In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/57b823f4f758e2ef530909da07552b5aa80c6a7d | patch mailing list |
https://source.android.com/security/bulletin/2024-02-01 | patch vendor advisory |