First published: Mon Nov 09 2020(Updated: )
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.53.1.rt56.1193.el7 | 0:3.10.0-1160.53.1.rt56.1193.el7 |
redhat/kernel | <0:3.10.0-1160.53.1.el7 | 0:3.10.0-1160.53.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/kernel-rt | <0:4.18.0-193.60.2.rt13.112.el8_2 | 0:4.18.0-193.60.2.rt13.112.el8_2 |
redhat/kernel | <0:4.18.0-193.60.2.el8_2 | 0:4.18.0-193.60.2.el8_2 |
redhat/kernel | <5.10 | 5.10 |
Linux Kernel | <=5.9 | |
Linux Kernel | =5.10-rc1 | |
Linux Kernel | =5.10-rc2 | |
Debian GNU/Linux | =9.0 | |
StarWind Command Center | ||
starwindsoftware starwind hyperconverged appliance | ||
starwindsoftware starwind san \& nas | =v8r12 | |
StarWind Virtual SAN | =v8-build14398 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-25704 has a CVSS score that indicates it is a medium severity vulnerability due to the potential for local denial of service.
To fix CVE-2020-25704, update to the appropriate patched versions of the Linux kernel as specified in the affected software documentation.
CVE-2020-25704 affects versions of the Linux kernel prior to the patched versions provided by Red Hat and Debian.
Exploitation of CVE-2020-25704 could lead to resource starvation and cause a denial of service condition for local users on the affected systems.
There are no specific workarounds for CVE-2020-25704, so applying the recommended security updates is essential.