Google

Android

7895 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitati...

  • EPSS 0.04%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod...

  • EPSS 0.03%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Prod...

  • EPSS 0.03%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitatio...

  • EPSS 0.02%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In Pixel's use of the Catpipe library, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Produ...

  • EPSS 0.03%
  • Veröffentlicht 17.09.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:25

In manifest files of the SmartSpace package, there is a possible tapjacking vector due to a missing permission check. This could lead to local escalation of privilege and account hijacking with no additional execution privileges needed. User interact...

  • EPSS 0.01%
  • Veröffentlicht 17.09.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:27

In the FPC TrustZone fingerprint App, there is a possible invalid command handler due to an exposed test feature. This could lead to local escalation of privilege in the TEE, with System execution privileges required. User interaction is not needed f...

  • EPSS 0.1%
  • Veröffentlicht 17.09.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Andr...

  • EPSS 0.02%
  • Veröffentlicht 17.09.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In CamX code, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android ke...

  • EPSS 0.18%
  • Veröffentlicht 17.09.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 04:53:27

In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not...