CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
20.9%
An information disclosure vulnerability exists in the /proc/pid/syscall
functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically,
this issue has been introduced in v5.1-rc4 (commit
631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in
v5.10-rc4, so itβs likely that all versions in between are affected. An
attacker can read /proc/pid/syscall to trigger this vulnerability, which
leads to the kernel leaking memory contents.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | <Β 5.4.0-66.74 | UNKNOWN |
ubuntu | 20.10 | noarch | linux | <Β 5.8.0-44.50 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | <Β 5.4.0-1038.40 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | <Β 5.8.0-1024.26 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | <Β 5.4.0-1038.40~18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | <Β 5.4.0-1040.42 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-azure | <Β 5.8.0-1023.25 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | <Β 5.4.0-1040.42~18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-fde | <Β 5.4.0-1040.42 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | <Β 5.4.0-1011.14 | UNKNOWN |
git.kernel.org/linus/4f134b89a24b965991e7c345b9a4591821f7c2a6
launchpad.net/bugs/cve/CVE-2020-28588
nvd.nist.gov/vuln/detail/CVE-2020-28588
security-tracker.debian.org/tracker/CVE-2020-28588
talosintelligence.com/vulnerability_reports/TALOS-2020-1211
ubuntu.com/security/notices/USN-4750-1
ubuntu.com/security/notices/USN-4751-1
ubuntu.com/security/notices/USN-4752-1
www.cve.org/CVERecord?id=CVE-2020-28588
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
20.9%