First published: Mon May 01 2023(Updated: )
In unflattenString8 of Sensor.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-269014004
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | ||
=11.0 | ||
=12.0 | ||
=12.1 | ||
=13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21118 is considered moderate due to its potential for local information disclosure.
Fixing CVE-2023-21118 requires updating to the latest version of Android, specifically versions that address the vulnerability.
CVE-2023-21118 affects Android versions 11, 12, 12.1, and 13.
No, user interaction is not required for exploiting CVE-2023-21118.
CVE-2023-21118 is a heap buffer overflow vulnerability that can lead to out of bounds reads.