Vulnerability Description
In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aaPatchVendor Advisory
- https://source.android.com/security/bulletin/2018-02-01PatchVendor Advisory
- https://www.debian.org/security/2018/dsa-4187
- https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aaPatchVendor Advisory
- https://source.android.com/security/bulletin/2018-02-01PatchVendor Advisory
- https://www.debian.org/security/2018/dsa-4187
FAQ
What is CVE-2015-9016?
CVE-2015-9016 is a vulnerability with a CVSS score of 7.0 (HIGH). In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead ...
How severe is CVE-2015-9016?
CVE-2015-9016 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-9016?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.