In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2022-12-16T00:00:00
Updated: 2024-08-03T02:17:52.907Z
Reserved: 2021-10-14T00:00:00
Link: CVE-2022-20572
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2022-12-16T16:15:19.720
Modified: 2023-08-08T14:21:49.707
Link: CVE-2022-20572
Redhat