1.9
CVSSv2

CVE-2020-25284

Published: 13/09/2020 Updated: 28/04/2022
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 4.1 | Impact Score: 3.6 | Exploitability Score: 0.5
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The rbd block device driver in drivers/block/rbd.c in the Linux kernel up to and including 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local malicious users to map or unmap rbd block devices, aka CID-f44d04e696fe.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 9.0

opensuse leap 15.1

Vendor Advisories

In the Linux kernel 5021 and 5311, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cachec because the pointer to a left data structure can be the same as the pointer to a right data structure (CVE-2019-19448) ...
A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system (CVE-2020-25284) ...
A flaw was found in the Linux kernel A local attacker, able to inject conntrack netlink configuration, could overflow a local buffer causing crashes or triggering the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlinkc The highest threat from this vulnerability is to data confidentiality and i ...
A flaw was found in the Linux kernel A local attacker, able to inject conntrack netlink configuration, could overflow a local buffer causing crashes or triggering the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlinkc The highest threat from this vulnerability is to data confidentiality and i ...
A flaw was found in the Linux kernel When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service Due to the nature of the flaw, privilege escalation cannot be fully ruled out (CVE-2020-14390) A flaw was found in the capabilities check of the rados block device functionality in the Linux ...
A flaw was found in the Linux kernel's implementation of BTRFS free space management, where the kernel does not correctly manage the lifetime of internal data structures used An attacker could use this flaw to corrupt memory or escalate privileges (CVE-2019-19448) A use-after-free flaw was found in the debugfs_remove function in the Linux kernel ...