APPLIED: [PATCH 0/3 v3] [SRU focal/linux-oem-5.6] CVE-2020-0466
Tim Gardner
tim.gardner at canonical.com
Fri Mar 19 16:48:01 UTC 2021
Applied to focal/linux-oem-5.6-next. Thanks.
Also noted that the patches needed the CVE numbers.
-rtg
On 3/4/21 5:57 AM, Tim Gardner wrote:
> [Impact]
> In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use
> after free due to a logic error. This could lead to local escalation of
> privilege with no additional execution privileges needed. User interaction is
> not needed for exploitation.Product: AndroidVersions: Android kernelAndroid
> ID: A-147802478References: Upstream kernel
>
> v3: Use upstream commits rather then stable backports.
>
> [Test Case]
> None
>
> [Potential regression]
> Clean cherrypicks. All 3 patches have be released in linux-4.14.y, linux-4.19.y, linux-4.4.y,
> linux-4.9.y, linux-5.4.y, linux-5.7.y, linux-5.8.y
>
>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list