Vulnerability Description
The (1) alloc and (2) free APIs in arch/arm/mach-msm/qdsp6v2/msm_audio_ion.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices do not validate parameters, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28749392 and Qualcomm internal bug CR556425.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | <= 6.0.1 |
Related Weaknesses (CWE)
References
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- http://www.securityfocus.com/bid/91628Third Party AdvisoryVDB Entry
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=5720ed5c3a786e3ba0a2Mailing ListPatchThird Party Advisory
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- http://www.securityfocus.com/bid/91628Third Party AdvisoryVDB Entry
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=5720ed5c3a786e3ba0a2Mailing ListPatchThird Party Advisory
FAQ
What is CVE-2014-9789?
CVE-2014-9789 is a vulnerability with a CVSS score of 7.8 (HIGH). The (1) alloc and (2) free APIs in arch/arm/mach-msm/qdsp6v2/msm_audio_ion.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices do not validate parameters, which allows attacke...
How severe is CVE-2014-9789?
CVE-2014-9789 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9789?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.