In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
References
Link | Resource |
---|---|
https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-and-instinforead-cve-2017-8244 | Broken Link |
http://www.securityfocus.com/bid/98547 | Third Party Advisory VDB Entry |
https://source.android.com/security/bulletin/pixel/2017-12-01 | Vendor Advisory |
Configurations
Information
Published : 2017-05-12 13:29
Updated : 2020-11-09 06:27
NVD link : CVE-2017-8244
Mitre link : CVE-2017-8244
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
- android