Описание
The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-20509
- https://github.com/Yellow-Pay/CVE/blob/master/CVE-2018-20509.md
- https://security.netapp.com/advisory/ntap-20190517-0002
- https://www.mail-archive.com/debian-security-tracker%40lists.debian.org/msg03902.html
- https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03902.html
Связанные уязвимости
The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.
The print_binder_ref_olocked function in drivers/android/binder.c in t ...