First published: Fri Jun 05 2020(Updated: )
A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to apply umask correctly when creating a new object on filesystem without ACL support (for example, ext4 with the "noacl" mount option). This flaw could allow a local attacker with a user privilege to a kernel information leak problem. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.11.1.rt56.1145.el7 | 0:3.10.0-1160.11.1.rt56.1145.el7 |
redhat/kernel | <0:3.10.0-1160.11.1.el7 | 0:3.10.0-1160.11.1.el7 |
redhat/kernel | <0:3.10.0-693.82.1.el7 | 0:3.10.0-693.82.1.el7 |
redhat/kernel | <0:3.10.0-957.70.1.el7 | 0:3.10.0-957.70.1.el7 |
redhat/kernel | <0:3.10.0-1062.45.1.el7 | 0:3.10.0-1062.45.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
Linux Kernel | <5.7.8 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
openSUSE | =15.1 | |
Oracle SD-WAN Edge | =8.2 | |
StarWind Virtual SAN | =v8-build12533 | |
StarWind Virtual SAN | =v8-build12658 | |
StarWind Virtual SAN | =v8-build12859 | |
StarWind Virtual SAN | =v8-build13170 | |
StarWind Virtual SAN | =v8-build13586 | |
StarWind Virtual SAN | =v8-build13861 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-24394 has a severity rating that can allow local attackers to access kernel information due to improper umask application.
To fix CVE-2020-24394, apply the security updates provided in the corresponding kernel packages from your Linux distribution.
CVE-2020-24394 affects multiple versions of the Linux kernel, specifically versions up to 5.7.8.
CVE-2020-24394 cannot be exploited remotely as it requires local user privileges to be effective.
Systems running specific versions of Red Hat kernel, Ubuntu, and other distributions utilizing NFSv4.2 without ACL support are vulnerable to CVE-2020-24394.