cvelist/2022/20xxx/CVE-2022-20203.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2021-10-14 23:01:12 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-20203",
2022-06-15 22:01:55 +00:00
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android-12L"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/android-12l",
"url": "https://source.android.com/security/bulletin/android-12l"
}
]
2021-10-14 23:01:12 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-06-16 00:02:08 +00:00
"value": "In multiple locations of the nanopb library, there is a possible way to corrupt memory when decoding untrusted protobuf files. This could lead to local escalation of privilege,with no additional execution privileges needed. User interaction is not needed for exploitation."
2021-10-14 23:01:12 +00:00
}
]
}
}