5.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
Linux kernel is vulnerable to denial of service. A local user is able to crash the kernel due to multiple race conditions in the ext4
filesystem implementation, by writing to a page that is associated with a different userβs file after unsynchronized hole punching and page-fault handling.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b
www.openwall.com/lists/oss-security/2016/04/01/4
www.securityfocus.com/bid/85798
www.securitytracker.com/id/1035455
www.ubuntu.com/usn/USN-3005-1
www.ubuntu.com/usn/USN-3006-1
www.ubuntu.com/usn/USN-3007-1
access.redhat.com/articles/3173821
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/security/cve/CVE-2017-5551
access.redhat.com/security/cve/CVE-2017-7495
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1323577
bugzilla.redhat.com/show_bug.cgi?id=1479016
github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
5.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P