Arch Linux

Please read this before reporting a bug:

Do NOT report bugs when a package is just outdated, or it is in Unsupported. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!

FS#68257 - [security][linux][linux-lts] CVE-2020-16119

Attached to Project: Arch Linux
Opened by loqs (loqs) - Wednesday, 14 October 2020, 19:36 GMT
Last edited by freswa (frederik) - Wednesday, 14 October 2020, 21:10 GMT
Task Type Bug Report
Category Security
Status Assigned
Assigned To Tobias Powalowski (tpowa)
Andreas Radke (AndyRTR)
Jan Alexander Steffens (heftig)
Levente Polyak (anthraxx)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 0%
Votes 0
Private No


A flaw was found in the Linux kernel. When reusing a socket with an attached dccps_hc_tx_ccid as a listener, the socket will be used after being released leading to denial of service (DoS) or a potential code execution.

Additional info:
* linux 5.8.14.arch1-1
* linux-lts 5.4.70-1
This task depends upon

Comment by Andreas Radke (AndyRTR) - Monday, 16 November 2020, 11:07 GMT">

There's no solution or fix available so far. Upstream is still working on it.