First published: Fri Sep 25 2020(Updated: )
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact References: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467</a> <a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =5.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1882591 is considered to have a medium severity due to its potential for memory corruption and other impacts.
To fix REDHAT-BUG-1882591, update the Linux kernel to version 5.8.9 or later where this vulnerability has been patched.
The vulnerability REDHAT-BUG-1882591 affects systems running the Linux Kernel version 5.8.8.
Local attackers can exploit REDHAT-BUG-1882591 to corrupt memory or cause a NULL pointer dereference.
There are no known workarounds for REDHAT-BUG-1882591, and it is recommended to apply the kernel update to mitigate the risk.