A use-after-free vulnerability in sys_ioprio_get() due to get_task_ioprio() accessing the task->io_context without holding the task lock leading to a use-after-free
Reporter | Title | Published | Views | Family All 53 |
---|---|---|---|---|
![]() | CVE-2016-7911 | 1 Nov 201600:00 | β | android |
![]() | CVE-2016-7911 | 16 Nov 201605:59 | β | debiancve |
![]() | CVE-2016-7911 | 16 Nov 201605:59 | β | nvd |
![]() | CVE-2016-7911 | 16 Nov 201600:00 | β | ubuntucve |
![]() | CVE-2016-7911 | 16 Nov 201605:59 | β | cve |
![]() | CVE-2016-7911 | 16 Nov 201604:49 | β | cvelist |
![]() | Race condition | 16 Nov 201605:59 | β | prion |
![]() | Ubuntu: Security Advisory (USN-3206-1) | 22 Feb 201700:00 | β | openvas |
![]() | Ubuntu: Security Advisory (USN-3207-1) | 22 Feb 201700:00 | β | openvas |
![]() | Ubuntu: Security Advisory (USN-3207-2) | 22 Feb 201700:00 | β | openvas |
Source | Link |
---|---|
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo