Back to bug 1908577

Who When What Removed Added
Wade Mealing 2020-12-17 04:43:33 UTC CC security-response-team
Dhananjay Arunesh 2020-12-23 02:03:51 UTC Summary EMBARGOED kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability EMBARGOED CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability
Alias CVE-2020-35501
Rohit Keshri 2020-12-23 07:31:56 UTC CC rkeshri
Rohit Keshri 2021-01-04 04:48:26 UTC CC felix.kosterhon
Wade Mealing 2021-01-11 06:33:51 UTC CC chwhite, jlelli, kcarcia, lgoncalv, qzhao, williams
Wade Mealing 2021-01-11 06:34:29 UTC CC blc, mlangsdo
Wade Mealing 2021-01-12 05:24:20 UTC Doc Text An issue was found in the Linux kernels audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall.
Wade Mealing 2021-01-13 00:22:45 UTC CC rbriggs
Eric Christensen 2021-02-23 16:14:01 UTC Doc Text An issue was found in the Linux kernels audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. An issue was found in the Linux kernel's audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall.
Florencio Cano 2021-03-01 10:53:39 UTC Depends On 1933649, 1933650, 1933651
Wade Mealing 2021-03-05 01:06:44 UTC Depends On 1935475, 1935477, 1935474, 1935476
Wade Mealing 2021-03-05 01:08:21 UTC Depends On 1935478
Richard Guy Briggs 2021-03-05 15:21:32 UTC CC sgrubb
Wade Mealing 2021-03-08 00:41:02 UTC Group security, qe_staff
CC adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jforbes, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved
Summary EMBARGOED CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability
Wade Mealing 2021-03-08 00:41:42 UTC Depends On 1936258
Wade Mealing 2021-03-10 05:34:04 UTC Doc Text An issue was found in the Linux kernel's audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
Petr Matousek 2021-03-12 10:57:57 UTC Depends On 1938167
Wade Mealing 2021-03-15 00:21:55 UTC Comment 0 updated
Wade Mealing 2021-03-15 00:24:16 UTC Comment 19 updated
Marian Rehak 2021-05-12 06:08:07 UTC Blocks 1937220
Red Hat Bugzilla 2021-05-30 12:03:01 UTC CC blc
Red Hat Bugzilla 2021-05-30 12:43:26 UTC CC bhu
Jeff Fearn 🐞 2021-06-03 11:15:09 UTC CC blc
Jeff Fearn 🐞 2021-06-03 12:02:45 UTC CC bhu
Red Hat Bugzilla 2021-09-15 05:47:20 UTC CC jglisse
Red Hat Bugzilla 2022-07-16 03:21:12 UTC CC brdeoliv
Red Hat Bugzilla 2022-12-31 23:36:48 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:42:43 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:35:41 UTC CC security-response-team
Assignee security-response-team nobody

Back to bug 1908577