Headline
CVE-2023-35687
In MtpPropertyValue of MtpProperty.h, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
)]}’ { "commit": "ea6131efa76a0b2a12724ffd157909e2c6fb4036", "tree": "319c72a5161203965654fc6695aece4c98ee4a65", "parents": [ “f11b333bf64438eaa7f8ccb5d8d02b472406e6bd” ], "author": { "name": "Shruti Bihani", "email": "[email protected]", "time": “Thu Jul 06 08:41:56 2023 +0000” }, "committer": { "name": "Android Build Coastguard Worker", "email": "[email protected]", "time": “Fri Jul 14 17:29:53 2023 +0000” }, "message": "Fix Segv on unknown address error flagged by fuzzer test.\n\nThe error is thrown when the destructor tries to free pointer memory.\nThis is happening for cases where the pointer was not initialized. Initializing it to a default value fixes the error.\n\nBug: 245135112\nTest: Build mtp_host_property_fuzzer and run on the target device\n(cherry picked from commit 3afa6e80e8568fe63f893fa354bc79ef91d3dcc0)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:99d0823ca2b8275f000a437150fb8d1938b1b31a)\nMerged-In: I255cd68b7641e96ac47ab81479b9b46b78c15580\nChange-Id: I255cd68b7641e96ac47ab81479b9b46b78c15580\n", "tree_diff": [ { "type": "modify", "old_id": "36d736065f30b1e525e8ea2efd8a1cf08feaa39c", "old_mode": 33188, "old_path": "media/mtp/MtpProperty.h", "new_id": "2bdbfd32627d5c6438169022604fd403495eb1e1", "new_mode": 33188, "new_path": “media/mtp/MtpProperty.h” } ] }
Related news
Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality.
In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.