5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
Linux kernel is vulnerable to authorization bypass attacks. This exists in the tmpfs and hugetlbfs files. An attacker is able to bypass file permissions on filesystems mounted with tmpfs/hugetlbs to modify a file and possibly disrupt normal system behavior.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
access.redhat.com/errata/RHBA-2019:0327
access.redhat.com/errata/RHSA-2019:0163
access.redhat.com/errata/RHSA-2019:0202
access.redhat.com/errata/RHSA-2019:0324
access.redhat.com/errata/RHSA-2019:0831
access.redhat.com/security/updates/classification/#moderate
bugs.chromium.org/p/project-zero/issues/detail?id=1700
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
usn.ubuntu.com/3901-1/
usn.ubuntu.com/3901-2/
usn.ubuntu.com/3903-1/
usn.ubuntu.com/3903-2/
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N