Vulnerability identifier: #VU63350
Vulnerability risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-254
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Pixel
Mobile applications /
Mobile firmware & hardware
Vendor:
Description
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to multiple issues in Qdisc implementation related to rcu read lock. A local application can execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://source.android.com/security/bulletin/pixel/2022-03-01
http://android.googlesource.com/kernel/common/+/9d7e82cec35c0
http://android.googlesource.com/kernel/common/+/3a7d0d07a3867
http://android.googlesource.com/kernel/common/+/86bd446b5cebd
http://android.googlesource.com/kernel/common/+/6f99528e97977
http://android.googlesource.com/kernel/common/+/e368fdb61d8e7
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.