First published: Mon Dec 21 2020(Updated: )
A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.15.2.rt56.1152.el7 | 0:3.10.0-1160.15.2.rt56.1152.el7 |
redhat/kernel | <0:3.10.0-1160.15.2.el7 | 0:3.10.0-1160.15.2.el7 |
Linux Linux kernel | =4.2 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-35513.
The severity of CVE-2020-35513 is medium.
CVE-2020-35513 affects Linux kernel NFS by allowing a user to create and delete objects using NFSv4.2 or newer with an incorrect umask during file or directory modification.
Versions up to and including 4.17 of the Linux kernel are affected by CVE-2020-35513.
Remedies are available for CVE-2020-35513, such as upgrading to kernel version 4.17 or higher.