CVE-2020-10942

CVE Details

Release Date:2020-03-24

Description


In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.

See more information about CVE-2020-10942 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.3 Base Metrics: AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
Access Vector: Local network Attack Complexity: High
Privileges Required: Low User Interaction: None
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: Low Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (kernel-uek)ELSA-2020-56422020-04-08
Oracle Linux version 7 (kernel)ELSA-2020-40602020-10-06
Oracle Linux version 7 (kernel-uek)ELSA-2020-56422020-04-08
Oracle Linux version 7 (kernel-uek)ELSA-2020-56492020-04-13
Oracle Linux version 7 (kernel-uek)ELSA-2020-56632020-04-27
Oracle Linux version 8 (kernel)ELSA-2020-44312020-11-10
Oracle Linux version 8 (kernel-uek)ELSA-2020-56632020-04-27
Oracle VM version 3.4 (kernel-uek)OVMSA-2020-00192020-06-02



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete