In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Dec 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
Tue, 03 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android Google pixel |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:* cpe:2.3:o:google:android:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android Google pixel |
|
Metrics |
cvssV3_1
|
Mon, 02 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | |
References |
|

Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-12-03T18:39:18.952Z
Reserved: 2018-04-05T00:00:00.000Z
Link: CVE-2018-9376

Updated: 2024-12-03T18:39:11.248Z

Status : Analyzed
Published: 2024-12-02T21:15:09.107
Modified: 2024-12-18T19:37:08.323
Link: CVE-2018-9376

No data.