In SELinux policy, there is a possible way of inferring which websites are being opened in the browser due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation
The vulnerability was discovered as part of a research about side-channel vulnerabilities through Android NDK / libc functions.
More details are available at the following URL:
By exploiting the vulnerability, it would be possible to infer, under certain conditions, the websites accessed using a browser on a specific Android device
To fix the vulnerability, it is necessary to update the Android OS to Android 13
Valerio Brussani (valbrux) – NoZero