A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1781204 | Issue Tracking Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | Mailing List Patch Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=1781204 | Issue Tracking Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | Mailing List Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1781204 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef - Mailing List, Patch, Vendor Advisory |
Information
Published : 2020-09-03 18:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10720
Mitre link : CVE-2020-10720
CVE.ORG link : CVE-2020-10720
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
