CVE-2020-10757

7.8 HIGH

📋 TL;DR

This vulnerability in the Linux kernel allows local attackers with access to DAX-enabled storage to escalate privileges on the system. It affects Linux kernel versions after 4.5-rc1 where DAX (Direct Access) functionality is enabled for persistent memory devices. The flaw specifically occurs in how the kernel handles memory remapping of DAX huge pages.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Versions after 4.5-rc1 up to the patched version
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DAX (Direct Access) functionality is enabled for persistent memory devices like Intel Optane DC Persistent Memory. Most standard configurations without DAX are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the system, potentially compromising all data and services.

🟠

Likely Case

Privilege escalation from a standard user account to root, enabling complete system control.

🟢

If Mitigated

Limited impact if DAX functionality is disabled or if systems are properly segmented with minimal local user access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Any local user with access to DAX storage can potentially exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and DAX-enabled storage. Proof-of-concept code has been published in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commit 5bfea2d9b17f1034a68147a8b03b9789af5700f9 and subsequent releases

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=1842525

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. For Red Hat/CentOS: yum update kernel. 3. For Debian/Ubuntu: apt update && apt upgrade linux-image. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable DAX functionality

linux

Disable DAX (Direct Access) for persistent memory devices if not required

echo 'disable_dax' >> /etc/modprobe.d/disable-dax.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with DAX-enabled storage
  • Implement strict privilege separation and limit sudo/root access

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is between 4.5-rc1 and the patched version, and DAX is enabled, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable range and check /proc/cmdline or dmesg for DAX status

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Suspicious mremap operations in kernel logs

Network Indicators:

  • Not applicable - local exploit only

SIEM Query:

source="kernel" AND ("mremap" OR "DAX" OR "privilege escalation")

🔗 References

📤 Share & Export