First published: Mon Oct 02 2023(Updated: )
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40129 is critical.
CVE-2023-40129 affects Google Android versions 12.0, 12.1, and 13.0.
CVE-2023-40129 is a heap buffer overflow vulnerability.
No, user interaction is not needed for exploitation of CVE-2023-40129.
To fix CVE-2023-40129, you should apply the security patches provided by Google for affected Android versions.