there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/pixel/2024-03-01 | vendor advisory |