First published: Sun Sep 13 2020(Updated: )
A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
Linux Kernel | <5.8.9 | |
Debian Debian Linux | =9.0 | |
openSUSE | =15.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions: # echo "install rbd /bin/true" >> /etc/modprobe.d/disable-rdb.conf The system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use. If the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25284 has been classified as having a high severity level due to its potential to allow unauthorized manipulation of Rados Block Devices.
To mitigate CVE-2020-25284, upgrade to the specific patched versions of the kernel packages as provided by your Linux distribution.
Users running vulnerable versions of the Linux kernel or specific distributions like Red Hat, Debian, or openSUSE are affected by CVE-2020-25284.
CVE-2020-25284 affects Linux kernel versions prior to 5.8.9 as well as specific packaged versions in various distributions.
CVE-2020-25284 requires local root privileges for exploitation, therefore it cannot be exploited remotely.