Bug 1899804 (CVE-2020-28374)
| Summary: | CVE-2020-28374 kernel: SCSI target (LIO) write to any block on ILO backstore | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Wade Mealing <wmealing> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, asavkov, bhu, blc, bmasney, brdeoliv, bskeggs, chwhite, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, itamar, jarodwilson, jdillama, jeremy, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jross, jshortt, jstancek, jthierry, jwboyer, kcarcia, kernel-maint, kernel-mgr, kpatch-maint, lgoncalv, linville, madam, masami256, mchehab, mcressma, mlangsdo, nmurray, ptalbert, qzhao, rhandlin, rt-maint, rvrbovsk, security-response-team, steved, walters, williams, wmealing, ycote, ykaul, yozone |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in the Linux kernel’s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-03-16 19:19:12 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1900459, 1900460, 1900461, 1900462, 1900463, 1900464, 1900465, 1900466, 1900467, 1900468, 1900469, 1900470, 1900471, 1900472, 1900473, 1900474, 1902566, 1902567, 1902568, 1902569, 1902570, 1902571, 1902572, 1902573, 1908805, 1908806, 1915786, 1948464 | ||
| Bug Blocks: | 1897690 | ||
|
Description
Wade Mealing
2020-11-20 04:25:52 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1915786] Created tcmu-runner tracking bugs for this issue: Affects: fedora-all [bug 1915787] https://bugzilla.redhat.com/show_bug.cgi?id=1916045 Created a new flaw to reflect the new cve for tcmu-runner. Removed affects here, added to new flaw and linked existing trackers. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0856 https://access.redhat.com/errata/RHSA-2021:0856 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0857 https://access.redhat.com/errata/RHSA-2021:0857 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0862 https://access.redhat.com/errata/RHSA-2021:0862 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-28374 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1081 https://access.redhat.com/errata/RHSA-2021:1081 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1093 https://access.redhat.com/errata/RHSA-2021:1093 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2021:1376 https://access.redhat.com/errata/RHSA-2021:1376 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2021:1377 https://access.redhat.com/errata/RHSA-2021:1377 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:1531 https://access.redhat.com/errata/RHSA-2021:1531 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:1532 https://access.redhat.com/errata/RHSA-2021:1532 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:2099 https://access.redhat.com/errata/RHSA-2021:2099 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:2106 https://access.redhat.com/errata/RHSA-2021:2106 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2167 https://access.redhat.com/errata/RHSA-2021:2167 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2190 https://access.redhat.com/errata/RHSA-2021:2190 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2185 https://access.redhat.com/errata/RHSA-2021:2185 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2021:2732 https://access.redhat.com/errata/RHSA-2021:2732 |