CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
21.6%
It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)
Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)
Kiyin (尹亮) discovered that the perf subsystem in the Linux kernel did
not properly deallocate memory in some situations. A privileged attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2020-25704)
Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)
Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)
Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1026-raspi | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-buildinfo-5.4.0-1026-raspi | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-5.4.0-1026-raspi | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1026-raspi-dbgsym | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-modules-5.4.0-1026-raspi | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-headers-5.4.0-1026 | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-tools-5.4.0-1026 | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-tools-5.4.0-1026-raspi | < 5.4.0-1026.29 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1031-kvm | < 5.4.0-1031.32 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1031-kvm-dbgsym | < 5.4.0-1031.32 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
21.6%