Bugzilla – Bug 1168831
VUL-1: CVE-2020-11565: kernel-source: out-of-bounds write due to improper handling of an empty nodelist during mount option parsing
Last modified: 2020-06-10 16:03:47 UTC
CVE-2020-11565 An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-11565 https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
While the issue is real, this requires root to mount the tmpfs. So what is the security aspect of this bug?
Tracked as affected as back as 2.6.32
This here says that this has been disputed in the meantime: https://security-tracker.debian.org/tracker/CVE-2020-11565
Disputed