Bug 1920480 (CVE-2020-0466)
Summary: | CVE-2020-0466 kernel: use after free in eventpoll.c may lead to escalation of privilege | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, asavkov, bhu, blc, bmasney, brdeoliv, bskeggs, chwhite, crwood, dhoward, dramseur, dvlasenk, eshatokhin, fhrbata, hannsj_uhl, hdegoede, hkrzesin, itamar, jarodwilson, jeremy, jforbes, jglisse, jhunter, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, kmitts, kpatch-maint, lgoncalv, linville, masami256, mchehab, mgala, mjudeiki, mlangsdo, nmurray, pmatouse, ptalbert, qzhao, rhandlin, rvrbovsk, steved, walters, williams, xzhou, ycote, yozone |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel-rt-3.10.0-1160.57.1.rt56.1198.el7 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-02-02 14:00:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1921706, 1920484, 1920773, 1920774, 1920775, 1920776, 1920777, 1920778, 1920779, 1920780, 1920781, 1920782, 1920783, 1920784, 1920785, 1921707, 2042756, 2042757, 2042758, 2042759, 2042760, 2042761, 2042762, 2042763, 2042764, 2042765, 2042766, 2044812 | ||
Bug Blocks: | 1920486 |
Description
Marian Rehak
2021-01-26 11:46:58 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1920484] This was fixed for Fedora with the 5.7.18 stable kernel updates. Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1081 https://access.redhat.com/errata/RHSA-2021:1081 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1093 https://access.redhat.com/errata/RHSA-2021:1093 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-0466 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:2099 https://access.redhat.com/errata/RHSA-2021:2099 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:2106 https://access.redhat.com/errata/RHSA-2021:2106 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2167 https://access.redhat.com/errata/RHSA-2021:2167 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2190 https://access.redhat.com/errata/RHSA-2021:2190 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2185 https://access.redhat.com/errata/RHSA-2021:2185 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-0466 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Via RHSA-2022:0529 https://access.redhat.com/errata/RHSA-2022:0529 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Via RHSA-2022:0533 https://access.redhat.com/errata/RHSA-2022:0533 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Red Hat Enterprise Linux 7.6 Telco Extended Update Support Via RHSA-2022:0531 https://access.redhat.com/errata/RHSA-2022:0531 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0592 https://access.redhat.com/errata/RHSA-2022:0592 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Advanced Update Support Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions Red Hat Enterprise Linux 7.7 Telco Extended Update Support Via RHSA-2022:0712 https://access.redhat.com/errata/RHSA-2022:0712 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions Via RHSA-2022:0718 https://access.redhat.com/errata/RHSA-2022:0718 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Via RHSA-2022:1104 https://access.redhat.com/errata/RHSA-2022:1104 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Extended Lifecycle Support Via RHSA-2022:1417 https://access.redhat.com/errata/RHSA-2022:1417 |