First published: Mon May 04 2020(Updated: )
A flaw was found in the Linux kernel’s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/kernel-rt | <0:4.18.0-193.56.1.rt13.106.el8_2 | 0:4.18.0-193.56.1.rt13.106.el8_2 |
redhat/kernel | <0:4.18.0-193.56.1.el8_2 | 0:4.18.0-193.56.1.el8_2 |
Linux Linux kernel | >=4.4.0<4.4.221 | |
Linux Linux kernel | >=4.9.0<4.9.221 | |
Linux Linux kernel | >=4.14<4.14.178 | |
Linux Linux kernel | >=4.19<4.19.119 | |
Linux Linux kernel | >=5.0<5.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)