7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.7 High
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0005 Low
EPSS
Percentile
15.8%
Hadar Manor discovered that the DCCP protocol implementation in the Linux
kernel improperly handled socket reuse, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Jay Shin discovered that the ext4 file system implementation in the Linux
kernel did not properly handle directory access with broken indexing,
leading to an out-of-bounds read vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2020-14314)
David Alan Gilbert discovered that the XFS file system implementation in
the Linux kernel did not properly perform metadata validation in some
circumstances. A local attacker could use this to cause a denial of
service. (CVE-2020-14385)
Giuseppe Scrivano discovered that the overlay file system in the Linux
kernel did not properly perform permission checks in some situations. A
local attacker could possibly use this to bypass intended restrictions and
gain read access to restricted files. (CVE-2020-16120)
It was discovered that a race condition existed in the hugetlb sysctl
implementation in the Linux kernel. A privileged attacker could use this to
cause a denial of service (system crash). (CVE-2020-25285)
It was discovered that the block layer subsystem in the Linux kernel did
not properly handle zero-length requests. A local attacker could use this
to cause a denial of service. (CVE-2020-25641)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1021-raspi | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-buildinfo-5.4.0-1021-raspi | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-5.4.0-1021-raspi | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1021-raspi-dbgsym | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-modules-5.4.0-1021-raspi | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-headers-5.4.0-1021 | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-tools-5.4.0-1021 | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-tools-5.4.0-1021-raspi | < 5.4.0-1021.24 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1026-kvm | < 5.4.0-1026.27 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1026-kvm-dbgsym | < 5.4.0-1026.27 | UNKNOWN |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.7 High
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0005 Low
EPSS
Percentile
15.8%