4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
kernel is vulnerable to arbitrary code execution. The vulnerability exists through an ASLR bypass for setuid binaries due to late install_exec_creds().
www.openwall.com/lists/oss-security/2019/04/15/1
www.securityfocus.com/bid/107890
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
access.redhat.com/errata/RHSA-2020:1070
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1550584
bugzilla.redhat.com/show_bug.cgi?id=1690543
bugzilla.redhat.com/show_bug.cgi?id=1696087
bugzilla.redhat.com/show_bug.cgi?id=1699438
bugzilla.redhat.com/show_bug.cgi?id=1708718
bugzilla.redhat.com/show_bug.cgi?id=1741775
bugzilla.redhat.com/show_bug.cgi?id=1751083
bugzilla.redhat.com/show_bug.cgi?id=1772894
git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d
git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff
lists.debian.org/debian-lts-announce/2019/05/msg00041.html
lists.debian.org/debian-lts-announce/2019/05/msg00042.html
usn.ubuntu.com/4008-1/
usn.ubuntu.com/4008-2/
usn.ubuntu.com/4008-3/
www.openwall.com/lists/oss-security/2019/04/03/4
www.openwall.com/lists/oss-security/2019/04/03/4/1
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N