
CVE-2023-21228
https://notcve.org/view.php?id=CVE-2023-21228
04 Dec 2023 — In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21227
https://notcve.org/view.php?id=CVE-2023-21227
04 Dec 2023 — In HTBLogKM of htbserver.c, there is a possible information disclosure due to log information disclosure. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay divulgación de información. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21218
https://notcve.org/view.php?id=CVE-2023-21218
04 Dec 2023 — In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21217
https://notcve.org/view.php?id=CVE-2023-21217
04 Dec 2023 — In PMRWritePMPageList of TBD, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21216
https://notcve.org/view.php?id=CVE-2023-21216
04 Dec 2023 — In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21215
https://notcve.org/view.php?id=CVE-2023-21215
04 Dec 2023 — In DevmemIntAcquireRemoteCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21166
https://notcve.org/view.php?id=CVE-2023-21166
04 Dec 2023 — In RGXBackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21164
https://notcve.org/view.php?id=CVE-2023-21164
04 Dec 2023 — In DevmemIntMapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21163
https://notcve.org/view.php?id=CVE-2023-21163
04 Dec 2023 — In PMR_ReadBytes of pmr.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •

CVE-2023-21162
https://notcve.org/view.php?id=CVE-2023-21162
04 Dec 2023 — In RGXUnbackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Hay elevación de privilegios. • https://source.android.com/security/bulletin/2023-12-01 •