Hide Forgot
In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. Reference: https://android.googlesource.com/kernel/common/+/96aa1b22bd6bb9fccf62f6261f390ed6f3e7967f
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1915800]
This was fixed for Fedora with the 5.6.19 stable kernel updates.
Statement: This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.
Mitigation: To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
External References: https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1578 https://access.redhat.com/errata/RHSA-2021:1578
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1739 https://access.redhat.com/errata/RHSA-2021:1739
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-0342