CVE-2020-25704
kernel: perf_event_parse_addr_filter memory
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
Se encontró una perdida de memoria de fallo en el subsistema de monitoreo del rendimiento del kernel de Linux en el modo si se usaba PERF_EVENT_IOC_SET_FILTER. Un usuario local podría utilizar este fallo para privar los recursos causando una denegación de servicio
A memory leak flaw was found in the Linux kernel’s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-16 CVE Reserved
- 2020-12-02 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-401: Missing Release of Memory after Effective Lifetime
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html | Mailing List | |
https://www.openwall.com/lists/oss-security/2020/11/09/1 | Mailing List | |
https://www.starwindsoftware.com/security/sw-20220802-0003 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00 | 2022-10-25 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1895961 | 2022-01-11 | |
https://access.redhat.com/security/cve/CVE-2020-25704 | 2022-01-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.9 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.9" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.10 Search vendor "Linux" for product "Linux Kernel" and version "5.10" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.10 Search vendor "Linux" for product "Linux Kernel" and version "5.10" | rc2 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | Command Center Search vendor "Starwindsoftware" for product "Command Center" | - | - |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | Starwind Hyperconverged Appliance Search vendor "Starwindsoftware" for product "Starwind Hyperconverged Appliance" | - | - |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | Starwind San \& Nas Search vendor "Starwindsoftware" for product "Starwind San \& Nas" | v8r12 Search vendor "Starwindsoftware" for product "Starwind San \& Nas" and version "v8r12" | - |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | Starwind Virtual San Search vendor "Starwindsoftware" for product "Starwind Virtual San" | v8 Search vendor "Starwindsoftware" for product "Starwind Virtual San" and version "v8" | build14398 |
Affected
|