Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14381

Опубликовано: 03 дек. 2020
Источник: debian

Описание

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.5.13-1package
linuxfixed4.19.118-1busterpackage
linuxfixed4.9.228-1stretchpackage

Примечания

  • https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 6.7
redhat
около 5 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.8
nvd
больше 4 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.8
msrc
больше 4 лет назад

Описание отсутствует

github
около 3 лет назад

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.