[PATCH 0/3 v3] [SRU focal/linux-oem-5.6] CVE-2020-0466

Tim Gardner tim.gardner at canonical.com
Thu Mar 4 12:57:32 UTC 2021


[Impact]
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use
after free due to a logic error. This could lead to local escalation of
privilege with no additional execution privileges needed. User interaction is
not needed for exploitation.Product: AndroidVersions: Android kernelAndroid
ID: A-147802478References: Upstream kernel

v3: Use upstream commits rather then stable backports.

[Test Case]
None

[Potential regression]
Clean cherrypicks. All 3 patches have be released in linux-4.14.y, linux-4.19.y, linux-4.4.y,
linux-4.9.y, linux-5.4.y, linux-5.7.y, linux-5.8.y





More information about the kernel-team mailing list