MediaTek GPU Extension Device Integer Overflow
- Published: 11 May 2017
Share
Type
Severity
Affected products
CVE Reference
2016-10-22 | Issue reported to MediaTek. |
2016-11-16 | MediaTek responded with confirmation of the issue. |
2016-11-25 | MWR queried MediaTek for the issue status and patch release plan. |
2017-03-30 | MWR queried MediaTek for the issue status and patch release plan. |
2017-03-30 | MediaTek confirmed that issue was fixed and a patch was available to its customers. |
MediaTek is a company that provides system-on-chip solutions for wireless communications, HDTV, DVD and Blu-ray. A number of MediaTek clients including Huawei, and Neffos were found to be affected by a vulnerability in the MediaTek GPU Extension Device code.
The ‘/proc/ged’ file implements an IOCTL interface vulnerable to an integer overflow. This vulnerability can be leveraged by local attackers to trigger a kernel heap memory corruption.
Local attackers can exploit this issue to gain root privileges or achieve kernel mode code execution.
This vulnerability is due to insufficient input validation of user supplied data.
MediaTek clients can receive the security fix directly from the vendor.
Please refer to the attached advisory.