Back to bug 1908577
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Wade Mealing | 2020-12-17 04:43:33 UTC | CC | security-response-team | |
| Dhananjay Arunesh | 2020-12-23 02:03:51 UTC | Summary | EMBARGOED kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability | EMBARGOED CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability |
| Alias | CVE-2020-35501 | |||
| Rohit Keshri | 2020-12-23 07:31:56 UTC | CC | rkeshri | |
| Rohit Keshri | 2021-01-04 04:48:26 UTC | CC | felix.kosterhon | |
| Wade Mealing | 2021-01-11 06:33:51 UTC | CC | chwhite, jlelli, kcarcia, lgoncalv, qzhao, williams | |
| Wade Mealing | 2021-01-11 06:34:29 UTC | CC | blc, mlangsdo | |
| Wade Mealing | 2021-01-12 05:24:20 UTC | Doc Text | An issue was found in the Linux kernels audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. | |
| Wade Mealing | 2021-01-13 00:22:45 UTC | CC | rbriggs | |
| Eric Christensen | 2021-02-23 16:14:01 UTC | Doc Text | An issue was found in the Linux kernels audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. | An issue was found in the Linux kernel's audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. |
| Florencio Cano | 2021-03-01 10:53:39 UTC | Depends On | 1933649, 1933650, 1933651 | |
| Wade Mealing | 2021-03-05 01:06:44 UTC | Depends On | 1935475, 1935477, 1935474, 1935476 | |
| Wade Mealing | 2021-03-05 01:08:21 UTC | Depends On | 1935478 | |
| Richard Guy Briggs | 2021-03-05 15:21:32 UTC | CC | sgrubb | |
| Wade Mealing | 2021-03-08 00:41:02 UTC | Group | security, qe_staff | |
| CC | adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jforbes, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved | |||
| Summary | EMBARGOED CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability | CVE-2020-35501 kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability | ||
| Wade Mealing | 2021-03-08 00:41:42 UTC | Depends On | 1936258 | |
| Wade Mealing | 2021-03-10 05:34:04 UTC | Doc Text | An issue was found in the Linux kernel's audit subsystem. The open_by_handle_at syscall (A privileged syscall) is not correctly addressed by the audit filesystem for any user with the CAP_DAC_READ_SEARCH permission and ability to issue the syscall. | A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem |
| Petr Matousek | 2021-03-12 10:57:57 UTC | Depends On | 1938167 | |
| Wade Mealing | 2021-03-15 00:21:55 UTC | Comment | 0 | updated |
| Wade Mealing | 2021-03-15 00:24:16 UTC | Comment | 19 | updated |
| Marian Rehak | 2021-05-12 06:08:07 UTC | Blocks | 1937220 | |
| Red Hat Bugzilla | 2021-05-30 12:03:01 UTC | CC | blc | |
| Red Hat Bugzilla | 2021-05-30 12:43:26 UTC | CC | bhu | |
| Jeff Fearn 🐞 | 2021-06-03 11:15:09 UTC | CC | blc | |
| Jeff Fearn 🐞 | 2021-06-03 12:02:45 UTC | CC | bhu | |
| Red Hat Bugzilla | 2021-09-15 05:47:20 UTC | CC | jglisse | |
| Red Hat Bugzilla | 2022-07-16 03:21:12 UTC | CC | brdeoliv | |
| Red Hat Bugzilla | 2022-12-31 23:36:48 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:42:43 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:35:41 UTC | CC | security-response-team | |
| Assignee | security-response-team | nobody |
Back to bug 1908577