CVE-2017-11093
Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer Over-read in Display due to the lack of an upper-bound validation when reading "num_of_cea_blocks" from the untrusted source (EDID), kernel memory can be exposed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A lack of upper-bound validation when reading num_of_cea_blocks from EDID in Android's display driver leads to a kernel memory buffer over-read.
Vulnerability
In the Android kernel for MSM, Firefox OS for MSM, QRD Android, and all Android releases from CAF using the Linux kernel, the display driver fails to validate the upper bound of the num_of_cea_blocks value read from an untrusted EDID (Extended Display Identification Data) source. This allows a buffer over-read condition. The EDID is typically provided by an external display device. The affected versions include all Android releases from CAF using the Linux kernel up to the November 2017 Pixel/Nexus Security Bulletin.
Exploitation
An attacker must be able to supply a malicious EDID to a device, which can occur when connecting a compromised or crafted external display. No additional authentication or user interaction is required beyond connecting the display. The driver reads the untrusted num_of_cea_blocks value without a proper upper bound check, causing the kernel to read beyond the intended buffer boundary.
Impact
A successful buffer over-read can expose kernel memory contents to an attacker, potentially leaking sensitive information. This is a confidentiality impact. The exact scope of leaked memory depends on the kernel layout at the time of the operation. Denial of service or code execution are not described in the available references.
Mitigation
Google addressed this issue in the Pixel/Nexus Security Bulletin dated November 2017 with the November 5, 2017 security patch level, as indicated in Reference [1]. Users should apply the Android security update of November 2017 or later. There is no known workaround other than keeping the device updated.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Qualcomm, Inc./Android for MSM, Firefox OS for MSM, QRD Androidv5Range: All Android releases from CAF using the Linux kernel
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- source.android.com/security/bulletin/pixel/2017-11-01nvdPatchVendor Advisory
News mentions
0No linked articles in our index yet.