Headline
CVE-2023-35658
In gatt_process_prep_write_rsp of gatt_cl.cc, there is a possible privilege escalation due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
)]}’ { "commit": "d03a3020de69143b1fe8129d75e55f14951dd192", "tree": "21bb178162249258daf336147da2b4633792c8fa", "parents": [ “b7ea57f620436c83a9766f928437ddadaa232e3a” ], "author": { "name": "Brian Delwiche", "email": "[email protected]", "time": “Tue Apr 11 23:05:45 2023 +0000” }, "committer": { "name": "Android Build Coastguard Worker", "email": "[email protected]", "time": “Fri Jul 14 17:32:20 2023 +0000” }, "message": "Fix UAF in gatt_cl.cc\n\ngatt_cl.cc accesses a header field after the buffer holding it may have\nbeen freed.\n\nTrack the relevant state as a local variable instead.\n\nBug: 274617156\nTest: atest: bluetooth, validated against fuzzer\nTag: #security\nIgnore-AOSP-First: Security\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:cbaa83627b328eee8f2e26188909a5ebfb0388d5)\nMerged-In: I085ecfa1a9ba098ecbfecbd3cb3e263ae13f9724\nChange-Id: I085ecfa1a9ba098ecbfecbd3cb3e263ae13f9724\n", "tree_diff": [ { "type": "modify", "old_id": "89218e42a2284746104e4b60b87de5e36da5ea54", "old_mode": 33188, "old_path": "system/stack/gatt/gatt_cl.cc", "new_id": "269893431f0fc9eb49dfb04fe804ac722eb4caa8", "new_mode": 33188, "new_path": “system/stack/gatt/gatt_cl.cc” } ] }
Related news
Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality.
In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.