[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE-2020-35519 Linux kernel: x25_bind out-of-bounds read
From: Salvatore Bonaccorso <carnil () debian ! org>
Date: 2021-03-18 6:04:00
Message-ID: 20210318060359.GA7529 () lorien ! valinor ! li
[Download RAW message or body]
Hi,
On Wed, Mar 17, 2021 at 05:14:57PM -0400, Sasha Levin wrote:
> On Thu, Mar 18, 2021 at 01:20:18AM +0530, Rohit Keshri wrote:
> > Hello Team,
> >
> > An out-of-bounds (OOB) memory access flaw was found in x25_bind in
> > net/x25/af_x25.c in the Linux kernel. A bounds check failure allows a local
> > attacker with a user account on the system to gain access to out-of-bounds
> > memory, leading to a system crash or a leak of internal kernel information.
> > The highest threat from this vulnerability is to confidentiality,
> > integrity, as well as system availability.
> >
> > 'CVE-2020-35519' was assigned by Red Hat.
>
> This mail doesn't even mention where/how this is fixed. Is this
> 6ee50c8e262a ("net/x25: prevent a couple of overflows")?
>
> If so, it's already fixed in all stable kernels.
>
> How can the issue cause a leak btw?
Just as additional reference: I think this goes back to this report:
https://www.openwall.com/lists/oss-security/2020/11/15/2
In upstream this was fixed then if the above is correct in
v4.4.248
v4.9.248
v4.14.211
v4.19.162
v5.4.82
v5.9.13
v5.10-rc7
Regards,
Salvatore
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic