Bug 1930297 (CVE-2020-15824)
Summary: | CVE-2020-15824 kotlin: kotlin-main-kts cached scripts in the system temp directory could result in priviledge escalation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Michael Kaplan <mkaplan> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, bibryam, chazlett, drieden, eric.wittmann, ganandan, ggaughan, gmalinko, hbraun, janstey, jochrist, jwon, pantinor |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kotlin 1.4.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in JetBrains kotlin. A script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts is possible in the system temporary directory, which is shared by all users by default. The highest threat from this vulnerabiility is to data confidentiality and integrity as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-03-18 01:51:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1930300 |
Description
Michael Kaplan
2021-02-18 16:37:52 UTC
External References: https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/ Marking Red Hat Fuse 7, Red Hat Integration Camel-K and Red Hat Integration Service Registry as not affected as no kotlin artifacts from the vulnerable range are distributed or used. Statement: CodeReady Studio 12 is not affected by this flaw because it ships a previous version of kotlin-stdlib without the vulnerable code present. Red Hat Fuse 7, Red Hat Integration Camel-K and Red Hat Integration Service Registry are not affected by this flaw because no kotlin artifacts from the vulnerable range are distributed or used. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15824 |