First published: Wed Jun 03 2020(Updated: )
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/kernel-rt | <0:4.18.0-193.87.1.rt13.137.el8_2 | 0:4.18.0-193.87.1.rt13.137.el8_2 |
redhat/kernel | <0:4.18.0-193.87.1.el8_2 | 0:4.18.0-193.87.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.57.1.rt7.129.el8_4 | 0:4.18.0-305.57.1.rt7.129.el8_4 |
redhat/kernel | <0:4.18.0-305.57.1.el8_4 | 0:4.18.0-305.57.1.el8_4 |
Linux Kernel | >=4.5.5<4.9.228 | |
Linux Kernel | >=4.10<4.14.185 | |
Linux Kernel | >=4.15<4.19.129 | |
Linux Kernel | >=4.20<5.4.48 | |
Linux Kernel | >=5.5<5.7.5 | |
netapp cloud backup | ||
NetApp Element Software | ||
netapp hci management node | ||
netapp solidfire | ||
All of | ||
netapp hci bootstrap os | ||
netapp hci compute node | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
Linux Kernel | <5.7.5 | |
netapp hci bootstrap os | ||
netapp hci compute node | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Android |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-29368 has a medium severity rating due to the potential for unintended write access caused by a race condition.
To fix CVE-2020-29368, upgrade to the kernel versions 4.18.0-348.el8 or newer, or apply the recommended patches.
CVE-2020-29368 affects various versions of the Linux kernel prior to 5.7.5, including specific Red Hat and Debian releases.
CVE-2020-29368 is not inherently exploitable remotely as it requires local access to the affected system for exploitation.
CVE-2020-29368 is associated with the copy-on-write mechanism in the Linux kernel's memory management, specifically in the huge memory handling functions.