A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.8.0-rc5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10781.json"