Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2r4h-m59f-x4w8

Опубликовано: 16 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A

In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A

EPSS

Процентиль: 2%
0.00012
Низкий

Дефекты

CWE-667

Связанные уязвимости

CVSS3: 4.4
nvd
около 4 лет назад

In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A

EPSS

Процентиль: 2%
0.00012
Низкий

Дефекты

CWE-667