In smp_data_received of smp_l2c.cc, there is a possible out of bounds read followed by code execution due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2018-07-01 | patch vendor advisory |