In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel
The product does not initialize a critical resource.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2021-12-01 | vendor advisory |