In __wlan_hdd_cfg80211_vendor_scan() in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05, when SCAN_SSIDS and QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES are parsed, a buffer overwrite can potentially occur.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2018-07-01 | Patch Vendor Advisory |
https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ad3f76792e08a84962a0b8e9cfb1ba6c4c9ca6 | Patch Third Party Advisory |
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-07-06 19:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-5862
Mitre link : CVE-2018-5862
CVE.ORG link : CVE-2018-5862
JSON object : View
Products Affected
- android
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer