Total vulnerabilities in the database
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
Software | From | Fixed in |
---|---|---|
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_server_tus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_eus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.6 | 7.6.x |
linux / linux_kernel | 3.19 | 4.1.46 |
linux / linux_kernel | 4.5 | 4.9.55 |
linux / linux_kernel | 4.10 | 4.13.6 |
linux / linux_kernel | - | 3.10.108 |
linux / linux_kernel | 3.11 | 3.16.58 |
linux / linux_kernel | 3.17 | 3.18.77 |
linux / linux_kernel | 4.2 | 4.4.94 |