Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-29374

Опубликовано: 02 июн. 2020
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.

An issue was discovered in the Linux kernel related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended read access.

Отчет

This issue was rated as having Moderate impact because of the prerequisities required for successful exploitation. This is an issue with zygote Android model where the child process shares anon pages with the parent, despite the child can attack the parent and at the same time child and parent run with different levels of privileges. This is not a model applicable to Red Hat Enterprise Linux applications that we are aware of. To mitigate this issue when this model is required it is recommended to use execve() after fork, followed by dropping or changing privileges.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelAffected
Red Hat Enterprise Linux 7kernel-rtAffected
Red Hat Enterprise Linux 8kernelAffected
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernelNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=1903249kernel: the get_user_pages implementation when used for a copy-on-write page does not properly consider the semantics of read operations and therefore can grant unintended read access

EPSS

Процентиль: 4%
0.00019
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 3.6
ubuntu
около 5 лет назад

An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.

CVSS3: 3.6
nvd
около 5 лет назад

An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.

CVSS3: 3.6
msrc
около 5 лет назад

An issue was discovered in the Linux kernel before 5.7.3 related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation when used for a copy-on-write page does not properly consider the semantics of read operations and therefore can grant unintended write access aka CID-17839856fd58.

CVSS3: 3.6
debian
около 5 лет назад

An issue was discovered in the Linux kernel before 5.7.3, related to m ...

CVSS3: 3.6
github
больше 3 лет назад

An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.

EPSS

Процентиль: 4%
0.00019
Низкий

3.6 Low

CVSS3