In qrtr_recvmsg of qrtr.c, there is a possible leak of kernel memory due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
{ "vanir_signatures": [ { "digest": { "length": 942.0, "function_hash": "326237298902944552711085178252159586240" }, "id": "ASB-A-184622099-835de786", "source": "https://android.googlesource.com/kernel/common/+/50535249f624d0072cd885bcdce4e4b6fb770160", "deprecated": false, "signature_version": "v1", "target": { "file": "net/qrtr/qrtr.c", "function": "qrtr_recvmsg" }, "signature_type": "Function" }, { "digest": { "threshold": 0.9, "line_hashes": [ "317345086463415370419056847029360287829", "85218780793221698087756109282893696768", "99207985601674004456791158284153340524", "123088985098890995454573551005234539733" ] }, "id": "ASB-A-184622099-bb2d91d6", "source": "https://android.googlesource.com/kernel/common/+/50535249f624d0072cd885bcdce4e4b6fb770160", "deprecated": false, "signature_version": "v1", "target": { "file": "net/qrtr/qrtr.c" }, "signature_type": "Line" } ], "fixes": [ "https://android.googlesource.com/kernel/common/+/50535249f624d0072cd885bcdce4e4b6fb770160" ], "spl": "2021-10-05", "severity": "High", "types": [ "ID" ] }