A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 5.8.0 (excluding) |
Linux_kernel | Linux | 5.8.0 (including) | 5.8.0 (including) |
Linux_kernel | Linux | 5.8.0-rc1 (including) | 5.8.0-rc1 (including) |
Linux_kernel | Linux | 5.8.0-rc2 (including) | 5.8.0-rc2 (including) |
Linux_kernel | Linux | 5.8.0-rc3 (including) | 5.8.0-rc3 (including) |
Linux_kernel | Linux | 5.8.0-rc4 (including) | 5.8.0-rc4 (including) |
Linux_kernel | Linux | 5.8.0-rc5 (including) | 5.8.0-rc5 (including) |