CVE-2020-29374
Published on: 11/28/2020 12:00:00 AM UTC
Last Modified on: 04/19/2022 03:41:00 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
- CVE-2020-29374 has been assigned by
[email protected] to track the vulnerability - currently rated as LOW severity.
CVSS3 Score: 3.6 - LOW
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | HIGH | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | LOW | LOW | NONE |
CVSS2 Score: 3.3 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
CVE-2020-29374 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
[SECURITY] [DLA 2941-1] linux-4.19 security update | lists.debian.org text/html |
![]() |
[SECURITY] [DLA 2689-1] linux security update | lists.debian.org text/html |
![]() |
Kernel Live Patch Security Notice LSN-0075-1 ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
2045 - project-zero - Project Zero - Monorail | Exploit Issue Tracking Third Party Advisory bugs.chromium.org text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | Patch Vendor Advisory git.kernel.org text/html |
![]() |
[SECURITY] [DLA 2690-1] linux-4.19 security update | lists.debian.org text/html |
![]() |
Debian -- Security Information -- DSA-5096-1 linux | www.debian.org Depreciated Link text/html |
![]() |
Release Notes Third Party Advisory Vendor Advisory cdn.kernel.org text/plain |
![]() |
Related QID Numbers
- 174764 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0738-1)
- 174768 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0735-1)
- 174770 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0741-1)
- 174772 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0737-1)
- 174774 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0740-1)
- 174897 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1175-1)
- 174916 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1210-1)
- 178679 Debian Security Update for linux-4.19 (DLA 2690-1)
- 178680 Debian Security Update for linux (DLA 2689-1)
- 179117 Debian Security Update for linux (DSA 5096-1)
- 179119 Debian Security Update for linux-4.19 (DLA 2941-1)
- 352366 Amazon Linux Security Advisory for kernel: ALAS-2021-1503
- 352375 Amazon Linux Security Advisory for kernel: ALAS2-2021-1636
- 353242 Amazon Linux Security Advisory for kernel : ALAC2012-2022-036
- 353243 Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2022-037
- 353244 Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2022-038
- 750324 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0393-1)
- 900040 CBL-Mariner Linux Security Update for kernel 5.4.91
- 903215 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3623)
- 906126 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3623-1)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 10.0 | All | All | All |
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Linux | Linux Kernel | All | All | All | All |
Operating System | Linux | Linux Kernel | All | All | All | All |
Hardware
| Netapp | Baseboard Management Controller 500f | - | All | All | All |
Operating System | Netapp | Baseboard Management Controller 500f Firmware | - | All | All | All |
Hardware
| Netapp | Baseboard Management Controller A250 | - | All | All | All |
Operating System | Netapp | Baseboard Management Controller A250 Firmware | - | All | All | All |
Hardware
| Netapp | Baseboard Management Controller H410c | - | All | All | All |
Operating System | Netapp | Baseboard Management Controller H410c Firmware | - | All | All | All |
Operating System | Netapp | Hci Compute Node Bios | - | All | All | All |
Application | Netapp | Solidfire Hci Management Node | - | All | All | All |
Application | Netapp | Solidfire Hci Storage Node | - | All | All | All |
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:baseboard_management_controller_500f:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:baseboard_management_controller_500f_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:baseboard_management_controller_a250:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:baseboard_management_controller_a250_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:baseboard_management_controller_h410c:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:baseboard_management_controller_h410c_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-07-07 13:16:31 |