Filtered by vendor Google Subscriptions
Filtered by product Android Subscriptions
Total 8699 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-20172 1 Google 1 Android 2024-11-21 5.5 Medium
In onbind of ShannonRcsService.java, there is a possible access to protect data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206987222References: N/A
CVE-2022-20171 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A
CVE-2022-20170 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A
CVE-2022-20169 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-211162353References: N/A
CVE-2022-20168 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-210594998References: N/A
CVE-2022-20167 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A
CVE-2022-20166 2 Google, Redhat 2 Android, Enterprise Linux 2024-11-21 6.7 Medium
In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel
CVE-2022-20165 1 Google 1 Android 2024-11-21 4.4 Medium
In asn1_parse of asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220868345References: N/A
CVE-2022-20164 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-204891956References: N/A
CVE-2022-20162 1 Google 1 Android 2024-11-21 4.4 Medium
In asn1_p256_int of crypto/asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223492713References: N/A
CVE-2022-20160 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-210083655References: N/A
CVE-2022-20159 1 Google 1 Android 2024-11-21 4.4 Medium
In asn1_ec_pkey_parse of acropora/crypto/asn1_common.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210971465References: N/A
CVE-2022-20158 1 Google 1 Android 2024-11-21 6.7 Medium
In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel
CVE-2022-20156 1 Google 1 Android 2024-11-21 7.8 High
In unflatten of GraphicBuffer.cpp, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212803946References: N/A
CVE-2022-20155 1 Google 1 Android 2024-11-21 7.0 High
In ipu_core_jqs_msg_transport_kernel_write_sync of ipu-core-jqs-msg-transport.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176754369References: N/A
CVE-2022-20154 1 Google 1 Android 2024-11-21 6.4 Medium
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
CVE-2022-20153 1 Google 1 Android 2024-11-21 6.7 Medium
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
CVE-2022-20152 1 Google 1 Android 2024-11-21 6.7 Medium
In the TitanM chip, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-202006198References: N/A
CVE-2022-20151 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-210712565References: N/A
CVE-2022-20149 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-211685939References: N/A