#VU63322 Use-after-free in Linux kernel


Published: 2022-05-17 | Updated: 2022-06-02

Vulnerability identifier: #VU63322

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-27820

CWE-ID:

Exploitation vector: Local

Exploit availability:

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor:

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to a use-after-free error in nouveau's postclose() handler. A local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
http://bugzilla.redhat.com/show_bug.cgi?id=1901726
http://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
http://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability