Количество 6
Количество 6
CVE-2022-20153
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
CVE-2022-20153
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
CVE-2022-20153
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
CVE-2022-20153
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-afte ...
GHSA-v8wc-wjww-427g
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
BDU:2024-04165
Уязвимость функции rcu_cblist_dequeue в модуле rcu_segcblist.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-20153 In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-20153 In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel | CVSS3: 6.7 | 0% Низкий | почти 4 года назад | |
CVE-2022-20153 In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-20153 In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-afte ... | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
GHSA-v8wc-wjww-427g In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel | CVSS3: 6.7 | 0% Низкий | больше 3 лет назад | |
BDU:2024-04165 Уязвимость функции rcu_cblist_dequeue в модуле rcu_segcblist.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 6.7 | 0% Низкий | почти 5 лет назад |
Уязвимостей на страницу