CVE-2022-20109

In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:42

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/May-2022 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/May-2022 - Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-416 NVD-CWE-Other

Information

Published : 2022-05-03 20:15

Updated : 2024-11-21 06:42


NVD link : CVE-2022-20109

Mitre link : CVE-2022-20109

CVE.ORG link : CVE-2022-20109


JSON object : View

Products Affected

mediatek

  • mt8786
  • mt8696
  • mt6757c
  • mt6761
  • mt8791
  • mt8666
  • mt8173
  • mt8675
  • mt6757ch
  • mt8167
  • mt8788
  • mt6737
  • mt6750s
  • mt6877
  • mt8365
  • mt6762
  • mt6768
  • mt6781
  • mt8695
  • mt8321
  • mt8766
  • mt6883
  • mt6757cd
  • mt6853
  • mt6797
  • mt8768
  • mt6889
  • mt6833
  • mt8789
  • mt6753
  • mt6769
  • mt6580
  • mt8385
  • mt6893
  • mt6763
  • mt6757
  • mt6785
  • mt8362a
  • mt6735
  • mt6873
  • mt6739
  • mt6853t
  • mt6771
  • mt6885
  • mt8185
  • mt6875
  • mt8168
  • mt6779
  • mt8797
  • mt6765
  • mt8765
  • mt6750

google

  • android