Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-20148

Опубликовано: 15 июн. 2022
Источник: debian
EPSS Низкий

Описание

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.3-1package
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://source.android.com/security/bulletin/pixel/2022-06-01

EPSS

Процентиль: 3%
0.00016
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 3 лет назад

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

CVSS3: 7.8
redhat
больше 3 лет назад

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

CVSS3: 6.4
nvd
больше 3 лет назад

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

CVSS3: 6.4
github
больше 3 лет назад

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

CVSS3: 6.4
fstec
почти 4 года назад

Уязвимость ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 3%
0.00016
Низкий