Vulnerability Details : CVE-2019-2182
In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published
2019-09-06 22:15:12
Updated
2020-08-24 17:37:01
Products affected by CVE-2019-2182
- cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-2182
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-2182
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2019-2182
-
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
[SECURITY] [DLA 2242-1] linux-4.9 security update
-
https://www.debian.org/security/2020/dsa-4698
Debian -- Security Information -- DSA-4698-1 linux
-
https://source.android.com/security/bulletin/pixel/2019-09-01
Pixel Update Bulletin—September 2019 | Android Open Source ProjectVendor Advisory
Jump to