In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2018-04-01 | Third Party Advisory |
https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f2627fca43bc4403a445c2b84481383ac0249364 | Patch Third Party Advisory |
https://source.android.com/security/bulletin/pixel/2018-04-01 | Third Party Advisory |
https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f2627fca43bc4403a445c2b84481383ac0249364 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.android.com/security/bulletin/pixel/2018-04-01 - Third Party Advisory | |
References | () https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f2627fca43bc4403a445c2b84481383ac0249364 - Patch, Third Party Advisory |
Information
Published : 2018-05-17 22:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3567
Mitre link : CVE-2018-3567
CVE.ORG link : CVE-2018-3567
JSON object : View
Products Affected
- android
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer