Buffer overflow in Google Android - CVE-2017-15854
Published: June 12, 2018 / Updated: August 8, 2020
Google Android
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
The value of fix_param->num_chans is received from firmware and if it is too large, an integer overflow can occur in wma_radio_chan_stats_event_handler() for the derived length len leading to a subsequent buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.