CVE-2020-16119 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
Hadar Manor reported that by reusing a DCCP socket with an attached dccps_hc_tx_ccid as a listener,  in Linux <= 5.9, it will be used after being released, leading to a denial of service or possibly code execution.
Group Package Affected Fixed Severity Status Ticket
AVG-1247 linux-lts 5.4.93-1 5.4.93-2 High Fixed FS#68257
AVG-1246 linux-zen 5.9.7.zen1-1 5.10.2.zen1-1 High Fixed FS#68257
AVG-1245 linux-hardened 5.9.8.a-1 5.9.9.a-1 High Fixed FS#68257
AVG-1244 linux 5.9.7.arch1-1 5.10.2.arch1-1 High Fixed FS#68257
References
https://www.openwall.com/lists/oss-security/2020/10/13/7
https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/
Notes
It was introduced by:

 2677d20677314101293e6da0094ede7b5526d2b1 "dccp: don't free
 ccid2_hc_tx_sock struct in dccp_disconnect()"

Proposed fixes have been posted to:
  https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/

To mitigate this on systems that have DCCP enabled but do not use it, block module autoloading via adding the following to /etc/modprobe.d/blacklist-dccp.conf:

   alias net-pf-2-proto-0-type-6 off
   alias net-pf-2-proto-33-type-6 off
   alias net-pf-10-proto-0-type-6 off
   alias net-pf-10-proto-33-type-6 off

Alternatively, to prevent the dccp module from being loaded entirely, add:

  blacklist dccp
  install dccp /bin/false