-code-aurora-forum-security-bulletin | Patch Third Party Advisory |
https://source.codeaurora.org/quic/le/meta-qti-bsp/commit/?id=ecd2fb4ab9e2a6851add554af03cebe337345c44 | Patch Third Party Advisory |
https://www.codeaurora.org/security-bulletin/2018/11/05/november-2018-code-aurora-forum-security-bulletin | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.codeaurora.org/quic/le/meta-qti-bsp/commit/?id=ecd2fb4ab9e2a6851add554af03cebe337345c44 - Patch, Third Party Advisory | |
References | () https://www.codeaurora.org/security-bulletin/2018/11/05/november-2018-code-aurora-forum-security-bulletin - Patch, Third Party Advisory |
Information
Published : 2018-11-27 16:29
Updated : 2024-11-21 03:44
NVD link : CVE-2018-11956
Mitre link : CVE-2018-11956
CVE.ORG link : CVE-2018-11956
JSON object : View
Products Affected
- android
CWE