A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1905155 | Issue Tracking Patch Third Party Advisory |
| https://www.debian.org/security/2021/dsa-4843 | Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20210521-0008/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-12-11 19:15
Updated : 2021-05-21 09:15
NVD link : CVE-2020-27825
Mitre link : CVE-2020-27825
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- enterprise_mrg
linux
- linux_kernel
