In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-03-24 15:15
Updated : 2022-04-22 12:06
NVD link : CVE-2020-10942
Mitre link : CVE-2020-10942
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
linux
- linux_kernel
opensuse
- leap