Use-After-Free in ALSA PCM Playback Kernel Module (CVE-2017-8246)
Release Date:
May 1, 2017
Affected Projects:
Android for MSMFirefox OS for MSMQRD Android
Advisory ID:
QCIR-2017-00036-1
CVE ID(s):
Summary:
The following security vulnerabilities have been identified: CVE-2017-8246 In function msm_pcm_playback_close(), prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check, such as msm_pcm_volume_ctl_put(), which means this freed memory could be used. Access Vector: Local Security Risk: Medium Vulnerability: CWE-416 Use After Free Affected Versions: All Android releases from CAF using the Linux kernel.
Access Vector: Local
Security Risk: Medium
Access Vector: Local
Affected Versions:
All Android releases from CAF using the Linux kernel.
Patch:
CVE-2017-8246:
- https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=578eb74435eccdc3df516fd744941a7d872fac6c
- https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=30baaec8afb05abf9f794c631ad944838d498ab8
- https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=9734b72ae21eca557540c3c42d356dd131a20004
Acknowledgement:
Qualcomm Innovation Center, Inc. (QuIC) thanks Seven Shen from the Trend Micro Mobile Threat Research Team for bringing this issue to QuIC’s attention.
Revisions:
Initial revision