CVE-2020-27786
moderate-risk
Published 2020-12-11
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Do I need to act?
~
7.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (9)
References (8)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1900933
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210122-0002/
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1900933
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210122-0002/
49
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
10/34 · Low
Exposure
15/34 · Moderate