A pointer in an ADSPRPC command is not properly validated in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android), which can lead to kernel memory being accessed.
References
Link | Resource |
---|---|
https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=97017d59158086689488bdcfcafb59654a6f10da | Patch Third Party Advisory |
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin | Third Party Advisory |
https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=97017d59158086689488bdcfcafb59654a6f10da | Patch Third Party Advisory |
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=97017d59158086689488bdcfcafb59654a6f10da - Patch, Third Party Advisory | |
References | () https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin - Third Party Advisory |
Information
Published : 2018-07-06 19:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5886
Mitre link : CVE-2018-5886
CVE.ORG link : CVE-2018-5886
JSON object : View
Products Affected
- android
CWE
CWE-125
Out-of-bounds Read