The following security vulnerability has been identified in the implementation of the Little Kernel (LK) bootloader.
The Little Kernel (LK) application bootloader is not ensuring that write operations stay within partition boundaries when flashing sparse images via fastboot. This is possible because certain sparse chunk types allow adjusting the write destination offset past the partition boundary. This is a problem for additional custom image verification on top of the fastboot flash commands for certain partition names, while not doing so for others. This can lead to boot failures or the possibility of bypassing such verification routines.
Access Vector: local
Security Risk: high
Vulnerability: CWE-20 (improper input validation)
All active branches of Little Kernel on CAF are affected.
We advise customers to apply the following patches:
Qualcomm Innovation Center, Inc. (QuIC) thanks Lee Harrison and Michael Contreras for reporting the related issues and working with QuIC to help improve Android device security.