4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
kernel is vulnerable to denial of service (DoS). The vulnerability exists through a pivot_root
race condition in fs/namespace.c
by corrupting a mountpoint
reference counter.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
www.openwall.com/lists/oss-security/2020/05/04/2
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
access.redhat.com/errata/RHSA-2021:1739
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1848652
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4387-1/
usn.ubuntu.com/4388-1/
usn.ubuntu.com/4389-1/
usn.ubuntu.com/4390-1/
usn.ubuntu.com/4391-1/
usn.ubuntu.com/4392-1/
www.debian.org/security/2020/dsa-4698
www.debian.org/security/2020/dsa-4699
www.oracle.com/security-alerts/cpuApr2021.html
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P