436
VMScore

CVE-2020-25704

Published: 02/12/2020 Updated: 25/10/2022
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability. (CVE-2019-19770) A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14351) A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality. (CVE-2020-25656) A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op. (CVE-2020-25668) The function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed.Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still a alias in sunkbd_reinit so that causing Use After Free. (CVE-2020-25669) A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. (CVE-2020-25704) An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271. (CVE-2020-27673) An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5. (CVE-2020-27675) A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel. (CVE-2020-27777) An issue exists in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel up to and including 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once. (CVE-2020-28941) An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel's fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability. (CVE-2020-28974) A flaw was found in the Linux kernel's implementation of Intel's Running Average Power Limit (RAPL) implementation. A local attacker could infer secrets by measuring power usage and also infer private data by observing the power usage of calculations performed on the data. (CVE-2020-8694)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.10

linux linux kernel

debian debian linux 9.0

starwindsoftware starwind san \\& nas v8r12

starwindsoftware command center -

starwindsoftware starwind virtual san v8

starwindsoftware starwind hyperconverged appliance -

Vendor Advisories

Synopsis Important: Red Hat Advanced Cluster Management 236 security updates and bug fixes Type/Severity Security Advisory: Important Topic Red Hat Advanced Cluster Management for Kubernetes 236 General Availabilityrelease images, which provide security updates and bug fixes Description Red Hat Advanced Cluster Management for Kubernete ...
A use-after-free flaw was found in the debugfs_remove function in the Linux kernel The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal This vulnerability can lead to a kernel information leak The highest threat from this vulnerability is to system availability ...
A flaw was found in the Linux kernel A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2020-14351) ...
A use-after-free flaw was found in the debugfs_remove function in the Linux kernel The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal This vulnerability can lead to a kernel information leak The highest threat from this vulnerability is to system availability ...
A memory leak has been found in the perf_event_parse_addr_filter function of Linux before 597, leading to a denial of service ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [CVE-2020-25704] Linux kernel: perf_event_parse_addr_filter memory leak <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...

Github Repositories

Host Errata Info The main idea of this script is to generate a csv errata report as in Satellite webUI, including the # of affected content hosts How to use this script Download the python scripts to any desired directory/System or on your Red Hat Satellite 610 Note: The desired system should have python3 Run the scripts as below Usage # wget githubcom/Jaskar