Vulnerability Description
In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/98547Third Party AdvisoryVDB Entry
- https://source.android.com/security/bulletin/pixel/2017-12-01Vendor Advisory
- https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-aBroken Link
- http://www.securityfocus.com/bid/98547Third Party AdvisoryVDB Entry
- https://source.android.com/security/bulletin/pixel/2017-12-01Vendor Advisory
- https://www.codeaurora.org/buffer-overflow-msmvidc-debugfs-driver-coreinforead-aBroken Link
FAQ
What is CVE-2017-8244?
CVE-2017-8244 is a vulnerability with a CVSS score of 7.0 (HIGH). In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at t...
How severe is CVE-2017-8244?
CVE-2017-8244 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8244?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.