A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041 | third party advisory patch |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2 | patch vendor advisory release notes |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | vendor advisory mailing list third party advisory |
https://usn.ubuntu.com/4578-1/ | patch vendor advisory third party advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | third party advisory mailing list |