CVE-2022-20385Improper Validation of Specified Quantity in Input in Google Android

Severity
9.8CRITICALNVD
EPSS
0.2%
top 64.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 13
Latest updateDec 1

Description

a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

3
OSV
CVE-2022-20385: A wlan driver function lacks parameter checks, resulting Out-of-bounds Write issues2022-12-01
GHSA
GHSA-pwg3-f8g7-h57r: a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this cas2022-09-14
OSV
CVE-2022-20385: a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this cas2022-09-01

📋Vendor Advisories

1
Android
CVE-2022-20385: kernel2022-09-01