CVE-2020-14381

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex.

Technical Description

A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References