First published: Tue Jan 14 2020(Updated: )
A use-after-free flaw was found in the Linux kernel’s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.21.1.rt56.1158.el7 | 0:3.10.0-1160.21.1.rt56.1158.el7 |
redhat/kernel | <0:3.10.0-1160.21.1.el7 | 0:3.10.0-1160.21.1.el7 |
redhat/kernel-rt | <0:4.18.0-193.rt13.51.el8 | 0:4.18.0-193.rt13.51.el8 |
redhat/kernel | <0:4.18.0-193.el8 | 0:4.18.0-193.el8 |
Linux Kernel | >=4.14<=4.14.165 | |
Linux Kernel | >=4.19<=4.19.96 | |
Linux Kernel | >=5.0<=5.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-7053 has a high severity rating due to its potential for privilege escalation and system crashes.
To fix CVE-2020-7053, update your kernel packages to the latest versions as specified in the remediation guidance.
CVE-2020-7053 affects Linux kernel versions from 4.14 to 4.19.x and some 5.x versions up to but not including 5.3.
Any local user on systems using the vulnerable versions of the Linux kernel could potentially exploit CVE-2020-7053.
CVE-2020-7053 is classified as a use-after-free vulnerability in the Linux kernel's GPU driver functionality.