Vulnerability Name: | CVE-2020-29372 (CCN-181606) | ||||||||||||
Assigned: | 2020-04-24 | ||||||||||||
Published: | 2020-04-24 | ||||||||||||
Updated: | 2022-10-06 | ||||||||||||
Summary: | An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e. | ||||||||||||
CVSS v3 Severity: | 4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-362 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-29372 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.chromium.org/p/project-zero/issues/detail?id=2029 Source: CCN Type: Google Security Research Issue 2029 Linux 5.6: IORING_OP_MADVISE races with coredumping Source: MISC Type: Release Notes, Vendor Advisory https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 Source: XF Type: UNKNOWN linux-kernel-coredump-dos(181606) Source: MISC Type: Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0c4d1e176eeb614dc8734fc3ace34292771f11 Source: CCN Type: Linux Kernel GIT Repository mm: check that mm is still valid in madvise() Source: CCN Type: Packet Storm Security [05-08-2020] Linux 5.6 IORING_OP_MADVISE Race Condition | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |