In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html | Patch Third Party Advisory VDB Entry |
https://source.android.com/security/bulletin/2020-01-01 | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | Mailing List Third Party Advisory |
Information
Published : 2020-01-08 08:15
Updated : 2022-10-13 19:33
NVD link : CVE-2020-0009
Mitre link : CVE-2020-0009
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
debian
- debian_linux
- android