Bug 1858679 (CVE-2020-14331) - CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll
Summary: CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14331
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1859467 1859468 1859469 1859470 1859471 1859472 1859473 1859474 1859475 1861348
Blocks: 1856727
TreeView+ depends on / blocked
 
Reported: 2020-07-20 05:18 UTC by Dhananjay Arunesh
Modified: 2023-05-12 21:17 UTC (History)
48 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2020-10-20 14:21:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4286 0 None None None 2020-10-20 08:47:44 UTC
Red Hat Product Errata RHSA-2020:4289 0 None None None 2020-10-20 08:59:48 UTC
Red Hat Product Errata RHSA-2020:5023 0 None None None 2020-11-10 13:06:08 UTC
Red Hat Product Errata RHSA-2020:5026 0 None None None 2020-11-10 13:07:23 UTC

Description Dhananjay Arunesh 2020-07-20 05:18:11 UTC
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console both calling ioctl VT_RESIZE. An out-of-bounds write can occur. A local user with access to the VGA console could use this flaw to crash the system, potentially escalating their privileges on the system.

Comment 3 Alex 2020-07-22 08:15:44 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 4 Alex 2020-07-22 08:18:25 UTC
Statement:

This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param "nomodeset").

Comment 5 Petr Matousek 2020-07-22 08:39:02 UTC
Acknowledgments:

Name: Yunhai Zhang (NSFOCUS Security Team)

Comment 10 msiddiqu 2020-07-28 11:15:23 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1861348]

Comment 12 Justin M. Forbes 2020-10-08 19:14:24 UTC
This was fixed for Fedora with the 5.7.15 stable kernel updates.

Comment 19 errata-xmlrpc 2020-10-20 08:47:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4286 https://access.redhat.com/errata/RHSA-2020:4286

Comment 20 errata-xmlrpc 2020-10-20 08:59:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4289 https://access.redhat.com/errata/RHSA-2020:4289

Comment 21 Product Security DevOps Team 2020-10-20 14:21:13 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14331

Comment 25 errata-xmlrpc 2020-11-10 13:06:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:5023 https://access.redhat.com/errata/RHSA-2020:5023

Comment 26 errata-xmlrpc 2020-11-10 13:07:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:5026 https://access.redhat.com/errata/RHSA-2020:5026


Note You need to log in before you can comment on or make changes to this bug.