VYPR
High severity7.5NVD Advisory· Published Nov 16, 2017· Updated May 13, 2026

CVE-2017-11093

CVE-2017-11093

Description

In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer Over-read in Display due to the lack of an upper-bound validation when reading "num_of_cea_blocks" from the untrusted source (EDID), kernel memory can be exposed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A lack of upper-bound validation when reading num_of_cea_blocks from EDID in Android's display driver leads to a kernel memory buffer over-read.

Vulnerability

In the Android kernel for MSM, Firefox OS for MSM, QRD Android, and all Android releases from CAF using the Linux kernel, the display driver fails to validate the upper bound of the num_of_cea_blocks value read from an untrusted EDID (Extended Display Identification Data) source. This allows a buffer over-read condition. The EDID is typically provided by an external display device. The affected versions include all Android releases from CAF using the Linux kernel up to the November 2017 Pixel/Nexus Security Bulletin.

Exploitation

An attacker must be able to supply a malicious EDID to a device, which can occur when connecting a compromised or crafted external display. No additional authentication or user interaction is required beyond connecting the display. The driver reads the untrusted num_of_cea_blocks value without a proper upper bound check, causing the kernel to read beyond the intended buffer boundary.

Impact

A successful buffer over-read can expose kernel memory contents to an attacker, potentially leaking sensitive information. This is a confidentiality impact. The exact scope of leaked memory depends on the kernel layout at the time of the operation. Denial of service or code execution are not described in the available references.

Mitigation

Google addressed this issue in the Pixel/Nexus Security Bulletin dated November 2017 with the November 5, 2017 security patch level, as indicated in Reference [1]. Users should apply the Android security update of November 2017 or later. There is no known workaround other than keeping the device updated.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Qualcomm/MSMllm-create
  • Qualcomm, Inc./Android for MSM, Firefox OS for MSM, QRD Androidv5
    Range: All Android releases from CAF using the Linux kernel

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.