Описание
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
Ссылки
- Third Party Advisory
- Mailing ListPatch
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing List
- Third Party Advisory
- Mailing ListPatch
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing List
Уязвимые конфигурации
Одно из
Одно из
EPSS
5.3 Medium
CVSS3
7.8 High
CVSS3
Дефекты
Связанные уязвимости
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
It was discovered that when exec'ing from a non-leader thread armed POSIX CPU timers would be left on a list but freed leading to a use-after-free.
It was discovered that when exec'ing from a non-leader thread, armed P ...
Уязвимость компонента POSIX CPU ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
EPSS
5.3 Medium
CVSS3
7.8 High
CVSS3