Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wxxf-gxv9-5j54

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

EPSS

Процентиль: 59%
0.00386
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
около 6 лет назад

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

EPSS

Процентиль: 59%
0.00386
Низкий