First published: Fri Dec 16 2022(Updated: )
In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.19-1 6.12.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20567 is classified as a local escalation of privilege vulnerability.
To mitigate CVE-2022-20567, ensure your Android system or Debian Linux package is updated to the recommended patched versions.
CVE-2022-20567 affects certain versions of the Android kernel and specific versions of Debian Linux packages.
Exploitation of CVE-2022-20567 could lead to unauthorized local escalation of privileges.
No, user interaction is not needed for the exploitation of CVE-2022-20567.