Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-25221


get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.


Published

2020-09-10T14:15:17.590

Last Modified

2024-11-21T05:17:41.827

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-672

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.8.7 Yes
Application netapp cloud_backup - Yes
Application netapp solidfire\,_enterprise_sds_\&_hci_storage_node - Yes
Application netapp solidfire_\&_hci_management_node - Yes
Hardware netapp hci_compute_node - Yes
Hardware netapp solidfire_baseboard_management_controller - Yes

References