The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x mishandles pointer validation within the KGSL Linux Graphics Module, which allows attackers to bypass intended access restrictions by using the /ashmem string as the dentry name.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.codeaurora.org/invalid-path-check-ashmem-memory-file-cve-2016-5340 | broken link |
http://www.securityfocus.com/bid/92374 | vdb entry third party advisory |
http://source.android.com/security/bulletin/2016-10-01.html | third party advisory |
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=06e51489061e5473b4e2035c79dcf7c27a6f75a6 | mailing list third party advisory patch |
http://www.securitytracker.com/id/1036763 | vdb entry third party advisory |