Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-20409

Опубликовано: 11 окт. 2022
Источник: debian
EPSS Низкий

Описание

In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.14.6-1package
linuxfixed5.10.136-1bullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://source.android.com/docs/security/bulletin/2022-10-01

  • https://android.googlesource.com/kernel/common/+/0380da7fd63ac93caf96a75d1b31e388d3c754e9

EPSS

Процентиль: 90%
0.05613
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 3 лет назад

In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel

CVSS3: 6.7
nvd
больше 3 лет назад

In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel

CVSS3: 6.7
github
больше 3 лет назад

In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel

CVSS3: 6.7
fstec
почти 5 лет назад

Уязвимость подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии

EPSS

Процентиль: 90%
0.05613
Низкий