The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a | patch vendor advisory |
https://twitter.com/grsecurity/status/1304537507560919041 | third party advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | vendor advisory mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | third party advisory mailing list |