[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-27825Date: (C)2020-12-14   (M)2024-05-06


A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.7CVSS Score : 5.4
Exploit Score: 0.5Exploit Score: 3.4
Impact Score: 5.2Impact Score: 7.8
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: HIGHAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
DSA-4843
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://bugzilla.redhat.com/show_bug.cgi?id=1905155
https://security.netapp.com/advisory/ntap-20210521-0008/

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/o:redhat:enterprise_linux:7.0
CWE    1
CWE-362
OVAL    14
oval:org.secpod.oval:def:89002775
oval:org.secpod.oval:def:89002777
oval:org.secpod.oval:def:89002808
oval:org.secpod.oval:def:89002761
...

© SecPod Technologies