In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2020-01-01 | vendor advisory |
http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html | vdb entry third party advisory patch |
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | third party advisory mailing list |