Description
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2242-1 | linux-4.9 security update |
Debian DSA |
DSA-4667-1 | linux security update |
Debian DSA |
DSA-4698-1 | linux security update |
EUVD |
EUVD-2020-29295 | fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed. |
Ubuntu USN |
USN-4318-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4319-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4320-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-4324-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4325-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:56:28.354Z
Reserved: 2020-01-28T00:00:00.000Z
Link: CVE-2020-8428
No data.
Status : Modified
Published: 2020-01-29T00:15:10.953
Modified: 2024-11-21T05:38:50.103
Link: CVE-2020-8428
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN