In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h). A use-after-free flaw was found when wakeup a waiter was in race in the locks_delete_block in fs/locks.c function in the Linux kernel's filesystem. A local attacker with a special user account (or root) may cause a denial of service, a system crash, or a leak in the internal kernel information.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center