CVE-2020-25669 - log back

CVE-2020-25669 edited at 01 Dec 2020 21:43:41
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Information disclosure
Description
+ A use-after-free read in the Linux kernel before 5.9.10 could be used by local attackers to read privileged information or potentially crash the kernel. The function sunkbd_reinit was scheduled by sunkbd_interrupt before the struct sunkbd was freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing use-after-free.
References
+ https://www.openwall.com/lists/oss-security/2020/11/05/2
+ https://www.openwall.com/lists/oss-security/2020/11/20/5
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77e70d351db7de07a46ac49b87a6c3c7a60fca7e
Notes
CVE-2020-25669 created at 01 Dec 2020 21:37:23