Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hr7x-98jp-wfjc

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

EPSS

Процентиль: 9%
0.00034
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 7.8
redhat
больше 6 лет назад

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 7.8
nvd
больше 6 лет назад

In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 7.8
debian
больше 6 лет назад

In the Android kernel in the kernel MMU code there is a possible execu ...

EPSS

Процентиль: 9%
0.00034
Низкий