Description
In all Qualcomm products with Android releases from CAF using the Linux kernel, in function __mdss_fb_copy_destscaler_data(), variable ds_data[i].scale may still point to a user-provided address (which could point to arbitrary kernel address), so on an error condition, this user-provided address will be freed (arbitrary free), and continued operation could result in use after free condition.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-16391 | In all Qualcomm products with Android releases from CAF using the Linux kernel, in function __mdss_fb_copy_destscaler_data(), variable ds_data[i].scale may still point to a user-provided address (which could point to arbitrary kernel address), so on an error condition, this user-provided address will be freed (arbitrary free), and continued operation could result in use after free condition. |
References
History
No history.
Status: PUBLISHED
Assigner: qualcomm
Published:
Updated: 2024-09-17T04:09:26.293Z
Reserved: 2017-03-31T00:00:00.000Z
Link: CVE-2017-7364
No data.
Status : Modified
Published: 2017-08-18T19:29:00.263
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-7364
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD