In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2024-10-01 | Vendor Advisory |
Configurations
History
04 Nov 2024, 22:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
References | () https://source.android.com/security/bulletin/pixel/2024-10-01 - Vendor Advisory | |
Summary |
|
|
First Time |
Google
Google android |
25 Oct 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
CWE | CWE-125 |
25 Oct 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-25 11:15
Updated : 2024-11-04 22:16
NVD link : CVE-2024-47041
Mitre link : CVE-2024-47041
CVE.ORG link : CVE-2024-47041
JSON object : View
Products Affected
- android
CWE
CWE-125
Out-of-bounds Read