The Common Vulnerabilities and Exposures (CVE) project, maintained by the MITRE Corporation, is a list of all standardized names for vulnerabilities and security exposures.
ID | Description | Priority | Modified date | Fixed Release |
---|---|---|---|---|
CVE-2022-20428 | In (TBD) of (TBD), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555411References: N/A | -- | Nov 18, 2022 | n/a |
CVE-2022-20427 | In (TBD) of (TBD), there is a possible way to corrupt memory due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555070References: N/A | -- | Nov 18, 2022 | n/a |
CVE-2022-20426 | In multiple functions of many files, there is a possible obstruction of the user\'s ability to select a phone account due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-236263294 | -- | Nov 9, 2022 | n/a |
CVE-2022-20425 | In addAutomaticZenRule of ZenModeHelper.java, there is a possible permanent degradation of performance due to resource exhaustion. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235823407 | -- | Oct 13, 2022 | n/a |
CVE-2022-20424 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | -- | Nov 7, 2023 | n/a |
CVE-2022-20423 | In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel | -- | Oct 13, 2022 | n/a |
CVE-2022-20422 | In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel | -- | Oct 13, 2022 | n/a |
CVE-2022-20421 | In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel | -- | Oct 13, 2022 | n/a |
CVE-2022-20420 | In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411 | -- | Oct 13, 2022 | n/a |
CVE-2022-20419 | In setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-237290578 | -- | Oct 13, 2022 | n/a |
CVE-2022-20418 | In pickStartSeq of AAVCAssembler.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-231986464 | -- | Oct 13, 2022 | n/a |
CVE-2022-20417 | In audioTransportsToHal of HidlUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237288416 | -- | Oct 13, 2022 | n/a |
CVE-2022-20416 | In audioTransportsToHal of HidlUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237717857 | -- | Oct 13, 2022 | n/a |
CVE-2022-20415 | In handleFullScreenIntent of StatusBarNotificationActivityStarter.java, there is a possible bypass of the restriction of starting activity from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-231322873 | -- | Oct 13, 2022 | n/a |
CVE-2022-20414 | In setImpl of AlarmManagerService.java, there is a possible way to put a device into a boot loop due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234441463 | -- | Nov 9, 2022 | n/a |
CVE-2022-20413 | In start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235850634 | -- | Oct 13, 2022 | n/a |
CVE-2022-20412 | In fdt_next_tag of fdt.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230794395 | -- | Oct 13, 2022 | n/a |
CVE-2022-20411 | In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771 | -- | Dec 15, 2022 | n/a |
CVE-2022-20410 | In avrc_ctrl_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-205570663 | -- | Oct 13, 2022 | n/a |
CVE-2022-20409 | In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel | -- | Oct 13, 2022 | n/a |
CVE-2022-20408 | Product: AndroidVersions: Android kernelAndroid ID: A-204782372References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20407 | Product: AndroidVersions: Android kernelAndroid ID: A-210916981References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20406 | Product: AndroidVersions: Android kernelAndroid ID: A-184676385References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20405 | Product: AndroidVersions: Android kernelAndroid ID: A-216363416References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20404 | Product: AndroidVersions: Android kernelAndroid ID: A-205714161References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20403 | Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20402 | Product: AndroidVersions: Android kernelAndroid ID: A-218701042References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20401 | In SAEMM_RetrievEPLMNList of SAEMM_ContextManagement.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure post-authentication with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-226446030References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20400 | In cd_CodeMsg of cd_codec.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-225178325References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20399 | In the SEPolicy configuration of system apps, there is a possible access to the \'ip\' utility due to an insecure default value. This could lead to local information disclosure of network data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219808546References: Upstream kernel | -- | Sep 17, 2022 | n/a |
CVE-2022-20398 | In addOrUpdateNetwork of WifiServiceImpl.java, there is a possible way for a guest user to configure Wi-Fi due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221859734 | -- | Sep 13, 2022 | n/a |
CVE-2022-20397 | In SitRilClient_OnResponse of SitRilSe.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223086933References: N/A | -- | Oct 15, 2022 | n/a |
CVE-2022-20396 | In SettingsActivity.java, there is a possible way to make a device discoverable over Bluetooth, without permission or user interaction, due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-234440688 | -- | Sep 17, 2022 | n/a |
CVE-2022-20395 | In checkAccess of MediaProvider.java, there is a possible file deletion due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-221855295 | -- | Sep 17, 2022 | n/a |
CVE-2022-20394 | In getInputMethodWindowVisibleHeight of InputMethodManagerService.java, there is a possible way to determine when another app is showing an IME due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-204906124 | -- | Oct 13, 2022 | n/a |
CVE-2022-20393 | In extract3GPPGlobalDescriptions of TextDescriptions.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure from the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-233735886 | -- | Sep 17, 2022 | n/a |
CVE-2022-20392 | In declareDuplicatePermission of ParsedPermissionUtils.java, there is a possible way to obtain a dangerous permission without user consent due to improper input validation. This could lead to local escalation of privilege during app installation or upgrade with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-213323615 | -- | Sep 17, 2022 | n/a |
CVE-2022-20391 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000 | -- | Sep 16, 2022 | n/a |
CVE-2022-20390 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002 | -- | Sep 16, 2022 | n/a |
CVE-2022-20389 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257004 | -- | Sep 16, 2022 | n/a |
CVE-2022-20388 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323 | -- | Sep 16, 2022 | n/a |
CVE-2022-20387 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324 | -- | Sep 16, 2022 | n/a |
CVE-2022-20386 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328 | -- | Sep 16, 2022 | n/a |
CVE-2022-20385 | a function called \'nla_parse\', do not check the len of para, it will check nla_type (which can be controlled by userspace) with \'maxtype\' (in this case, it is GSCAN_MAX), then it access polciy array \'policy[type]\', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819 | -- | Sep 16, 2022 | n/a |
CVE-2022-20384 | Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20383 | In AllocateInternalBuffers of g3aa_buffer_allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222408847References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20382 | In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel | -- | Aug 13, 2022 | n/a |
CVE-2022-20381 | Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20380 | Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A | -- | Aug 13, 2022 | n/a |
CVE-2022-20379 | In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A | -- | Aug 13, 2022 | n/a |