First published: Mon Dec 07 2020(Updated: )
A flaw was found in the Linux Kernel. A use-after-free vulnerability was discovered in the ftrace ring buffer resizing logic due to a race condition. Reference and upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbeb97464eefc65f506084fd9f18f21653e01137">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbeb97464eefc65f506084fd9f18f21653e01137</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10 | 5.10 |
Linux Linux kernel | =5.10-rc1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Mrg | =2.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Netapp Cloud Backup | ||
Netapp Solidfire Baseboard Management Controller Firmware | ||
Netapp Solidfire Baseboard Management Controller | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.66-1 6.1.69-1 6.5.13-1 6.6.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27825 is a use-after-free flaw found in kernel/trace/ring_buffer.c in the Linux kernel (before 5.10-rc1).
CVE-2020-27825 can cause a denial of service (DOS) and may allow a local attacker to execute arbitrary code.
CVE-2020-27825 occurs due to a race condition in trace_open and resize of cpu buffer running simultaneously on different CPUs.
Versions before 5.10-rc1 of the Linux kernel are affected by CVE-2020-27825.
To fix CVE-2020-27825, update your Linux kernel to version 5.10-rc1 or later.