In modify_for_next_stage of fdt.rs, there is a possible way to render KASLR ineffective due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3 | Mailing List Patch |
| https://source.android.com/security/bulletin/2023-12-01 | Patch Third Party Advisory |
Configurations
History
15 Feb 2024, 20:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3 - Mailing List, Patch | |
| References | () https://source.android.com/security/bulletin/2023-12-01 - Patch, Third Party Advisory |
Information
Published : 2023-12-04 23:15
Updated : 2024-02-15 20:46
NVD link : CVE-2023-40082
Mitre link : CVE-2023-40082
CVE.ORG link : CVE-2023-40082
JSON object : View
Products Affected
- android
CWE
