Hide Forgot
An out of bounds read vulnerability in the virtual console/virtual terminal resize functionality. An attacker with a local account can use the resize functionality to possibly leak kernel internal information to the local console which may be captured for use in a further attack to increase the reliability and successfulness of the next attack. Reference: Kernel Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=206359 Proposed patch: https://lkml.org/lkml/2020/3/1/415
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1802564]
This issue was fixed for Fedora with the 5.5.9 stable kernel updates.
Mitigation: The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console. See the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on "pam_console" to deny users logging into the console. This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.
Statement: This flaw is rated as having Moderate impact because the information leak is limited.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4062 https://access.redhat.com/errata/RHSA-2020:4062
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4060 https://access.redhat.com/errata/RHSA-2020:4060
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8647
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4431 https://access.redhat.com/errata/RHSA-2020:4431
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4609 https://access.redhat.com/errata/RHSA-2020:4609
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1209 https://access.redhat.com/errata/RHSA-2022:1209
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1213 https://access.redhat.com/errata/RHSA-2022:1213