First published: Mon Mar 04 2024(Updated: )
In writeUserLP of UserManagerService.java, device policies are serialized with an incorrect tag due to a logic error in the code. This could lead to local denial of service when policies are deserialized on reboot with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
=14.0 |
https://android.googlesource.com/platform/frameworks/base/+/3cd8a2c783fc736627b38f639fe4e239abcf6af1
https://android.googlesource.com/platform/frameworks/base/+/bd5cc7f03256b328438b9bc3791c6b811a2f1f17
https://android.googlesource.com/platform/frameworks/base/+/f516739398746fef7e0cf1437d9a40e2ad3c10bb
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0047 has a severity rating that suggests it could lead to a local denial of service.
To fix CVE-2024-0047, ensure that the affected Android device is updated to a version that addresses this vulnerability.
CVE-2024-0047 affects Android version 14.0 and its associated device policies.
CVE-2024-0047 cannot be exploited remotely as it requires local conditions to trigger the denial of service.
CVE-2024-0047 is caused by a logic error in the code that serializes device policies in UserManagerService.java.