oss-sec mailing list archives
CVE-2020-27825 kernel: use-after-free in the ftrace ring buffer resizing logic due to a race condition
From: Rohit Keshri <rkeshri () redhat com>
Date: Fri, 11 Dec 2020 11:21:40 +0530
Hello Team, Red Hat has identified a vulnerability with the following details. A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat. 'CVE-2020-27825' was assigned by Red Hat. Acknowledgements: Adam 'pi3' Zabrocki Thank you Adam for bringing this to our attention, and your hard work. Reference: https://github.com/torvalds/linux/commit/bbeb97464eefc65f506084fd9f18f21653e01137#diff-446a57a3a8781d7d3fb410eb7162dd2002dd363bf1ea936c4fd10397660033e0 Thank You. Regards .. Rohit Keshri / Red Hat Product Security Team PGP: OX01BC 858A 07B7 15C8 EF33 BFE2 2EEB 0CBC 84A4 4C2D secalert () redhat com for urgent response
Current thread:
- CVE-2020-27825 kernel: use-after-free in the ftrace ring buffer resizing logic due to a race condition Rohit Keshri (Dec 11)