The following security vulnerability has been identified in the implementation of the Little Kernel (LK) bootloader.
When processing a boot image, under certain conditions LK will use a non-validated tag_addr as the target address for loading the device tree. Under such conditions a memory copy operation is executed using data from the image for the destination address, the data, and the length, which results in an arbitrary memory write. The ability to upload an arbitrary image to the phone and start its boot process is a requirement for the exploitation of this vulnerability.
Access Vector: local
Security Risk: medium
Vulnerability: CWE-20 (improper input validation)
All active branches of the Little Kernel on CAF are affected.
We advise customers to apply the following patch:
Qualcomm Innovation Center, Inc. (QuIC) thanks Lee Harrison and Kang Li for reporting the related issues and working with QuIC to help improve Android device security.