Total
8335 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-20380 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A | |||||
CVE-2022-20379 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A | |||||
CVE-2022-20378 | 1 Google | 1 Android | 2024-11-21 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A | |||||
CVE-2022-20377 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A | |||||
CVE-2022-20376 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In trusty_log_seq_start of trusty-log.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216130110References: N/A | |||||
CVE-2022-20375 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.5 HIGH |
In LteRrcNrProAsnDecode of LteRrcNr_Codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180956894References: N/A | |||||
CVE-2022-20373 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.4 MEDIUM |
In st21nfc_loc_set_polaritymode of fc/st21nfc.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208269510References: N/A | |||||
CVE-2022-20372 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195480799References: N/A | |||||
CVE-2022-20371 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.4 MEDIUM |
In dm_bow_dtr and related functions of dm-bow.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195565510References: Upstream kernel | |||||
CVE-2022-20370 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-215730643References: N/A | |||||
CVE-2022-20369 | 2 Debian, Google | 2 Debian Linux, Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel | |||||
CVE-2022-20368 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel | |||||
CVE-2022-20367 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In construct_transaction of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-225877459References: N/A | |||||
CVE-2022-20366 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In ioctl_dpm_clk_update of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-225877745References: N/A | |||||
CVE-2022-20365 | 1 Google | 1 Android | 2024-11-21 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-229632566References: N/A | |||||
CVE-2022-20364 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In sysmmu_unmap of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233606615References: N/A | |||||
CVE-2022-20362 | 1 Google | 1 Android | 2024-11-21 | N/A | 8.8 HIGH |
In Bluetooth, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230756082 | |||||
CVE-2022-20361 | 1 Google | 1 Android | 2024-11-21 | N/A | 9.8 CRITICAL |
In btif_dm_auth_cmpl_evt of btif_dm.cc, there is a possible vulnerability in Cross-Transport Key Derivation due to Weakness in Bluetooth Standard. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-231161832 | |||||
CVE-2022-20360 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In setChecked of SecureNfcPreferenceController.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228314987 | |||||
CVE-2022-20358 | 1 Google | 1 Android | 2024-11-21 | N/A | 3.3 LOW |
In startSync of AbstractThreadedSyncAdapter.java, there is a possible way to access protected content of content providers due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203229608 |