Количество 8
Количество 8
GHSA-r535-rfwp-fm57
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel

CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel

CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel

CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel
CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corru ...

BDU:2021-05539
Уязвимость реализации функции epoll_loop_check_proc() ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии
ELSA-2022-9014
ELSA-2022-9014: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9088
ELSA-2022-9088: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-r535-rfwp-fm57 In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад | |
![]() | CVE-2021-1048 In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2021-1048 In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel | CVSS3: 7.8 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-1048 In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад |
CVE-2021-1048 In ep_loop_check_proc of eventpoll.c, there is a possible way to corru ... | CVSS3: 7.8 | 1% Низкий | больше 3 лет назад | |
![]() | BDU:2021-05539 Уязвимость реализации функции epoll_loop_check_proc() ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 1% Низкий | почти 5 лет назад |
ELSA-2022-9014 ELSA-2022-9014: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9088 ELSA-2022-9088: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу