A use-after-free flaw may be seen due to a race problem while in detach_vmas_to_be_unmapped() in mm/mmap.c in VMA access while munmap(). This flaw could allow a local attacker with a user privilege to crash the system, because VMA with VM_GROWSDOWN or VM_GROWSUP flag set may change their size under mmap_read_lock(). This vulnerability could even lead to a kernel information leak problem. References: https://bugs.chromium.org/p/project-zero/issues/detail?id=2056 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c https://redhat.service-now.com/surl.do?n=INC1430424
Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Hi The CVE-2021-20200 is a duplicate AFAICS from an already assigned CVE-2020-29369. See https://bugs.chromium.org/p/project-zero/issues/detail?id=2056 where it was assigned. Regards, Salvatore
For reference see as well: https://bugzilla.redhat.com/show_bug.cgi?id=1903262
In reply to comment #13: > Hi > > The CVE-2021-20200 is a duplicate AFAICS from an already assigned > CVE-2020-29369. > > See https://bugs.chromium.org/p/project-zero/issues/detail?id=2056 where it > was assigned. > > Regards, > Salvatore Hello Salvatore, thank you for this information. After reviewing the source, It has come to our attention that this is a duplicate of CVE-2020-29369 which is already there, and we are revoking this. Regards, Rohit
Statement: Red Hat Product Security does not consider this to be a vulnerability.