vulnerability
SUSE: CVE-2020-10942: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:M/Au:N/C:N/I:P/A:C) | Mar 24, 2020 | Apr 24, 2020 | Feb 4, 2022 |
Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:P/A:C)
Published
Mar 24, 2020
Added
Apr 24, 2020
Modified
Feb 4, 2022
Description
In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
Solution(s)
suse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-docssuse-upgrade-kernel-obs-build
References
- SUSE-SUSE-SU-2020:1084-1
- SUSE-SUSE-SU-2020:1085-1
- SUSE-SUSE-SU-2020:1087-1
- SUSE-SUSE-SU-2020:1118-1
- SUSE-SUSE-SU-2020:1119-1
- SUSE-SUSE-SU-2020:1123-1
- SUSE-SUSE-SU-2020:1141-1
- SUSE-SUSE-SU-2020:1142-1
- SUSE-SUSE-SU-2020:1146-1
- SUSE-SUSE-SU-2020:1255-1
- SUSE-SUSE-SU-2020:1275-1
- SUSE-SUSE-SU-2020:14354-1
- SUSE-SUSE-SU-2020:1663-1
- UBUNTU-USN-4342-1
- UBUNTU-USN-4344-1
- UBUNTU-USN-4345-1
- UBUNTU-USN-4364-1
- NVD-CVE-2020-10942

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.