Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14390

Опубликовано: 18 сент. 2020
Источник: debian

Описание

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.8.10-1package
linuxfixed4.19.146-1busterpackage

Примечания

  • https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489

  • https://www.openwall.com/lists/oss-security/2020/09/15/2

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.7
redhat
около 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.6
nvd
около 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.6
msrc
около 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw privilege escalation cannot be fully ruled out.

github
больше 3 лет назад

A flaw was found in the Linux kernel in versions from 2.2.3 through 5.9.rc5. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. This highest threat from this vulnerability is to system availability.