Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14390

Опубликовано: 18 сент. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.8.10-1package
linuxfixed4.19.146-1busterpackage

Примечания

  • https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489

  • https://www.openwall.com/lists/oss-security/2020/09/15/2

EPSS

Процентиль: 6%
0.00026
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.7
redhat
почти 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.6
nvd
почти 5 лет назад

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.

CVSS3: 5.6
msrc
больше 4 лет назад

Описание отсутствует

github
около 3 лет назад

A flaw was found in the Linux kernel in versions from 2.2.3 through 5.9.rc5. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. This highest threat from this vulnerability is to system availability.

EPSS

Процентиль: 6%
0.00026
Низкий