kernel is vulnerable to privilege escalation. There is a possible linked list corruption in uvc_scan_chain_forward of uvc_driver.c
due to an unusual root cause which could lead to a local escalation of privileges in the library with no additional execution privileges needed.
lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/
access.redhat.com/errata/RHSA-2022:1988
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1919791
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527
source.android.com/security/bulletin/2020-09-01
www.oracle.com/security-alerts/cpujul2022.html