Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14381

Опубликовано: 03 дек. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.5.13-1package
linuxfixed4.19.118-1busterpackage
linuxfixed4.9.228-1stretchpackage

Примечания

  • https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254

EPSS

Процентиль: 70%
0.00644
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 6.7
redhat
больше 5 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.8
nvd
почти 5 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.8
msrc
почти 5 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality integrity as well as system availability.

github
больше 3 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

EPSS

Процентиль: 70%
0.00644
Низкий