A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467 | patch vendor advisory |
https://twitter.com/grsecurity/status/1303749848898904067 | third party advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8 | release notes vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20201009-0002/ | third party advisory |
https://usn.ubuntu.com/4576-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4579-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | third party advisory mailing list |