mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
2.2 KiB
2.2 KiB
CVE-2022-20186
Description
In kbase_mem_alias of mali_kbase_mem_linux.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-215001024References: N/A
POC
Reference
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Bariskizilkaya/CVE-2022-20186_CTXZ
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NetKingJ/awesome-android-security
- https://github.com/SYRTI/POC_to_review
- https://github.com/SmileTabLabo/CVE-2022-20186_CTXZ
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/manas3c/CVE-POC
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/s1204-inspect/CVE-2022-20186_CTXZ
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve