get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Cloud Backup Subscribe
Hci Compute Node Subscribe
Solidfire\, Enterprise Sds \& Hci Storage Node Subscribe
Solidfire \& Hci Management Node Subscribe
Solidfire Baseboard Management Controller Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17911 get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:33:04.432Z

Reserved: 2020-09-10T00:00:00

Link: CVE-2020-25221

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-10T14:15:17.590

Modified: 2024-11-21T05:17:41.827

Link: CVE-2020-25221

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-08T00:00:00Z

Links: CVE-2020-25221 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses