7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
kernel is vulneralbe to denial of service (DoS). The vulnerability exists as TLB flush happens too late on mremap.
packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
www.openwall.com/lists/oss-security/2018/10/29/5
www.securityfocus.com/bid/105761
www.securityfocus.com/bid/106503
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:0831
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/errata/RHSA-2020:0036
access.redhat.com/errata/RHSA-2020:0100
access.redhat.com/errata/RHSA-2020:0103
access.redhat.com/errata/RHSA-2020:0179
access.redhat.com/security/updates/classification/#important
bugs.chromium.org/p/project-zero/issues/detail?id=1695
bugzilla.redhat.com/show_bug.cgi?id=1335986
bugzilla.redhat.com/show_bug.cgi?id=1436351
bugzilla.redhat.com/show_bug.cgi?id=1537033
bugzilla.redhat.com/show_bug.cgi?id=1552203
bugzilla.redhat.com/show_bug.cgi?id=1577640
bugzilla.redhat.com/show_bug.cgi?id=1590228
bugzilla.redhat.com/show_bug.cgi?id=1593417
bugzilla.redhat.com/show_bug.cgi?id=1608955
bugzilla.redhat.com/show_bug.cgi?id=1609699
bugzilla.redhat.com/show_bug.cgi?id=1613056
bugzilla.redhat.com/show_bug.cgi?id=1616109
bugzilla.redhat.com/show_bug.cgi?id=1616425
bugzilla.redhat.com/show_bug.cgi?id=1622167
bugzilla.redhat.com/show_bug.cgi?id=1627563
bugzilla.redhat.com/show_bug.cgi?id=1628378
bugzilla.redhat.com/show_bug.cgi?id=1659146
bugzilla.redhat.com/show_bug.cgi?id=1665990
bugzilla.redhat.com/show_bug.cgi?id=1684780
bugzilla.redhat.com/show_bug.cgi?id=1693457
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
lists.debian.org/debian-lts-announce/2019/03/msg00017.html
lists.debian.org/debian-lts-announce/2019/03/msg00034.html
lists.debian.org/debian-lts-announce/2019/04/msg00004.html
usn.ubuntu.com/3832-1/
usn.ubuntu.com/3835-1/
usn.ubuntu.com/3871-1/
usn.ubuntu.com/3871-3/
usn.ubuntu.com/3871-4/
usn.ubuntu.com/3871-5/
usn.ubuntu.com/3880-1/
usn.ubuntu.com/3880-2/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P