A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10781.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"137044535442632537790564424600226998000",
"124942074780708109125515304954506011236",
"118338368753810342200554866789806149311",
"260578282017582972250870013595920672761"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2020-10781-5b381baa",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@853eab68afc80f59f36bbdeb715e5c88c501e680",
"target": {
"file": "drivers/block/zram/zram_drv.c"
}
}
]