In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25384 | In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/2023-12-01 |
|
History
Thu, 29 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2025-05-29T13:49:46.575Z
Reserved: 2022-11-03T22:37:50.647Z
Link: CVE-2023-21216
Updated: 2024-08-02T09:28:26.203Z
Status : Modified
Published: 2023-12-04T23:15:22.570
Modified: 2025-05-29T14:15:30.373
Link: CVE-2023-21216
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD