5.5
CVSSv3

CVE-2020-8694

Published: 12/11/2020 Updated: 11/05/2021
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability. (CVE-2019-19770) A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14351) A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality. (CVE-2020-25656) A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op. (CVE-2020-25668) The function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed.Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still a alias in sunkbd_reinit so that causing Use After Free. (CVE-2020-25669) A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. (CVE-2020-25704) An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271. (CVE-2020-27673) An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5. (CVE-2020-27675) A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel. (CVE-2020-27777) An issue exists in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel up to and including 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once. (CVE-2020-28941) An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel's fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability. (CVE-2020-28974) A flaw was found in the Linux kernel's implementation of Intel's Running Average Power Limit (RAPL) implementation. A local attacker could infer secrets by measuring power usage and also infer private data by observing the power usage of calculations performed on the data. (CVE-2020-8694)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel core_i7-8510y_firmware -

intel core_i7-8500y_firmware -

intel core_i5-8310y_firmware -

intel core_i5-8210y_firmware -

intel core_i5-8200y_firmware -

intel core_m3-8100y_firmware -

intel core_i7-7500u_firmware -

intel core_i7-7510u_firmware -

intel core_i7-7600u_firmware -

intel core_i5-7200u_firmware -

intel core_i5-7210u_firmware -

intel core_i5-7300u_firmware -

intel core_i5-7500u_firmware -

intel core_i3-7007u_firmware -

intel core_i3-7100u_firmware -

intel core_i3-7110u_firmware -

intel core_i3-7130u_firmware -

intel pentium_4415u_firmware -

intel celeron_3865u_firmware -

intel celeron_3965u_firmware -

intel core_i7-7560u_firmware -

intel core_i7-7567u_firmware -

intel core_i7-7660u_firmware -

intel core_i5-7260u_firmware -

intel core_i5-7267u_firmware -

intel core_i5-7287u_firmware -

intel core_i5-7360u_firmware -

intel core_i3-7367u_firmware -

intel core_i7-7y75_firmware -

intel core_i5-7y54_firmware -

intel core_i5-7y57_firmware -

intel core_m3-7y30_firmware -

intel pentium_4410y_firmware -

intel pentium_4415y_firmware -

intel celeron_3965y_firmware -

intel core_i7-8565u_firmware -

intel core_i7-8665u_firmware -

intel core_i5-8365u_firmware -

intel core_i5-8265u_firmware -

intel core_i9-8950hk_firmware -

intel core_i7-8700b_firmware -

intel core_i7-8750h_firmware -

intel core_i7-8850h_firmware -

intel core_i5-8300h_firmware -

intel core_i5-8400b_firmware -

intel core_i5-8400h_firmware -

intel core_i5-8500b_firmware -

intel core_i7-8670_firmware -

intel core_i7-8670t_firmware -

intel core_i7-8700_firmware -

intel core_i7-8700t_firmware -

intel core_i5-8400_firmware -

intel core_i5-8400t_firmware -

intel core_i5-8420_firmware -

intel core_i5-8420t_firmware -

intel core_i5-8500_firmware -

intel core_i5-8500t_firmware -

intel core_i5-8550_firmware -

intel core_i5-8600_firmware -

intel core_i5-8600t_firmware -

intel core_i5-8650_firmware -

intel xeon_e-2486g_firmware -

intel xeon_e-2176g_firmware -

intel xeon_e-2176m_firmware -

intel xeon_e-2146g_firmware -

intel xeon_e-2136_firmware -

intel xeon_e-2126g_firmware -

intel xeon_e-2174g_firmware -

intel xeon_e-2144g_firmware -

intel xeon_e-2134_firmware -

intel xeon_e-2124_firmware -

intel xeon_e-2124g_firmware -

intel core_i7-8700k_firmware -

intel core_i5-8600k_firmware -

intel core_i5-8650k_firmware -

intel core_i9-9980hk_firmware -

intel core_i9-9880h_firmware -

intel core_i7-9850h_firmware -

intel core_i7-9750hf_firmware -

intel core_i5-9400h_firmware -

intel core_i5-9300h_firmware -

intel core_i9-9900k_firmware -

intel core_i9-9900kf_firmware -

intel core_i7-9700k_firmware -

intel core_i7-9700kf_firmware -

intel core_i5-9600k_firmware -

intel core_i5-9600kf_firmware -

intel core_i5-9400_firmware -

intel core_i5-9400f_firmware -

intel xeon_e-2186g_firmware -

intel core_i7-8559u_firmware -

intel core_i5-8259u_firmware -

intel core_i5-8269u_firmware -

intel core_i3-8109u_firmware -

intel core_i7-8550u_firmware -

intel core_i7-8650u_firmware -

intel core_i5-8250u_firmware -

intel core_i5-8350u_firmware -

intel core_i3-7020u_firmware -

intel core_i8130u_firmware -

intel core_i3-8000_firmware -

intel core_i3-8000t_firmware -

intel core_i3-8020_firmware -

intel core_i3-8100_firmware -

intel core_i3-8100h_firmware -

intel core_i3-8100t_firmware -

intel core_i3-8120_firmware -

intel core_i3-8300_firmware -

intel core_i3-8300t_firmware -

intel core_i8350k_firmware -

intel pentium_gold_g5400_firmware -

intel pentium_gold_g5400t_firmware -

intel pentium_gold_g5420_firmware -

intel pentium_gold_g5420t_firmware -

intel pentium_gold_g5500_firmware -

intel pentium_gold_g5500t_firmware -

intel pentium_gold_g5600_firmware -

intel celeron_g4900_firmware -

intel celeron_g4900t_firmware -

intel celeron_g4920_firmware -

intel xeon_e-2288g_firmware -

intel xeon_e-2286m_firmware -

intel xeon_e-2278gel_firmware -

intel xeon_e-2278ge_firmware -

intel xeon_e-2278g_firmware -

intel core_i7-10710u_firmware -

intel core_i7-10610u_firmware -

intel core_i3-10100f_firmware -

intel core_i9-10900_firmware -

intel core_i7-10750h_firmware -

intel pentium_silver_j5005_firmware -

intel pentium_silver_n5000_firmware -

intel celeron_j4005_firmware -

intel celeron_j4105_firmware -

intel celeron_n4000_firmware -

intel celeron_n4100_firmware -

intel pentium_silver_j5040_firmware -

intel pentium_silver_n5030_firmware -

intel celeron_j4125_firmware -

intel celeron_j4025_firmware -

intel celeron_n4020_firmware -

intel celeron_n4120_firmware -

intel core_i7-1060g7_firmware -

intel core_i7-1065g7_firmware -

intel core_i5-1030g4_firmware -

intel core_i5-1030g7_firmware -

intel core_i5-1035g1_firmware -

intel core_i5-1035g4_firmware -

intel core_i5-1035g7_firmware -

intel core_i3-1000g1_firmware -

intel core_i3-1000g4_firmware -

intel core_i3-1005g1_firmware -

intel core_i7-8705g_firmware -

intel core_i7-8706g_firmware -

intel core_i7-8709g_firmware -

intel core_i7-8809g_firmware -

intel core_i5-8305g_firmware -

intel core_i7-7700hq_firmware -

intel core_i7-7820eq_firmware -

intel core_i7-7820hk_firmware -

intel core_i7-7820hq_firmware -

intel core_i7-7920hq_firmware -

intel core_i5-7300hq_firmware -

intel core_i5-7440eq_firmware -

intel core_i5-7440hq_firmware -

intel core_i5-7442eq_firmware -

intel core_i3-7100h_firmware -

intel core_i7-7700_firmware -

intel core_i7-7700k_firmware -

intel core_i7-7700t_firmware -

intel core_i5-7400_firmware -

intel core_i5-7400t_firmware -

intel core_i5-7500_firmware -

intel core_i5-7500t_firmware -

intel core_i5-7600_firmware -

intel core_i5-7600k_firmware -

intel core_i5-7600t_firmware -

intel core_i3-7100e_firmware -

intel core_i3-7101e_firmware -

intel core_i3-7101te_firmware -

intel core_i3-7102e_firmware -

intel core_i3-7120_firmware -

intel core_i3-7120t_firmware -

intel core_i3-7320t_firmware -

intel core_i3-7340_firmware -

intel celeron_g3930e_firmware -

intel celeron_g3930te_firmware -

intel core_i7-7740x_firmware -

intel core_i5-7640x_firmware -

intel xeon_e3-1220_firmware -

intel xeon_e3-1225_firmware -

intel xeon_e3-1230_firmware -

intel xeon_e3-1240_firmware -

intel xeon_e3-1245_firmware -

intel xeon_e3-1270_firmware -

intel xeon_e3-1275_firmware -

intel xeon_e3-1280_firmware -

intel xeon_e3-1501l_firmware -

intel xeon_e3-1501m_firmware -

intel xeon_e3-1505l_firmware -

intel xeon_e3-1505m_firmware -

intel xeon_e3-1535m_firmware -

intel core_i7-6700hq_firmware -

intel core_i7-6770hq_firmware -

intel core_i7-6820hk_firmware -

intel core_i7-6820hq_firmware -

intel core_i7-6870hq_firmware -

intel core_i7-6920hq_firmware -

intel core_i7-6970hq_firmware -

intel core_i5-6300hq_firmware -

intel core_i5-6350hq_firmware -

intel core_i5-6440hq_firmware -

intel core_i3-6100h_firmware -

intel core_i7-6700_firmware -

intel core_i7-6700k_firmware -

intel core_i7-6700t_firmware -

intel core_i7-6700te_firmware -

intel core_i7-6820eq_firmware -

intel core_i7-6822eq_firmware -

intel core_i5-6400_firmware -

intel core_i5-6400t_firmware -

intel core_i5-6440eq_firmware -

intel core_i5-6442eq_firmware -

intel core_i5-6500_firmware -

intel core_i5-6500t_firmware -

intel core_i5-6500te_firmware -

intel core_i5-6600_firmware -

intel core_i5-6600k_firmware -

intel core_i5-6600t_firmware -

intel core_i3-6100_firmware -

intel core_i3-6100e_firmware -

intel core_i3-6100t_firmware -

intel core_i3-6100te_firmware -

intel core_i3-6102e_firmware -

intel core_i3-6120_firmware -

intel core_i3-6120t_firmware -

intel core_i3-6300_firmware -

intel core_i3-6300t_firmware -

intel core_i3-6320_firmware -

intel core_i3-6320t_firmware -

intel pentium_g4400_firmware -

intel pentium_g4400t_firmware -

intel pentium_g4400te_firmware -

intel pentium_g4420_firmware -

intel pentium_g4420t_firmware -

intel pentium_g4500_firmware -

intel pentium_g4500t_firmware -

intel pentium_g4520_firmware -

intel pentium_g4520t_firmware -

intel pentium_g4540_firmware -

intel celeron_g3900_firmware -

intel celeron_g3900e_firmware -

intel celeron_g3900t_firmware -

intel celeron_g3900te_firmware -

intel celeron_g3902e_firmware -

intel celeron_g3920_firmware -

intel celeron_g3920t_firmware -

intel celeron_g3940_firmware -

intel xeon_e3-1235l_firmware -

intel xeon_e3-1240l_firmware -

intel xeon_e3-1260l_firmware -

intel xeon_e3-1268l_firmware -

intel xeon_e3-1515m_firmware -

intel xeon_e3-1545m_firmware -

intel xeon_e3-1558l_firmware -

intel xeon_e3-1565l_firmware -

intel xeon_e3-1575m_firmware -

intel xeon_e3-1578l_firmware -

intel xeon_e3-1585_firmware -

intel xeon_e3-1585l_firmware -

intel core_i7-6500u_firmware -

intel core_i7-6510u_firmware -

intel core_i7-6600u_firmware -

intel core_i5-6200u_firmware -

intel core_i5-6210u_firmware -

intel core_i5-6300u_firmware -

intel core_i5-6310u_firmware -

intel core_i3-6100u_firmware -

intel core_i3-6110u_firmware -

intel pentium_4405u_firmware -

intel celeron_3855u_firmware -

intel celeron_3955u_firmware -

intel core_i7-6560u_firmware -

intel core_i7-6567u_firmware -

intel core_i7-6650u_firmware -

intel core_i7-6660u_firmware -

intel core_i5-6260u_firmware -

intel core_i5-6267u_firmware -

intel core_i5-6287u_firmware -

intel core_i5-6360u_firmware -

intel core_i3-6167u_firmware -

intel core_m7-6y75_firmware -

intel core_m5-6y54_firmware -

intel core_m5-6y57_firmware -

intel core_m3-6y30_firmware -

intel pentium_4405y_firmware -

intel core_i3-8145u_firmware -

intel core_4205u_firmware -

intel core_5405u_firmware -

Vendor Advisories

A use-after-free flaw was found in the debugfs_remove function in the Linux kernel The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal This vulnerability can lead to a kernel information leak The highest threat from this vulnerability is to system availability ...
A use-after-free flaw was found in the debugfs_remove function in the Linux kernel The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal This vulnerability can lead to a kernel information leak The highest threat from this vulnerability is to system availability ...
An information disclosure flaw was found in the Linux kernel's Intel Running Average Power Limit (RAPL) implementation A local non-privileged attacker could infer secrets by measuring power usage and also infer private data by observing the power usage of calculations performed on the data ...
Intel® has informed HP of potential security vulnerabilities identified in Intel® Processors, BIOS Firmware for some Intel® Processors, Intel® Running Average Power Limit (RAPL) Interface, and Intel BIOS platform sample code for some Intel® Processors which may allow escalation of privilege, denial of service, and/or information disclosure HP ...
Intel® has informed HP of potential security vulnerabilities identified in Intel® Processors, BIOS Firmware for some Intel® Processors, Intel® Running Average Power Limit (RAPL) Interface, and Intel BIOS platform sample code for some Intel® Processors which may allow escalation of privilege, denial of service, and/or information disclosure HP ...

Github Repositories

A proof-of-concept experiment of Gradle build energy consumption monitoring

Gradle Energy Consumption Plugin Warning: this is just a proof-of-concept experiment! Only Intel Linux hosts are supported, only CPU and DRAM consumption is monitored, only the Gradle daemon process is monitored, monitoring starts too late Energy consumption is reported on the console at the end of the build and added as custom values to build scans We could potentially us

Recent Articles

One more reason for Apple to dump Intel processors: Another SGX, kernel data-leak flaw unearthed by experts
The Register • Thomas Claburn in San Francisco • 10 Nov 2020

Obscure interface lets you monitor chip activity with code as if you were physically plugged into it Intel celebrates security of Ice Lake Xeon processors, so far impervious to any threat due to their unavailability Apple now Arm'd to the teeth: MacBook Air and Pro, Mac mini to be powered by custom M1 chips rather than Intel

Updated Boffins based in Austria, Germany, and the UK have identified yet another data-leaking side-channel flaw affecting Intel processors, and potentially other chips, that exposes cryptographic secrets in memory. In a paper disclosed on Tuesday, computer scientists with Graz University of Technology, University of Birmingham, and CISPA Helmholtz Center for Information Security, describe an attack dubbed "Platypus," which stands for "Power Leakage Attacks: Targeting Your Protected User Secrets...