An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/project-zero/issues/detail?id=2011 | Exploit Issue Tracking Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 | Release Notes Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c | Patch Vendor Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=2011 | Exploit Issue Tracking Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 | Release Notes Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=2011 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 - Release Notes, Vendor Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d30cdfbca316dadd099c3ca0d739c - Patch, Vendor Advisory |
Information
Published : 2020-11-28 07:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29373
Mitre link : CVE-2020-29373
CVE.ORG link : CVE-2020-29373
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')