Vulnerability Description
The value of fix_param->num_chans is received from firmware and if it is too large, an integer overflow can occur in wma_radio_chan_stats_event_handler() for the derived length len leading to a subsequent buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-secPatchThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2018-05-01Third Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-secPatchThird Party Advisory
FAQ
What is CVE-2017-15854?
CVE-2017-15854 is a vulnerability with a CVSS score of 7.8 (HIGH). The value of fix_param->num_chans is received from firmware and if it is too large, an integer overflow can occur in wma_radio_chan_stats_event_handler() for the derived length len leading to a subseq...
How severe is CVE-2017-15854?
CVE-2017-15854 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15854?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.