First published: Mon Aug 07 2023(Updated: )
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | ||
debian/linux | <=6.1.115-1<=6.1.119-1 | 5.10.223-1 5.10.226-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)