Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9xmm-x36v-779r

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In convertToHidl of convert.cpp, there is a possible out of bounds read due to uninitialized data from ReturnFrameworkMessage. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154867068

In convertToHidl of convert.cpp, there is a possible out of bounds read due to uninitialized data from ReturnFrameworkMessage. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154867068

EPSS

Процентиль: 3%
0.00017
Низкий

Дефекты

CWE-908

Связанные уязвимости

CVSS3: 5.5
nvd
почти 5 лет назад

In convertToHidl of convert.cpp, there is a possible out of bounds read due to uninitialized data from ReturnFrameworkMessage. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154867068

CVSS3: 5.5
fstec
почти 5 лет назад

Уязвимость реализации функции convertToHidl компонента Camera ядра операционных систем Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 3%
0.00017
Низкий

Дефекты

CWE-908