A flaw was found in ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. References: https://source.android.com/security/bulletin/2018-01-01#asterisk https://www.exploit-db.com/exploits/43464/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1535200]
The ASHMEM driver is not enabled for Fedora.
The ASHMEM driver is not enabled in RHEL. Red Hat Products are not affected by this flaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-13216