Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-20153

Опубликовано: 15 июн. 2022
Источник: debian

Описание

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.14.6-1package
linuxfixed5.10.113-1bullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://source.android.com/security/bulletin/pixel/2022-06-01

  • https://git.kernel.org/linus/f70865db5ff35f5ed0c7e9ef63e7cca3d4947f04 (5.13-rc1)

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 3 лет назад

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel

CVSS3: 6.7
redhat
почти 4 года назад

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel

CVSS3: 6.7
nvd
больше 3 лет назад

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel

CVSS3: 6.7
github
больше 3 лет назад

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel

CVSS3: 6.7
fstec
почти 5 лет назад

Уязвимость функции rcu_cblist_dequeue в модуле rcu_segcblist.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии