First published: Fri Dec 16 2022(Updated: )
In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20572 has a critical severity level as it allows local escalation of privilege due to a missing permission check.
To fix CVE-2022-20572, you should update your Android device or Linux package to the latest version that addresses the vulnerability.
CVE-2022-20572 affects certain versions of Android and specific Linux kernel packages on Debian.
No, user interaction is not needed to exploit CVE-2022-20572 as it can be exploited locally.
The potential impact of CVE-2022-20572 includes unauthorized modification of read-only files leading to privilege escalation.