Vulnerability in the v4l2 driver affecting the Android platform

TrendMicro Company ΠΎΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π»Π° vulnerability information (CVE not assigned) in the driver v4l2, which allows an unprivileged local user to execute their code in the context of the Linux kernel. The information about the vulnerability is provided in the context of the Android platform, without detailing whether the issue is specific to the Android kernel or occurs in the regular Linux kernel.

Exploitation of the vulnerability requires local access by an attacker to the system. On Android, an attack first needs to gain control of an unprivileged application that has access to the V4L (Video for Linux) subsystem, such as a camera program. The most realistic application of the vulnerability in Android is the inclusion of an exploit in malicious applications prepared by attackers to escalate privileges on the device.

Currently, the vulnerability remains unpatched. Even though Google was notified of the issue in March, the fix was not included in September update Android platforms. There are 49 vulnerabilities fixed in the September Android Security Patch Roll, of which four are rated Critical. Two critical vulnerabilities have been addressed in the multimedia framework and allow code execution when processing specially crafted multimedia data. 31 vulnerabilities have been fixed in components for Qualcomm chips, of which two vulnerabilities have been rated critical, allowing remote attacks. The rest of the problems are marked as dangerous, i.Π΅. allow, through manipulation of local applications, to execute code in the context of a privileged process.

Source: opennet.ru

Add a comment