Vulnerabilities > CVE-2020-27825
Attack vector
LOCAL Attack complexity
HIGH Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
NONE Availability impact
HIGH Summary
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
OS | 3 | |
OS | 2 | |
OS | 2 | |
Application | 1 | |
Hardware | 2 |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1905155
- https://bugzilla.redhat.com/show_bug.cgi?id=1905155
- https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
- https://security.netapp.com/advisory/ntap-20210521-0008/
- https://security.netapp.com/advisory/ntap-20210521-0008/
- https://www.debian.org/security/2021/dsa-4843
- https://www.debian.org/security/2021/dsa-4843