A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1862849 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1862849 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 05:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1862849 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html - Mailing List, Third Party Advisory |
Information
Published : 2020-12-03 17:15
Updated : 2024-11-21 05:03
NVD link : CVE-2020-14351
Mitre link : CVE-2020-14351
CVE.ORG link : CVE-2020-14351
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
redhat
- enterprise_linux
CWE
CWE-416
Use After Free