CVE-2020-14386 log
Source |
|
Severity | High |
Remote | No |
Type | Privilege escalation |
Description | A memory corruption flaw was found in the Linux kernel before 5.9-rc4 in net/packet/af_packet.c. A local attacker with CAP_NET_RAW privileges can exploit this vulnerability to gain root privileges from unprivileged processes. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1237 | linux-hardened | 5.7.19.a-1 | 5.8.a-1 | High | Fixed | |
AVG-1224 | linux-zen | 5.8.7.zen1-1 | 5.8.8.zen1-1 | High | Fixed | |
AVG-1223 | linux-lts | 5.4.63-1 | 5.4.64-1 | High | Fixed | |
AVG-1222 | linux | 5.8.7.arch1-1 | 5.8.8.arch1-1 | High | Fixed |
References |
---|
https://www.openwall.com/lists/oss-security/2020/09/03/3 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06 |
Notes |
---|
Mitigation: If unprivileged user namespaces are not needed, set the kernel.unprivileged_userns_clone sysctl to 0: $ sudo sysctl kernel.unprivileged_userns_clone=0 This prevents straight forward exploitation, however the vulnerability can still be triggered by an attacker by gaining code execution to an unprivileged processes that has the CAP_NET_RAW capability set and the system does not restrict the capability. |