CVE-2020-14386

Name
CVE-2020-14386
Description
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://seclists.org/oss-sec/2020/q3/146
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386
Patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNCPXERMUHPSGF6S2VVFL5NVVPBBFB63/
MLIST https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
MISC http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
MLIST https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
MLIST https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
MLIST http://www.openwall.com/lists/oss-security/2021/09/17/2
MLIST http://www.openwall.com/lists/oss-security/2021/09/17/4
MLIST http://www.openwall.com/lists/oss-security/2021/09/21/1

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* linux_kernel >= None < 5.9.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status