Количество 6
Количество 6
CVE-2022-20421
In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
CVE-2022-20421
In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
CVE-2022-20421
In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
CVE-2022-20421
In binder_inc_ref_for_node of binder.c, there is a possible way to cor ...
GHSA-gwp4-2h57-rrxw
In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
BDU:2023-00455
Уязвимость функции binder_inc_ref_for_node() (binder.c) системы межпроцессной коммуникации ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-20421 In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад | |
CVE-2022-20421 In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel | CVSS3: 6.6 | 6% Низкий | больше 3 лет назад | |
CVE-2022-20421 In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад | |
CVE-2022-20421 In binder_inc_ref_for_node of binder.c, there is a possible way to cor ... | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад | |
GHSA-gwp4-2h57-rrxw In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад | |
BDU:2023-00455 Уязвимость функции binder_inc_ref_for_node() (binder.c) системы межпроцессной коммуникации ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 6% Низкий | больше 3 лет назад |
Уязвимостей на страницу