In sendDeviceState_1_6 of RadioExt.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* |
Mon, 19 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:google:android:*:*:*:*:*:*:*:* | |
Vendors & Products |
Google
Google android |
|
Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In sendDeviceState_1_6 of RadioExt.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|

Status: PUBLISHED
Assigner: Google_Devices
Published:
Updated: 2024-08-19T17:36:28.922Z
Reserved: 2024-04-19T15:12:13.576Z
Link: CVE-2024-32927

Updated: 2024-08-19T17:23:22.575Z

Status : Analyzed
Published: 2024-08-19T17:15:07.493
Modified: 2024-08-20T16:15:03.227
Link: CVE-2024-32927

No data.