FS#68257 - [security][linux][linux-lts] CVE-2020-16119

Attached to Project: Arch Linux
Opened by loqs (loqs) - Wednesday, 14 October 2020, 19:36 GMT
Last edited by Andreas Radke (AndyRTR) - Thursday, 28 January 2021, 07:01 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Tobias Powalowski (tpowa)
Andreas Radke (AndyRTR)
Jan Alexander Steffens (heftig)
Levente Polyak (anthraxx)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
A flaw was found in the Linux kernel. When reusing a socket with an attached dccps_hc_tx_ccid as a listener, the socket will be used after being released leading to denial of service (DoS) or a potential code execution.

Additional info:
* linux 5.8.14.arch1-1
* linux-lts 5.4.70-1
* https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/
This task depends upon

Closed by  Andreas Radke (AndyRTR)
Thursday, 28 January 2021, 07:01 GMT
Reason for closing:  Fixed
Comment by Andreas Radke (AndyRTR) - Monday, 16 November 2020, 11:07 GMT
20201110081655.29cbcd34@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com/"> https://lore.kernel.org/netdev/20201110081655.29cbcd34@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com/

There's no solution or fix available so far. Upstream is still working on it.
Comment by loqs (loqs) - Saturday, 26 December 2020, 23:55 GMT
Mitigated in linux by disabling DCCP support [1] 5.10.2.arch1-1

[1] https://github.com/archlinux/svntogit-packages/commit/c07751100e1d64d9aa5789881ddc2ef68e43aed4
Comment by Levente Polyak (anthraxx) - Wednesday, 27 January 2021, 23:55 GMT
same for zen 5.10.2.zen1-1 and hardened 5.9.9.a-1 just LTS is missing here

Loading...