In all Qualcomm products with Android releases from CAF using the Linux kernel, in function msm_compr_ioctl_shared, variable "ddp->params_length" could be accessed and modified by multiple threads, while it is not protected with locks. If one thread is running, while another thread is setting data, race conditions will happen. If "ddp->params_length" is set to a big number, a buffer overflow will occur.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-18608 In all Qualcomm products with Android releases from CAF using the Linux kernel, in function msm_compr_ioctl_shared, variable "ddp->params_length" could be accessed and modified by multiple threads, while it is not protected with locks. If one thread is running, while another thread is setting data, race conditions will happen. If "ddp->params_length" is set to a big number, a buffer overflow will occur.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2024-08-05T17:18:01.126Z

Reserved: 2017-06-15T00:00:00

Link: CVE-2017-9677

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-09-21T15:29:00.867

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-9677

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.