In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aa9 | Patch Vendor Advisory |
https://source.android.com/security/bulletin/2018-02-01 | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4187 | |
https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aa9 | Patch Vendor Advisory |
https://source.android.com/security/bulletin/2018-02-01 | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4187 |
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aa9 - Patch, Vendor Advisory | |
References | () https://source.android.com/security/bulletin/2018-02-01 - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187 - |
Information
Published : 2018-04-05 18:29
Updated : 2024-11-21 02:39
NVD link : CVE-2015-9016
Mitre link : CVE-2015-9016
CVE.ORG link : CVE-2015-9016
JSON object : View
Products Affected
- android