fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2242-1 | linux-4.9 security update |
Debian DSA |
DSA-4667-1 | linux security update |
Debian DSA |
DSA-4698-1 | linux security update |
EUVD |
EUVD-2020-29295 | fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed. |
Ubuntu USN |
USN-4318-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4319-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4320-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-4324-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4325-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:56:28.354Z
Reserved: 2020-01-28T00:00:00
Link: CVE-2020-8428
No data.
Status : Modified
Published: 2020-01-29T00:15:10.953
Modified: 2024-11-21T05:38:50.103
Link: CVE-2020-8428
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN