cve/2024/CVE-2024-47027.md

19 lines
873 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-47027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47027)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Android%20kernel%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brightgreen)
### Description
In sm_mem_compat_get_vmm_obj of lib/sm/shared_mem.c, there is a possible arbitrary physical memory access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds