4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
Linux kernel is vulnerable to use-after-free attacks. The vulnerability exists through inconsistency of drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c. An attacker could use this flaw to crash the system.
packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
www.openwall.com/lists/oss-security/2020/12/10/1
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
access.redhat.com/errata/RHSA-2021:4356
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1906522
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
lists.debian.org/debian-lts-announce/2021/02/msg00018.html
lists.debian.org/debian-lts-announce/2021/03/msg00010.html
lists.fedoraproject.org/archives/list/[email protected]/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
lists.fedoraproject.org/archives/list/[email protected]/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
security.netapp.com/advisory/ntap-20210122-0001/
www.debian.org/security/2021/dsa-4843
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N