First published: Mon Jan 25 2021(Updated: )
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459 References: <a href="https://android.googlesource.com/kernel/common/+/cb0a3edf8d00">https://android.googlesource.com/kernel/common/+/cb0a3edf8d00</a> <a href="https://source.android.com/security/bulletin/pixel/2020-09-01">https://source.android.com/security/bulletin/pixel/2020-09-01</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1919889 is considered high due to its potential for local escalation of privilege.
To fix REDHAT-BUG-1919889, apply the appropriate security updates from the Android kernel product team.
The vulnerability REDHAT-BUG-1919889 is caused by a missing bounds check in the kbd_keycode function of keyboard.c.
Users of the affected versions of the Google Android kernel may experience the vulnerability REDHAT-BUG-1919889.
Yes, REDHAT-BUG-1919889 can be exploited without any user interaction required.