CVE-2022-20385 — Improper Validation of Specified Quantity in Input in Google Android
Severity
9.8CRITICALNVD
EPSS
0.2%
top 64.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 13
Latest updateDec 1
Description
a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
3OSV▶
CVE-2022-20385: A wlan driver function lacks parameter checks, resulting Out-of-bounds Write issues↗2022-12-01
GHSA▶
GHSA-pwg3-f8g7-h57r: a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this cas↗2022-09-14
OSV▶
CVE-2022-20385: a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this cas↗2022-09-01