We found results for “”
CVE-2020-15436
Good to know:
Date: November 23, 2020
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field. After conducting further research, Mend has determined that versions v2.6.12-rc2 through v4.4.228, v4.5-rc1 through v4.9.228, v4.10-rc1 through v4.14.185, v4.15-rc1 through v4.19.129, v5.0-rc1 through v5.4.48, v5.5-rc1 through v5.7.5 and v5.8-rc1 of Linux Kernel are vulnerable to CVE-2020-15436.
Language: C
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Use After Free
CWE-416Top Fix
Upgrade Version
Upgrade to version linux-libc-headers - 5.8;linux-yocto - 4.10+gitAUTOINC+805ea440c7_b259a5d744;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | LOCAL |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | COMPLETE |
| Integrity (I): | COMPLETE |
| Availability (A): | COMPLETE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


