First published: Thu Sep 24 2020(Updated: )
A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.8.2 | |
Debian GNU/Linux | =9.0 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-26088 is considered medium, as it allows local attackers to bypass security mechanisms.
To fix CVE-2020-26088, update the Linux kernel to version 5.8.2 or later.
CVE-2020-26088 affects various Linux kernel versions prior to 5.8.2, including certain Debian and openSUSE versions.
CVE-2020-26088 requires local access to the machine for exploitation, as it involves creating raw sockets.
The impact of CVE-2020-26088 includes the potential for local users to create raw sockets and bypass security controls.