Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-39656

Опубликовано: 15 дек. 2021
Источник: debian
EPSS Низкий

Описание

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.24-1package
linuxfixed4.19.181-1busterpackage
linuxfixed4.9.272-1stretchpackage

Примечания

  • https://source.android.com/security/bulletin/pixel/2021-12-01

  • https://git.kernel.org/linus/14fbbc8297728e880070f7b077b3301a8c698ef9 (5.12-rc3)

EPSS

Процентиль: 2%
0.00015
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 4 лет назад

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel

CVSS3: 6.7
nvd
около 4 лет назад

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel

github
около 4 лет назад

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel

EPSS

Процентиль: 2%
0.00015
Низкий