Vulnerability Description
In the OMXNodeInstance::useBuffer and IOMX::freeBuffer functions, there is a possible use after free due to a race condition if the user frees the buffer while it's being used in another thread. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 8.1. Android ID: A-38118127.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 8.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102421Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040106Third Party AdvisoryVDB Entry
- https://source.android.com/security/bulletin/2018-01-01PatchVendor Advisory
- http://www.securityfocus.com/bid/102421Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040106Third Party AdvisoryVDB Entry
- https://source.android.com/security/bulletin/2018-01-01PatchVendor Advisory
FAQ
What is CVE-2017-13183?
CVE-2017-13183 is a vulnerability with a CVSS score of 7.0 (HIGH). In the OMXNodeInstance::useBuffer and IOMX::freeBuffer functions, there is a possible use after free due to a race condition if the user frees the buffer while it's being used in another thread. This ...
How severe is CVE-2017-13183?
CVE-2017-13183 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-13183?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.