Trinadh465 / linux-4.19.72_CVE-2020-15436

Other
0 stars 0 forks source link

CVE-2020-14351 (High) detected in linuxlinux-4.19.292 - autoclosed #409

Closed mend-bolt-for-github[bot] closed 6 months ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2020-14351 - High Severity Vulnerability

Vulnerable Library - linuxlinux-4.19.292

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in HEAD commit: 79f1f426ddbd9f9d5b8620a590e7f2364d5e4786

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Publish Date: 2020-12-03

URL: CVE-2020-14351

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1862849

Release Date: 2020-12-03

Fix Resolution: 4.14.207,4.19.158,4.4.244,4.9.244,5.4.78,5.8.17,5.9.2


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 7 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.