In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/102390 | vdb entry third party advisory |
https://source.android.com/security/bulletin/2018-01-01 | vendor advisory |
https://www.exploit-db.com/exploits/43464/ | exploit vdb entry third party advisory |
http://www.securitytracker.com/id/1040106 | vdb entry third party advisory |