[ASB-A-147802478] kernel exploit: struct file UAF with epoll_ctl() add

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Package Affected Version
pkg:generic/android#linux_kernel >= :0, < :2020-12-05
Package Fixed Version
pkg:generic/android#linux_kernel = :2020-12-05
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Fixed pkg:generic/android#linux_kernel android = :2020-12-05
Affected pkg:generic/android#linux_kernel android >= :0 < :2020-12-05
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...