A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.
No reference to any upstream issue, and RedHat's closed their bug.
This bug is specific to Fedora/RedHat.
kexec-tools versions currently in gentoo: 2.0.22 Stable, 2.0.24 Testing
> on ubuntu/debian, makedumpfile from src:makedumpfile is used
> to create the dmesg file, and correctly limits the permissions on it.
> On Fedora/RedHat, the kdump-lib-initramfs.sh is used and is where
> the vulnerability lies. This script is not included in ubuntu/debian packaging
> As I explained in my previous update to this bug, this security issue does
> not apply to debian package. This security issue was introduced by the
> scripts added in Fedora/Redhat packages. I will close this bug now.
RH seems to have fixed these bugs internally.
Describes the fix happened in RHEL8
Down in the "Fixes" section, are 5 links to Bugzilla numbers.
The main security item in question: is RH BZ # 1934261 :
BZ - 1934261 - CVE-2021-20269 kexec-tools: incorrect permissions on kdump dmesg file
(the other 4 fixes are not relevant to what the security issue CVE refers to,
the permissions of the log file).
Their fix literally just chmod's a logfile in some initrd RedHat wrote.
I am not familiar with this package myself, but, I don't think we are vulnerable to this CVE, and never were, because we just don't provide nearly as much code as Fedora/RH, and it seems to be almost solely their issue.
Gentoo doesn't have this kdump-lib-initramfs.sh at all either.
Recommend: close bug , either fixed/invalid/irrelevant.
Thanks for your investigation!
Really wish Redhat would make their CVEs less useless to everyone else.