In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2024-08-05T16:27:22.879Z

Reserved: 2017-04-25T00:00:00

Link: CVE-2017-8244

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-12T20:29:00.313

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-8244

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.