In btm_proc_sp_req_evt of btm_sec.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure via compromised device firmware with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142543497
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/pixel/2020-06-01 | patch vendor advisory |