← Back to CVEs
CVE-2020-14356
HIGH7.8
Description
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published8/19/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelnetapp:active_iq_unified_managernetapp:cloud_backupnetapp:hci_management_nodenetapp:solidfirenetapp:solidfire_baseboard_management_controllernetapp:solidfire_baseboard_management_controller_firmwareopensuse:leapredhat:enterprise_linux
Weaknesses (CWE)
CWE-476
References
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html(secalert@redhat.com)
https://bugzilla.kernel.org/show_bug.cgi?id=208003(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1868453(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html(secalert@redhat.com)
https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20200904-0002/(secalert@redhat.com)
https://usn.ubuntu.com/4483-1/(secalert@redhat.com)
https://usn.ubuntu.com/4484-1/(secalert@redhat.com)
https://usn.ubuntu.com/4526-1/(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.kernel.org/show_bug.cgi?id=208003(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1868453(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html(af854a3a-2127-422b-91ae-364da2661108)
https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200904-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4483-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4484-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4526-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.