A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1781204 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | Mailing List Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1781204 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | Mailing List Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1781204 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef - Mailing List, Patch, Vendor Advisory |
Information
Published : 2020-09-03 18:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10720
Mitre link : CVE-2020-10720
CVE.ORG link : CVE-2020-10720
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free