Описание
In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel
Ссылки
- Mailing ListPatchThird Party Advisory
- PatchVendor Advisory
- Mailing ListPatchThird Party Advisory
- PatchVendor Advisory
Уязвимые конфигурации
EPSS
6.7 Medium
CVSS3
Дефекты
Связанные уязвимости
In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel
In io_identity_cow of io_uring.c, there is a possible way to corrupt m ...
In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel
Уязвимость подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии
EPSS
6.7 Medium
CVSS3