Description
In the SELinux policy configured in system_app.te, there is a possible way for system_app to gain code execution in other processes due to an overly-permissive SELinux policy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-188554048
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-3310 | In the SELinux policy configured in system_app.te, there is a possible way for system_app to gain code execution in other processes due to an overly-permissive SELinux policy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-188554048 |
References
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/2021-09-01 |
|
History
No history.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-03T15:47:28.553Z
Reserved: 2020-11-06T00:00:00.000Z
Link: CVE-2021-0691
No data.
Status : Modified
Published: 2021-10-06T15:15:15.067
Modified: 2024-11-21T05:43:09.420
Link: CVE-2021-0691
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD