CVE-2018-11891

In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on the length of array while accessing can lead to an out of bound read in WLAN HOST function.
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:44

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/107770 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107770 - Third Party Advisory, VDB Entry
References () https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=2fc3e8a2ae8233690872d313fbfb4c74d0c61daa - Patch, Third Party Advisory () https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=2fc3e8a2ae8233690872d313fbfb4c74d0c61daa - Patch, Third Party Advisory
References () https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin - Patch, Third Party Advisory () https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin - Patch, Third Party Advisory

Information

Published : 2018-09-19 14:29

Updated : 2024-11-21 03:44


NVD link : CVE-2018-11891

Mitre link : CVE-2018-11891

CVE.ORG link : CVE-2018-11891


JSON object : View

Products Affected

google

  • android
CWE
CWE-129

Improper Validation of Array Index