CVE-2020-27825Race Condition in Kernel

Severity
5.7MEDIUMNVD
EPSS
0.1%
top 66.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 11
Latest updateMay 24

Description

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:HExploitability: 0.5 | Impact: 5.2

Affected Packages4 packages

Debianlinux/linux_kernel< 5.9.6-1+3
CVEListV5linux/linux_kernelbefore kernel 5.10-rc1

Also affects: Debian Linux 10.0, 9.0, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-wx9f-x53v-pqrr: A use-after-free flaw was found in kernel/trace/ring_buffer2022-05-24
CVEList
CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer2020-12-11
OSV
CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer2020-12-11

📋Vendor Advisories

2
Red Hat
kernel: use-after-free in the ftrace ring buffer resizing logic due to a race condition2020-10-06
Debian
CVE-2020-27825: linux - A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (b...2020
CVE-2020-27825 — Race Condition in Linux Kernel | cvebase