Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-20132

Опубликовано: 15 июн. 2022
Источник: debian
EPSS Низкий

Описание

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.15-1package
linuxfixed5.10.92-1bullseyepackage
linuxfixed4.19.232-1busterpackage
linuxfixed4.9.303-1stretchpackage

Примечания

  • https://source.android.com/security/bulletin/2022-06-01

EPSS

Процентиль: 20%
0.00063
Низкий

Связанные уязвимости

CVSS3: 4.6
ubuntu
больше 3 лет назад

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

CVSS3: 4.6
redhat
больше 3 лет назад

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

CVSS3: 4.6
nvd
больше 3 лет назад

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

CVSS3: 4.6
github
больше 3 лет назад

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel

CVSS3: 4.6
fstec
больше 3 лет назад

Уязвимость компонента hid-lg.c ядра операционной системы Android, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 20%
0.00063
Низкий