Описание
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
EPSS
6.4 Medium
CVSS3
4.4 Medium
CVSS2
Дефекты
Связанные уязвимости
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
In lock_sock_nested of sock.c, there is a possible use after free due ...
Security update for the Linux Kernel (Live Patch 30 for SLE 15)
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP5)
EPSS
6.4 Medium
CVSS3
4.4 Medium
CVSS2