{"id":"CVE-2020-14386","details":"A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.","modified":"2026-03-13T00:26:01.136595Z","published":"2020-09-16T13:15:11.083Z","related":["MGASA-2020-0392","SUSE-SU-2020:2574-1","SUSE-SU-2020:2575-1","SUSE-SU-2020:2576-1","SUSE-SU-2020:2577-1","SUSE-SU-2020:2578-1","SUSE-SU-2020:2579-1","SUSE-SU-2020:2580-1","SUSE-SU-2020:2582-1","SUSE-SU-2020:2610-1","SUSE-SU-2020:2623-1","SUSE-SU-2020:2999-1","SUSE-SU-2020:3014-1","SUSE-SU-2020:3180-1","SUSE-SU-2020:3186-1","SUSE-SU-2020:3187-1","SUSE-SU-2020:3190-1","SUSE-SU-2020:3204-1","SUSE-SU-2020:3210-1","SUSE-SU-2020:3225-1","openSUSE-SU-2020:1379-1","openSUSE-SU-2020:1382-1","openSUSE-SU-2020:1655-1","openSUSE-SU-2021:0242-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNCPXERMUHPSGF6S2VVFL5NVVPBBFB63/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/09/17/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/09/17/4"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/09/21/1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14386"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06"},{"type":"FIX","url":"https://seclists.org/oss-sec/2020/q3/146"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.6"},{"fixed":"4.9.239"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.201"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.150"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.64"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.8.8"}]},{"events":[{"introduced":"0"},{"last_affected":"5.9.0-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.9.0-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.9.0-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14386.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}