In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published: 2017-05-12T20:00:00

Updated: 2024-08-05T16:27:22.879Z

Reserved: 2017-04-25T00:00:00

Link: CVE-2017-8244

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2017-05-12T20:29:00.313

Modified: 2020-11-09T14:27:19.047

Link: CVE-2017-8244

cve-icon Redhat

No data.