Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-2214

Опубликовано: 13 нояб. 2019
Источник: debian

Описание

In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.2.6-1package
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage
linuxnot-affectedjessiepackage

Примечания

  • https://lore.kernel.org/driverdev-devel/20190709110923.220736-1-maco@android.com/

  • https://git.kernel.org/linus/a56587065094fd96eb4c2b5ad65571daad32156d

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel

CVSS3: 7.8
nvd
около 6 лет назад

In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel

CVSS3: 7.8
github
больше 3 лет назад

In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel

CVSS3: 7.8
fstec
около 6 лет назад

Уязвимость функции binder_transaction (binder.c) ядра операционной системы Android, позволяющая нарушителю выполнить произвольный код