Bug 1844353
Summary: | CVE-2020-10751 kernel: SELinux netlink permission check bypass [fedora-all] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Wade Mealing <wmealing> |
Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 32 | CC: | acaringi, airlied, bskeggs, hdegoede, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, john.j5live, jonathan, josef, jwboyer, kernel-maint, labbott, lgoncalv, linville, masami256, mchehab, mjg59, omosnace, steved |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-06-08 12:35:25 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1839634 |
Description
Wade Mealing
2020-06-05 07:55:00 UTC
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1839634,1844353 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new To make the job easier for the Fedora kernel maintainers: This flaw is already patched in 5.6 stable branch since 5.6.11 (F31/32 covered): https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/log/security/selinux/hooks.c?h=v5.6.11 and in Linus' tree since v5.7-rc4 (Rawhide covered): https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/security/selinux/hooks.c?h=v5.7-rc4 So I think it can be closed CURRENTRELEASE. Thanks! This was fixed for Fedora with the 5.6.11 stable kernel updates. |