vulnerability
CentOS Linux: CVE-2020-0466: Important: kernel-rt security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2020-12-14 | 2021-04-08 | 2023-05-25 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2020-12-14
Added
2021-04-08
Modified
2023-05-25
Description
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
Solution(s)
centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160_21_1centos-upgrade-kpatch-patch-3_10_0-1160_21_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_24_1centos-upgrade-kpatch-patch-3_10_0-1160_24_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_25_1centos-upgrade-kpatch-patch-3_10_0-1160_25_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_31_1centos-upgrade-kpatch-patch-3_10_0-1160_31_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_36_2centos-upgrade-kpatch-patch-3_10_0-1160_36_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_41_1centos-upgrade-kpatch-patch-3_10_0-1160_41_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_42_2centos-upgrade-kpatch-patch-3_10_0-1160_42_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_45_1centos-upgrade-kpatch-patch-3_10_0-1160_45_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_49_1centos-upgrade-kpatch-patch-3_10_0-1160_49_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_53_1centos-upgrade-kpatch-patch-3_10_0-1160_53_1-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.