First published: Mon Jul 02 2018(Updated: )
In writeInplace of Parcel.cpp, there is a possible information leak across processes, using Binder, due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9421 is classified as a medium severity vulnerability due to information leakage risks.
To fix CVE-2018-9421, ensure your Android device is updated to a patched version that addresses this vulnerability.
CVE-2018-9421 affects Android versions 6.0 through 8.1, including all security updates prior to the patches.
CVE-2018-9421 is an information disclosure vulnerability that can leak uninitialized data across processes.
No, exploiting CVE-2018-9421 does not require user interaction to be successful.