Description
An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20986 | An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents. |
Ubuntu USN |
USN-4750-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4751-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4752-1 | Linux kernel (OEM) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T16:40:59.170Z
Reserved: 2020-11-13T00:00:00.000Z
Link: CVE-2020-28588
No data.
Status : Modified
Published: 2021-05-10T19:15:08.017
Modified: 2024-11-21T05:22:57.560
Link: CVE-2020-28588
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN