Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 708196 (CVE-2020-8428, CVE-2020-8647, CVE-2020-8648, CVE-2020-8649)

Summary: Kernel: multiple vulnerabilities (CVE-2020-{8428,8647,8648,8649})
Product: Gentoo Security Reporter: filip ambroz <filip.ambroz>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
Whiteboard: A?
Package list:
Runtime testing required: ---

Description filip ambroz 2020-02-04 10:36:58 UTC
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.

Reference:
https://www.openwall.com/lists/oss-security/2020/02/02/1
https://www.openwall.com/lists/oss-security/2020/01/28/4
https://www.openwall.com/lists/oss-security/2020/01/28/2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d0cb50185ae942b03c4327be322055d622dc79f6
https://github.com/torvalds/linux/commit/d0cb50185ae942b03c4327be322055d622dc79f6
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-19 01:14:50 UTC
Fixes at the latest merged for 5.5.9 and all long backported to stable trees.