Логотип exploitDog
bind:CVE-2017-8244
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-8244

Количество 4

Количество 4

nvd логотип

CVE-2017-8244

около 8 лет назад

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2017-8244

почти 5 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2017-8244

около 8 лет назад

In core_info_read and inst_info_read in all Android releases from CAF ...

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-6ghc-48vx-2m7g

около 3 лет назад

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-8244

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).

CVSS3: 7
0%
Низкий
около 8 лет назад
msrc логотип
CVSS3: 7
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2017-8244

In core_info_read and inst_info_read in all Android releases from CAF ...

CVSS3: 7
0%
Низкий
около 8 лет назад
github логотип
GHSA-6ghc-48vx-2m7g

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten, which means that it may point to anywhere of kernel memory (for write).

CVSS3: 7
0%
Низкий
около 3 лет назад

Уязвимостей на страницу