{"id":"ASB-A-183188047","details":"In fastrpc_internal_invoke of drivers/misc/fastrpc.c, there is a possible way for user-mode processes to send fastrpc kernel requests due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.","aliases":["A-183188047","CVE-2021-28375"],"modified":"2026-05-19T16:54:37.272608834Z","published":"2021-08-01T00:00:00Z","references":[{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/2021-08-01"},{"type":"FIX","url":"https://android.googlesource.com/kernel/common/+/20c40794eb85ea29852d7bc37c55713802a543d6"}],"affected":[{"package":{"name":":linux_kernel:","ecosystem":"Android"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":":0"},{"fixed":":2021-08-05"}]}],"versions":["Kernel"],"ecosystem_specific":{"fixes":["https://android.googlesource.com/kernel/common/+/20c40794eb85ea29852d7bc37c55713802a543d6"],"vanir_signatures":[{"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["2482426716837670807191507678331904204","18618756952759906251121912994584143389","47795433000481475736428243376821800843"],"threshold":0.9},"deprecated":false,"target":{"file":"drivers/misc/fastrpc.c"},"id":"ASB-A-183188047-48700cdd","source":"https://android.googlesource.com/kernel/common/+/20c40794eb85ea29852d7bc37c55713802a543d6"},{"signature_version":"v1","signature_type":"Function","id":"ASB-A-183188047-ecbbde1b","deprecated":false,"target":{"file":"drivers/misc/fastrpc.c","function":"fastrpc_internal_invoke"},"digest":{"length":1067,"function_hash":"30786217320439064280331192377014023502"},"source":"https://android.googlesource.com/kernel/common/+/20c40794eb85ea29852d7bc37c55713802a543d6"}],"severity":"High","types":["EoP"],"spl":"2021-08-05"},"database_specific":{"source":"https://storage.googleapis.com/android-osv/ASB-A-183188047.json"}}],"schema_version":"1.7.5"}