7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
kernel is vulnerable to privilege escalation. A page table upgrade in secondary address mode may lead to privilege escalation.
access.redhat.com/errata/RHSA-2020:2102
access.redhat.com/security/updates/classification/#important
git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=215d1f3928713d6eaec67244bcda72105b898000
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
lists.fedoraproject.org/archives/list/[email protected]/message/3TZBP2HINNAX7HKHCOUMIFVQPV6GWMCZ/
lists.fedoraproject.org/archives/list/[email protected]/message/AQUVKC3IPUC5B374VVAZV4J5P3GAUGSW/
lists.fedoraproject.org/archives/list/[email protected]/message/ZKVJMS4GQRH5SO35WM5GINCFAGXQ3ZW6/
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4342-1/
usn.ubuntu.com/4343-1/
usn.ubuntu.com/4345-1/
www.debian.org/security/2020/dsa-4667
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C