A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041 | Patch Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 | Patch Release Notes Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4578-1/ | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-09-24 08:15
Updated : 2022-04-27 11:48
NVD link : CVE-2020-26088
Mitre link : CVE-2020-26088
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
linux
- linux_kernel
opensuse
- leap