CVE-2020-27825 | Date: (C)2020-12-14 (M)2024-05-21 |
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 5.7 | CVSS Score : 5.4 |
Exploit Score: 0.5 | Exploit Score: 3.4 |
Impact Score: 5.2 | Impact Score: 7.8 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: LOCAL | Access Vector: LOCAL |
Attack Complexity: HIGH | Access Complexity: MEDIUM |
Privileges Required: HIGH | Authentication: NONE |
User Interaction: NONE | Confidentiality: PARTIAL |
Scope: UNCHANGED | Integrity: NONE |
Confidentiality: HIGH | Availability: COMPLETE |
Integrity: NONE | |
Availability: HIGH | |
| |